Making a malware application (for example, a computer trojan)that, combined with an exploitable security breach, allows remote access.Moreover, PDF (Portable Document Format) files or Microsoft Officesuite-specific files can be regarded as weapons available to the attacker;