1: The use of a trojan like sub7 requires for the attacker to either allready have some sort of access to your system or to some social engineering to trick you into executing a file you should not...