Answer two questions (Operating systems)

Page 381 #12 : Investigate the names and trigger events for 20 viruses discovered in the past 12 months. Research TWO in detail, describing which files they infect, how they spread, and their intended effects.

Page 381 #14: Using information from the CERT Coordination Center identify the latest vulnerability for an operating system of your choice. List the threat, the criticality of the threat, the potential impact, the suggested solution, the systems that are affected, and the actions you would take as a system administrator.

Required Text Book
Understanding Operating Systems 8th Edition