Computer Viruses, Worms, and Trojan Horses
How can a virus spread through an e-mail message?
p. 570 Fig. 11-2
Next
Step 1.  Unscrupulous programmers create a virus program.  They hide the virus in a Word document and attach the Word document to an e-mail message.
Step 2.  They use the Internet to send the e-mail message to thousands of users around the world.
Step 3b.  Other users do not recognize the name of the sender of the e-mail message. These users do not open the
e-mail message.  Instead they delete the e-mail message. These users’ computers are not infected with the virus.
Step 3a.  Some users open the attachment and their computers become infected with the virus.