How does this Trojan work? Sorry is this question has been brought up tons of times also! I'm a newbie and I don't understand all this stuff but I'd like to! I thought in order for someone to infect another with this Trojan, they had to email the victim the server. Now, since I've been online, someone has tried to infect me without emailing it to me but by sending it to my IP?! I'm totally confused here ad any info would be greatly appreciated! Thanks everybody and sorry once again if this has already been asked!!!!