This worm combines the best parts of all previous forms of malware, enabling it to exploit almost any computer weakness, and fixing that exploit so that it can???t be used to infect the target system, making it so competing malware can???t gain access.