Introduction - If you have any usage issues, please Google them yourself
No matter which way the virus used, all viruses have the following basic characteristics common: 1. Search for a file infection, this document can be executable files, source code files, or anything (if not found, then Jump to the third step) 2. the virus into the body of this document 3. check did not meet the trigger conditions, if any, of this virus to activate 4. back to the host program to run or stop and return to DOS.