Advantages -Takes advantage of the resources available on an infected system to do some or all of the following: to propagate itself via floppy drives, email or network connections; to destroy data; and possibly to embrass the owner of the system by distributing documents found on the victim system's hard drive.