does hacking includes virii and/or worms?
if so how does a hacker finds use of a virus/worm for his tasks?