Malware can infect systems in various ways and propagate without detection. This document discusses different types of malware like viruses, trojans, and worms and how they work. It covers infection methods like overwriting files, prepending or appending to files, hiding in file cavities, and using packers. Malware can activate through auto-start techniques in the operating system and propagate through document macros. The document provides examples of historical malware and outlines techniques for malware detection.