This document provides instructions for creating computer viruses. It describes the key components of a virus, including the replicator, concealer, and bomb. The replicator spreads the virus by copying itself without destroying files. The concealer uses encryption to avoid detection. The bomb carries out harmful actions like deleting files or slowing the system down. It encourages testing viruses and distributing them on bulletin boards to infect as many systems as possible. The goal is to eliminate "fools" who are unable to detect a virus infection.