How do computer virals exploit vulnerabilities in software and operating systems to propagate and cause harm, and what are the most common methods employed by cybercriminals to distribute and activate these malicious programs?