![]() |
Make sure the VM has no write access to anything outside it's own space.
I have a test VM for examining things set up this way--it's got *READ* access to most of my data storage but no write access anywhere other than it's own volume and when testing things in it I normally have it's internet access turned off besides. If something goes wrong I just restore the backup. |
Originally Posted by Loren Pechtel
(Post 20870586)
Make sure the VM has no write access to anything outside it's own space.
I have a test VM for examining things set up this way--it's got *READ* access to most of my data storage but no write access anywhere other than it's own volume and when testing things in it I normally have it's internet access turned off besides. If something goes wrong I just restore the backup. |
You can turn off the windows network client if you can use a network printer or print server and not have to use windows printer sharing.
|
Originally Posted by elCheapoDeluxe
(Post 20871283)
You can turn off the windows network client if you can use a network printer or print server and not have to use windows printer sharing.
|
Originally Posted by gfunkdave
(Post 20870407)
It all depends on how paranoid you want to be. Given your wife's penchant for dodgy websites, I'd go with a more paranoid solution: a totally separate PC. Get her a nice big monitor, put Chrome OS or Linux on the PC, and put it on a separate VLAN.
I can understand not wanting to spend the money, but the space is smaller than a hardback novel, and there are some nice inexpensive HDMI KVM switches where the mechanism takes up a couple of cubic inches (and no surface space) inline with the cabling.
Originally Posted by PTravel
(Post 20871302)
I didn't know that. Yes, all my printers are network printers. Does turning off the network client effect internet access?
|
Originally Posted by gfunkdave
(Post 20870171)
If your DD-WRT flavor supports VLANs, you could potentially put the VM on a different VLAN from the rest of the network - but your hypervisor would need to support 802.11q VLAN tagging. Not sure they do.
For KVM, VirtualBox, VMWare Workstation/Player, and other similar ones, you can set up a virtual NIC with tagging that is then attached to the guest system in bridged mode (this is what Xen does under the skin, actually.) In some of the cases you can also use a NAT-mode virtual NIC with a software firewall on the host machine, no VLANs needed, although that would not protect you on the limited allowed outgoing ports.
Originally Posted by ScottC
(Post 20870492)
Not if you know what you are doing. In a normal setup, well configured, a PC on a LAN can't just go ahead and compromise another PC on the same LAN. In fact, that should NEVER be possible.
Segregating trusted and untrusted traffic, either via VLAN, or better yet, physically segregating the untrusted LAN, is a good idea.
Originally Posted by PTravel
(Post 20868392)
She's not a mischievous child -- she just doesn't know a lot about computers. :) I've set it up this way: I use Fences, which lets me organize icons into groups inside translucent boxes with labels at the top. One of the boxes has my wife's name and there's just one icon in it, labeled "start." When she clicks on that, the virtual machine starts and opens into full screen with a different background than main desktop. As long as she sees the Grand Canyon instead of the Ocean Sunset, she knows she's good to go.
I can't imagine what benefit I'd get from a hypervisor that would force me to work in a virtual PC. First off, I don't allow Macs in my house. I don't like their OS philosophy of "we know better how you need to work than you do," If you don't feel like paying Apple for the privilege, it's not exactly hard to avoid it and run their OS on commodity hardware. :D I don't like paying triple the cost for software and hardware. Next, there is no room in our small apartment for a work space with another PC, regardless of what it is. There isn't even a space for another mid-tower and a KVM switch (and I have those, too). Linux? It will never happen. I have a couple of Linux boxes -- one is a laptop that I'll use to setup FreePBX* (an Asterix variant) on, and the other I used to use as a server and to hack DirecTV boxes (for pulling off recordings, not for stealing DirecTV). To paraphrase Bones McCoy from Star Trek, "Damnit, Jim, I'm a lawyer, not an IT guy!" :) I can barely manage in Linux. Mrs. PTravel will just blink at me, walk away and then sit down at my Windows 7 machine. It sounds like you're trying to do stuff that's a good deal more complicated than set-it-and-forget-it machines that someone does browsing on, and maybe some light office tasks (assuming LibreOffice and/or Calligra is an adequate replacement for Office.) In that sense, GUIs are fungible. But this one isn't for the power-user, it's for the dangerous non-technical one. (Linux, and potentially in some cases, the MacOS, may be a non-starter if the videos she's watching online are DRMed.) With Virtual PC, she can pick up all the malware she wants. If her PC-in-a-PC gets too messed up, I'll just copy over the backup of virtual PC and she's good to go again . . . 'til the next time. It doesn't matter whether she's on an adminstrative account or not. If she picks up the wrong malware, it can still lunch my system. |
Originally Posted by nkedel
(Post 20871558)
Assuming everything will stay 100% secure on the other systems is a dangerous bet -- especially with Windows, and the fact that he's doing some file sharing.
Segregating trusted and untrusted traffic, either via VLAN, or better yet, physically segregating the untrusted LAN, is a good idea. No separate user logins??? The "switch user" feature in current versions of Windows is a good thing; my wife is reasonably technical, and she still gets separate logins. ...and I'm guessing requiring a reboot between her use and your use would take too much time? Otherwise, her use could be in a VM on a standalone hypervisor, and your use could be on bare metal. It's not hard to set up dual-boot. I wasn't suggesting you use it... BTW, thank you, everyone, for taking the time to make suggestions. I'm just a dilettante when it comes to computer systems and I really appreciate the advice from the pros. I don't care for it either, but something a bit more locked-down might be a good thing for someone like your wife who is managing to malware-up Windows. (Ditto a version of Linux focused on end-user usability.) If you don't feel like paying Apple for the privilege, it's not exactly hard to avoid it and run their OS on commodity hardware. :D It's not that much more expensive anymore; the Mac Mini is about half again more expensive than the i3 NUC, but that's hardly apples-to-apples comparison. Hence my suggestion of a KVM. If your space is truly so small you can't find space for a USFF machine on the scale of the NUC or Mac Mini, well, that's a tiny space indeed, but I can't imagine it. A mid-tower is a whole lot bigger than a USFF machine, and if the KVM adds an appreciable amount of space, you've got a bulky professional one not a nice simple two-machine model that should be no bigger than a deck of cards with two cables sticking out of it. Does she use any Windows applications other than a browser? Ubuntu (or ChromeOS, which is basically just a very cut down version of Linux) is pretty dead easy at the sit-down-and-pull-up-a-browser level. It sounds like you're trying to do stuff that's a good deal more complicated than set-it-and-forget-it machines that someone does browsing on, and maybe some light office tasks (assuming LibreOffice and/or Calligra is an adequate replacement for Office.) In that sense, GUIs are fungible. But this one isn't for the power-user, it's for the dangerous non-technical one. (Linux, and potentially in some cases, the MacOS, may be a non-starter if the videos she's watching online are DRMed.) Sure, if she picks up the wrong malware. But the an awfully large group of malware out there is still the "trojan horse" kind that depends on the user letting something run that they oughtn't, and a fair chunk of that WILL be caught by running in a non-privileged account. Probably no longer a majority of it (or of all malware) -- although prior to Win 7 catching on, it was. |
Originally Posted by PTravel
(Post 20871302)
I didn't know that. Yes, all my printers are network printers. Does turning off the network client effect internet access?
In the connection properties, leave TCP/IP (v4) checked but UNCHECK the client for microsoft networking. This will disable windows file sharing client (and should automatically uncheck the server box when you do that). I do this on a VM I use as a web server, among my other precautions. You could still use a TCP/IP based printer / print server as well as any other web browsing software. |
Originally Posted by elCheapoDeluxe
(Post 20872020)
Nope!
In the connection properties, leave TCP/IP (v4) checked but UNCHECK the client for microsoft networking. This will disable windows file sharing client (and should automatically uncheck the server box when you do that). I do this on a VM I use as a web server, among my other precautions. You could still use a TCP/IP based printer / print server as well as any other web browsing software. Thanks! |
I'm still unclear on what disabling Windows file sharing will accomplish. You won't be able to access your NAS (which sounds like the point - but it would be just as easy to block access from the VM IP in your NAS).
|
Originally Posted by gfunkdave
(Post 20872122)
I'm still unclear on what disabling Windows file sharing will accomplish. You won't be able to access your NAS (which sounds like the point - but it would be just as easy to block access from the VM IP in your NAS).
|
Originally Posted by PTravel
(Post 20872127)
I want to block access, not only to the NAS, but to the other computers on the LAN which, in last month's malware attack, became infected.
|
Originally Posted by ohliuw
(Post 20873076)
Get a router that can do VLANs
|
Originally Posted by PTravel
(Post 20873305)
I'm pretty sure that my router can. I'll have to look.
http://wiki.openwrt.org/toh/start |
Originally Posted by PTravel
(Post 20871755)
Separate log-ins won't give me protection against rootkits and malware that can infect other machines over the LAN.
She'll jump on if I go out of the room for a cigarette or some more coffee. They seem to be environments that run virtual machines. Is that right? More general advantages of hypervisors are that the performance is often better, and the flexibility with which you can assign the underlying hardware to the VMs are often greater. These would be bigger advantages in your case if (for example) you were running your own instance in parallel with hers. If so, I guess I don't see the difference between running a VM under hypervisor and running one under Win7 (other than the latter is free and the former isn't. :)). Off the top of my, head every VM environment I'm aware of that will run on a PC is available in a free-as-in-beer edition, with commercial/supported up-sells you're unlikely to care about. If you care about FOSS, VirtualBox is available in an Open Source edition. It's somewhat more flexible than VirtualPC or the (free) version of VMWare Player. It's somewhat less flexible than VMWare workstation. One trick which used to work nicely was to get a free 30-day trial of VMWare workstation to enable features in your saved vm that aren't enabled in VMWare Player, then just use VMWare player once the setup is the way you want it. Oh, https://www.virtualbox.org/ The problem with Linux is actually my problem with Linux. I'm conversant enough with the Windows OS to have a fair idea of what's going on under the hood, and how to make it do what I want. Linux is another story altogether. As I've mentioned, I've worked in it before, but I'm not comfortable doing so because I really don't have the knowledge or experience to use it confidently. It's also really dead easy to understand what's under the hood, compared to Windows. :) If you don't feel like paying Apple for the privilege, it's not exactly hard to avoid it and run their OS on commodity hardware. Once you're running the MacOS unlicensed on a PC, you're running it unlicensed on a PC -- doesn't make much sense to have paid for it. I have on very good account that it runs well in VirtualBox. :D Frankly, for what my wife does, an i3 would be overkill. I've got an old P4 box that, aside from taking forever to boot up, would work just fine. Here's an idea: what about setting up a VM on a different machine, wired outside the main firewall, and having her use remote desktop from your machine to get to it? If your wiring is all gigabit, she should be able to still watch videos on it... then the only traffic you have to worry about is the single RDP port outbound from the machine she's accessing it from. As an added plus, she'd be able to get to her browsing/etc environment not just from your one desktop, but from any of your other machines. Nope. She can barely use a browser. :) Sure, but I either need a dedicated machine for them, or VM software that will support them under Win7. I want my wife to start learning how to use computers, rather than just playing with browsers. Ditto, for that matter, the basics of office suites; pretty much all GUI word processors and spreadsheets work pretty much the same. An Office power user is more likely to notice the differences between LibreOffice than MS Office (or Office up to 2003 and Office 2007 and later, given the awful ribbon) than a duffer. Towards that end, I want her to use software that she'd encounter in a work environment (and, specifically, my work environment -- I want her to start helping me out at the office). I work in a law office, which is an all-Microsoft Office Suite shop. I'm sure they are. I didn't know DRM was a specific problem for Linux and MacOS. Sure, but the trojan horse stuff will also be stopped cold by a VM (or, at least, have to be a lot more sophisticated to get to the underlying machine). That's why I'm concerned about safeguarding the NASes and other connected computers on my network. In theory, it is possible to have privilege escalation attacks out of a VM onto the underlying host system. In practice, I'm not aware of any working yet in the wild, and if there were, it would probably be aimed at large cloud infrastructure things ("I break into someones AWS instance, try to get into Amazon's infrastructure from there") and not individuals futzing with VirtualPC/VirtualBox/VMWare workstation on their own systems. That may change if later Win8.x moves to more Hyper-V-based sandboxing (like some of the BYOD proposals where work apps are a segregated VM) but even there, it's far from clear whether any attack would be general as opposed to specific to Hyper-V. -- BTW, I'd be terribly curious for a picture of the work room. |
| All times are GMT -6. The time now is 11:18 pm. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.