A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows:
* Email attachments
* Social engineering
* NetBIOS remote installation
* Physical access
* Fake executables
* Spyware and adware
* IRC and IM chats
* Flash applets
* ActiveX controls, VBScript, and Java scripts