corrupt data or the execution state of programs;
reformat complete disks;
perform a total system shutdown;
collect and download confidential data, such as files or passwords, to another site;
usurp identity and impersonate the user or user’s computer to attack other targets on the network;
lock up resources making them unavailable for legitimate users and programs;
cause non-fatal but unwelcome effects, especially on output devices.