How Hackers Can Disguise Malicious Programs With Fake File Extensions