Vir2us creates isolated computing environments. This isolates the file and application being processed from the actual computer system. Either the hacker’s exploit will simply be unable to run or, if it is allowed to run, it will not be able to access any computer resources outside its virtual isolated container. When the session process is completed, Vir2us disposes that individual which will never be reused. Vir2us destroys any infection that might have occurred, through browsing or opening an infected email for example, along with the virtual environment. This inherently secure process makes it impossible for viruses and other malicious software to propagate across a network of computers or to persist on the computer where the exploit gained entry.