Originally posted by: spyordie007
Originally posted by: n0cmonkey
Originally posted by: M00T
Keep up with the vmware updates
The flaw presents the biggest risk to malware researchers who use VMWare's virtual computing software during the audition of virus, spyware and rootkit files. It could allow a malicious hacker to sidestep the virtual machine and exploit the underlying operating system.
That's why if you're testing Windows based OSes in the virtual machine you run VMWare on a Linux system, and vice versa if you roll that way.
Correct me if I'm wrong but this sounds like this is a flaw with the host, not the client. So an exploit could be written for either (or both), regardless of what OS the client is running.
Originally posted by: Nothinman
So simply running a VM in-and-of-itself isnt going to keep everything safe; there needs to be some inteligent thinking before said fire is played with.
Of course, but one would assume that if you're going to test sometihng potentially dangerous that you're not going to simply take the defaults and hope for the best.
My response was mostly directed at M00T's comment regarding it not being safe, however time to get on my soapbox... :roll:
Security is about sound judgement. If you simply perform actions suggested by "security experts" you are probably only moderatly better off than if you did nothing at all.
This is why I qualified my comment with the "inteligent thinking" bit. Sound design should always be part of the plan
😉
...The question was "Are virtual machines safe" and the best answer is "They can be".