By the end of last year, there were more than 200 million PCs connected to the Internet. Ninety percent of these are Windows machines running the same applications, such as Word, Microsoft Exchange, and Excel.

What it will do is it will search through the C through Z drives and select randomly a set of files of varying extensions, and then it will zero out or kill the contents of an arbitrary extension of those files.

Think of it like this: If you see someone walking down your street wearing a mask and carrying an automatic weapon, you might get suspicious. Our heuristic software is designed to recognize suspicious code.

I love my job a lot, ... I look forward to every day. It's actually quite challenging.

[Others are sympathetic to the Microsoft plight.] The problem is that it is nearly impossible to offer security without blocking legitimate files, ... Microsoft's effort is a good first step. At least it should reduce the speed at which viruses can spread.

If people receive executables in the mail, they should not run them.

A worm is specifically designed to spread itself from one computer to another. It will infect a computer once, deploy its payload, and then try to move on to other computers.