• Naim BAFTIU University of Prizren "UKSHIN HOTI"
  • Samedin KRABAJ University of Prizren "UKSHIN HOTI"


When we study how viruses work and prevent them, we've developed a very simple application where we can see a prototype of a virus and virus function, as well as neutralizing a file if we want to break it down its structure at the level of the bits Purpose-Understand how a virus works by programming it in a high programming language. In our case, the C # programming language with the Visual Studio program that uses the .Net Framework. With the Windows Form Application module, the same application we are creating can also use it to neutralize a sentence if we know it is infected by interfering with the file we set up itself and by disrupting the system his Binary.


1. Einführung in das Programmieren mit C# 4.0 2011 (Rev. 121022) ACHTUNG: Es ist ein ZIMK-Manuskript zu C# 6.0 verfügbar:
2. Serazzi, Giuseppe; Zanero, Stefano (2004). "Computer Virus Propagation Models". In Calzarossa, Maria Carla; Gelenbe, Erol. Performance Tools and Applications to Networked Systems(PDF). Lecture Notes in Computer Science. Vol. 2965. pp. 26–50. Archived (PDF) from the original on 2013-08-18.
3. Pro .NET 4 Parallel Programming in C# January 2010, DOI: 10.1007/978-1-4302-2968-1 Adam Freeman
4. Jason Andress, Steve Winterfeld, Cyber Warfare USA, 2014 978-0-12-416672-1.
5. Lance Hayden, Ph.D. IT security Metrice, USA, 2010, ISBN: 978-0-07-171340-5.
6. Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, Handbook of Applied Gryptography. USA, 1997. ISBN: 978-0-8493-8523-0
7. Stallings, William (2012). Computer security : principles and practice. Boston: Pearson. p. 182. ISBN 978-0-13-277506-9.
8. Aycock, John (2006). Computer Viruses and Malware. Springer. p. 14. ISBN 978-0-387-30236-2.
9. Cohen, Fred (1984), Computer Viruses – Theory and Experiments, archived from the original on 2007-02-18
10. Bell, David J.; et al., eds. (2004). "Virus". Cyberculture: The Key Concepts. Routledge. p. 154. ISBN 9780203647059. Archived from the original on 2017-03-16.
11. Mark Ciampa, Security+ Guide to Network Security Fundamentals
12. USA, 2012, ISBN: 978-1-111-64017-0.
How to Cite
BAFTIU, Naim; KRABAJ, Samedin. CREATING PROTOTYPE VIRUS - DESTROYING FILES AND TEXTS ON ANY COMPUTER. PRIZREN SOCIAL SCIENCE JOURNAL, [S.l.], v. 3, n. 1, p. 62-66, apr. 2019. ISSN 2616-387X. Available at: <>. Date accessed: 21 may 2019. doi: