Skip to content

which of the following is not a way that malicious code spreads