The document summarizes the Rapid Recovery System, which uses virtualization to isolate a user's activities and protect their computer from malware. It describes how typical user actions like opening an infected attachment, visiting a malicious website, or installing a problematic update could compromise the system without the Rapid Recovery System's protections. With the system, these actions would be contained to a virtual machine while the user's data remains protected by rolling back to the previous known good state.