Explain how a Blue Pill functions.
What are the weaknesses that this malware exploits and how?
What are the possible uses that this malware may have in collecting information from people?
Analyze whether this malware has something to monitor the employees.
Examine whether there are similar products that work on other OSs, or is Vista the only one prone to virtualization type exploits? Why or why not?