Well, maybe it's not possible. Who cares? That's not the point. It seems to me, Mac is only trying to invite intellectual discussion. You know, a little academic exercise. I looked over the group real quick and it does not appear Mac is a troll. So what's the problem? Someone piss in your cheerios this morning? I'm very disappointed in the attitude of most of the replies. The first offensive, insulting reply by Mr. Urban MVP. "You just don't get it - do you. Go write the program you desire hotshot." You know, a few years ago all the OE MVPs ranted, raved, and insisted it was IMPOSSIBLE to compromise yourself by opening an email, or simply visiting a web page. Hmm... we all know what happened next... What's impossible today may bite you in the butt tomorrow.
Attempted expert systems exist and are sold commercially; most of them
act like under-clued cowboy techs, making irreversible changes based
on poorly-checked assumptions. Generally I'd file the lot of them
under "snake oil". This isn't surprising, when you consider work from
the Von Neuman / Alan Turing era on computability etc.
A powerful computing system can analyse and fix a smaller one in a
small enough time for the results to be relevant. For example, you
can emulate the Spectrum (a small home computer running at a clock
speed of 3.5MHz with 48k or RAM) quite comfortably on a 50MHz 486DX2,
and the best way to run DOS software from the days of that "486" might
be to emulate it within a modern PC, rather than run it natively.
Current computing power is fast enough to run entire previous OSs and
their applications as if they were just programs in the newer system,
but you are asking something else; the ability to troubleshoot such
environments. I think that by the time we can code manual expertise
into an AI tshooter, the OS we'd be tshooting would be "obsolete".
If you think about where "troubles" come from, e.g. issues that
weren't anticipated when the system was written, you can see why
troubles persist, and why it would be a while before they could be
wished away (and new troubles invented).
This is very much the case about your examples of being attacked via
email messages or "document" macros. There was indeed a time when
such things were impossible, but ill-judged technology made them
possible. Some of us could see this coming, kicked up a fuss that was
ignored at the time, and took our own steps to pull the fangs out of
what we didn't like - and still do, to this day.
-- Risk Management is the clue that asks:
"Why do I keep open buckets of petrol next to all the
ashtrays in the lounge, when I don't even have a car?"