The computer that performs the search downloads the search command from the server. The server becomes aware of the action and changes the task status.
The computer that performs the search calculates the priority of the new task in relation to other tasks that might also be waiting to be run. The new task waits its turn according to the priority queue.
The computer that performs the search checks to see if it fulfills the requirements to run the task.
A message is sent to the server indicating that the task has started to run.
The computer that performs the search starts scanning the network to find unprotected computers.
Related topics