I have a good fiewall installed on my computer, but I have heard a lot about the sub7. How would someone infect my computer with the sub7......and how would I know if it had happened? What methods would they use?