and variants Every Virus strain must be examined individually to extract signatures and information on how to remove. Who writes these harmful malware programs? If a program is self-replicating, but does nothing malicious, is it still a virus?
How does it spread? Biological Defense computer immune system Automatic Virus Analysis Once several decoys have become infected with the virus, they can be compared and the inner workings of the virus can be discovered. A human expert disassembles the virus and then analyzes the code to determine both behavior and the method it uses to attach itself to host programs. ThreatExpert is an advanced automated threat analysis system designed the Confucian Ideal End of Government to analyze and report the behavior of computer viruses. Computer Viruses are self replicating software entities that attach themselves parasitically to existing programs. This signature enables the virus scanners to recognise the malware and delete. The new signature is added to the database so that this virus can be detected and removed in the wild.
Analysis of Computer Viruses