On 30/04/14 12:43, Chris Walker wrote:
On Wed, 30 Apr 2014 07:53:07 +0100 Ewan Slater ewan.slater@googlemail.com wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Interesting.
Going back to the original question, I was thinking yesterday that for belt and braces you could always run a potentially vulnerable (in this case Win XP) VM from within a Linux container or chroot jail.
I'd never heard of such a thing so I've just looked that up. I see that Oracle show the details here - http://docs.oracle.com/cd/E37670_01/E36387/html/ol_cj_sec.html so I might have a crack at that for XP VBox setup.
Is there anything else I should think about to protect not only my linux machine but the VBox setup too?
I've never actually done this myself, so I'm speculating. Hope my speculation is useful.
How does Windows XP get viruses? 1) Installing programs voluntarily. So, if you can, always run XP in a user account that doesn't have administrative permission to install programs.
2) Inadvertently by a) Email so if you can, don't give it access to send or receive emails. Use a firewall to block email ports for the virtual machine
2b) Internet browsers/compromised websites so if you can, prevent internet access for the virtual machine.
3) Remote "Attack" via any open ports, samba shares, Plug n Play so Windows firewall it Linux Firewall it Minimise the amount of shared folders/files it has access to
and: Windows Anti-virus it. Don't allow Windows to run anything you don't need to run On Windows, Uninstall things you don't need
Steve