1. Permissions. If the virus may not do damage, it can’t – unless it exploits a vulnerability.
2. Triggers. If there is something that prevents the damage to happen, it doesn’t happen. E.g. the Morris worm (RFC1135) would have needed a trigger
3. Using a separate device for development (VM or hardware). Virus or kernel driver: Don’t do that on the same machine you need tomorrow to file taxes. Also don’t be connected to the internet.
4. Having a way to undo the damage.
Latest Answers