How to identify an infected computer trying to spread a threat like a worm on other machines