I read your post here as well: http://www.linuxquestions.org/questions/linux-distributions-5/need-fast-help-723975/
Nothing of this type can normally run on Linux unless your clicked on it giving it permission, even unknowingly
, or you were online using a root account (a real no no!).
I have a URL to an article that deals with this subject in more detail that was written by an security expert. In all cases of Linux hacks, the user must at some point provide permission for this type of thing to work. Once that is done however things can go downhill very quickly if the writer knows what they are doing. I feel very reluctant to post the URL (even though it is public info on the net) because I do not want to be party to spreading any of this type of info.
In the future please be careful, even in Linux, what you click on or allow to be downloaded to your PC. Even Linux is not completely bullet-proof when it comes to certain things....