【71-75】melissa and loveletter made use of the trust that exists between friends or colleagues.imaginereceiving an (71) from a friend who asks you to open it. this is what happens withmelissaandseveral other similar email (72) . upon running, such worms usually proceed to send themselvesoutto email addresses from the victim's address book, previous emails, web pages (73).as administrators seek to block dangerous email attachments through the recognition ofwell-known(74) , virus writers use other extensions to circumvent such protection. executable (.exe)filesare renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfullyinfect target users. frequently, hackers try to penetrate networks by sending an attachment that looks like a flashmovie,which,while displaying some cute animation, simultaneously runs commands in the backgroundtostealyour passwords and give the (75) access to your network.