It is a hidden malicious code that could alter or delete the information of client computer or perform any unauthorized function and corrupt the data and delete the files. Its activities are: Deleting data, Blocking data, Modifying data, Copying data and disrupting the performance of computers or computer networking.