Rescuing the End-user systems from Vulnerable Applications using Virtualization Techniques