1. Permissions. If the virus may not do damage, it can’t – unless it exploits a vulnerability.
2. Triggers. If there is something that prevents the damage to happen, it doesn’t happen. E.g. the Morris worm (RFC1135) would have needed a trigger
3. Using a separate device for development (VM or hardware). Virus or kernel driver: Don’t do that on the same machine you need tomorrow to file taxes. Also don’t be connected to the internet.
4. Having a way to undo the damage.
1. Permissions. If the virus may not do damage, it can’t – unless it exploits a vulnerability.
2. Triggers. If there is something that prevents the damage to happen, it doesn’t happen. E.g. the Morris worm (RFC1135) would have needed a trigger
3. Using a separate device for development (VM or hardware). Virus or kernel driver: Don’t do that on the same machine you need tomorrow to file taxes. Also don’t be connected to the internet.
4. Having a way to undo the damage.
The viruses could harm the creator’s computer if they didn’t program it very well. The viruses are typically designed to run at a certain moment and the programmer would know how to avoid the virus from running on their computer. But an amateur programmer could do bad programming and have it run on their computer, it’s happened many times I can guarantee it.
The viruses could harm the creator’s computer if they didn’t program it very well. The viruses are typically designed to run at a certain moment and the programmer would know how to avoid the virus from running on their computer. But an amateur programmer could do bad programming and have it run on their computer, it’s happened many times I can guarantee it.
Many viruses require negligence on the part of the user to work, often by mistaking it as something else. So, the virus creator obviously won’t be as susceptible to this mistake, but even then, as others have mentioned, you can “trick” the virus by using a virtual machine, kinda like a pocket universe for the virus that you can manipulate at will so the virus can’t really break out of it to do any harm to the actual computer.
Many viruses require negligence on the part of the user to work, often by mistaking it as something else. So, the virus creator obviously won’t be as susceptible to this mistake, but even then, as others have mentioned, you can “trick” the virus by using a virtual machine, kinda like a pocket universe for the virus that you can manipulate at will so the virus can’t really break out of it to do any harm to the actual computer.
Latest Answers