This document analyzes virus algorithms and proposes guidelines for controlling viruses based on the human immune system. It discusses three stages of virus writers from novice to professional. It describes features of various virus algorithms, including their ability to cover traces, use encryption, be polymorphic, use metamorphic code, be terminate and stay resident (TSR), and use non-standard techniques. Finally, it proposes four guidelines for computer security based on analogies to the human immune system: data protection, detection of anomalous behavior, isolation of infected systems, and development of adaptive security systems.