does the author actually know how a vaccine works?
For several decades the established AV vendors have been distributing “signatures”.
User downloads a file, accesses a webpage, plugs in a storage drive and the AV will scan for signatures, if found the relevant download will be blocked, the file deleted or access blocked. Thus preventing the malware from ever running and attempting to infect the system. My understanding is this is how biological vaccines work.
A second layer scans known places for activity, if the activity fits the profile, its potential malware and gets blocked, whilst relevant components are uploaded for analysis.
This seems to match how the immune system operates with “new” stuff.
I can see the benefit of setting “honeypots”, “tank traps” and “camouflage” to either expose, block or cause known malware to fail. However, given the changes some AV software make to systems, I’m not certain that some don’t already implement some of these preventative measures.(*)
>” Microsoft has put a kibosh on the antivirus industry because it is now built into Windows. You can get antivirus, but in many cases you don't really need it now," ”
Whilst Mishaps extended the reach of its AV tools in Windows, Edge and Outlook (full standalone desktop client), there is still much they miss that quality cloud-integrated AV tools intercept. Plus, the third-party tools tend to have better controls; too many times with Windows it’s all or nothing, a third-party tool will tend to permit more granular protections.
One of the best Personal AV tools I’ve used is Agnitum’s Outpost Security Suite, which profiled your applications, so it learnt “valid” behaviour. Whilst the early releases were not for the non-technical, v7.5 and later were more user friendly, with known applications getting prebuilt behaviour profiles, removing much of the need for local usage / behaviour learning and the risks associated with having lower security.
However, AV software for servers, VM’s and network appliances is another ball park (who runs AV on their router?)
(*) I have seen unused mailboxes, if they receive a message it is automatically flagged and investigated, with delivery to all other mailboxes blocked.