When spreading over the local area network, the worm uses the following technique. When infecting a computer, the worm checks if a DHCP server is used on the network. If the victim computer is located ...