Step 1. Unscrupulous programmers create a
virus program. They hide the virus in a Word
document and attach the Word document to an e-mail message.
Step 2. They use the Internet to send the e-mail message to thousands of users around the world.
Step 3b. Other users do not recognize the name of
the sender of the e-mail message. These users do not open
the
e-mail
message. Instead they delete the e-mail
message. These users’ computers are not infected with the
virus.
Step 3a. Some users open the attachment and their computers become infected with the virus.