Desktop shortcuts are used to streamline access to an application or file. If access is somehow granted to the shortcuts on a user's desktop, it is possible to change the properties, and direct the shortcut to another file or application. In the case of a system administrator, a malicious internal user or hacker could direct a shortcut to a damaging virus or Trojan horse. Although the administrator believes that he or she is executing a normal application, the shortcut is spoofing the reality of its redirection. This possibility again underscores the need for users not to leave their desktop unprotected.