How Hackers Embed Trojans In Microsoft Documents