![]() |
How safe is Windows Virtual PC?
I've previously recounted my struggles against malware that got on my machine, I think, because of Mrs. PTravel's surfing. As some of you advised, I'm in the process of setting up a virtual machine on my Windows 7 to computer to run a copy of Windows 7 that will be Mrs. PTravel's computer.
I just want to make absolutely sure that, whatever she does in her sandbox, it will not do any damage to the real PC's data. |
It is 100% separated, unless you open things up like access to local folders.
In a normal setup, nothing that happens in the VM will make its way across. |
it is separate but always back up your data externally (the least to an external drive, preferably something in the cloud) and in this case make sure she is not an administrator and use a browser with add ons (firefox) that will help keep things from downloading in the first place. a good anti-virus as well.
i might reocommend a dual boot instead or just a cheap laptop that you can reimage at the drop of a hat. i recommend macrium reflect, free program, to do so. |
Originally Posted by cbkcc1
(Post 20865436)
it is separate but always back up your data externally (the least to an external drive, preferably something in the cloud) and in this case make sure she is not an administrator and use a browser with add ons (firefox) that will help keep things from downloading in the first place. a good anti-virus as well.
In other words, all of the usual precautions failed -- I suspect she went to some website and got a particularly nasty drive-by infection. i might reocommend a dual boot instead or just a cheap laptop that you can reimage at the drop of a hat. i recommend macrium reflect, free program, to do so. |
i see, well i would use some type of backup that has versioning and/or multiple copies, real time is great in theory, but if the data gets damaged so does your backup. and raid is not bulletproof.
your 32" monitor won't accept a laptop signal? you can't throw a KVM on there and run a separate machine? virtual machine, in my opinion, won't solve your problems completely but good luck. |
Originally Posted by cbkcc1
(Post 20865801)
i see, well i would use some type of backup that has versioning and/or multiple copies, real time is great in theory, but if the data gets damaged so does your backup. and raid is not bulletproof.
your 32" monitor won't accept a laptop signal? you can't throw a KVM on there and run a separate machine? virtual machine, in my opinion, won't solve your problems completely but good luck. |
Originally Posted by PTravel
(Post 20865825)
Nothing will solve my problems completely, but I can't think of any downside to a virtual machine. What problems do you think might result?
Also, I'd guess she doesn't play any games (etc), as the 3D performance tends to be abysmal on VMs, but as long as she doesn't need it, it's an irrelevance. (* there are some exceptions, where you can pass the GPU entirely to the VM, but they are currently a bear to get set up.) The alternatives would be a hypervisor where there's no outer OS to log into (or a very thin one she can't get into trouble with) like ESX/Xen/Hyper-V. The free edition of Hyper-V is likely your best choice there (eta: and by "best" I mean easiest to get set up if you're familiar with Windows.) -- As an alternative, what about a second cheapie USFF desktop with a KVM switch? Something like an Intel NUC or Mac Mini is even smaller than a laptop, and would share the same screen. Also, given her propensity towards picking up malware, any chance of getting her onto Linux or the MacOS? Neither's inherently that much more secure than Windows, but both are the targets of less malware at this point. Lastly, if still on Windows, any chance of keeping her on a non-administrative account? |
Originally Posted by nkedel
(Post 20868205)
With a VM application like Virtual PC (or VM Workstation or VirtualBox) how do you keep her from getting into the main PC when she has to log into it to get to her VM?
Also, I'd guess she doesn't play any games (etc), as the 3D performance tends to be abysmal on VMs, but as long as she doesn't need it, it's an irrelevance. (* there are some exceptions, where you can pass the GPU entirely to the VM, but they are currently a bear to get set up.) The alternatives would be a hypervisor where there's no outer OS to log into (or a very thin one she can't get into trouble with) like ESX/Xen/Hyper-V. The free edition of Hyper-V is likely your best choice there (eta: and by "best" I mean easiest to get set up if you're familiar with Windows.) As an alternative, what about a second cheapie USFF desktop with a KVM switch? Something like an Intel NUC or Mac Mini is even smaller than a laptop, and would share the same screen. Also, given her propensity towards picking up malware, any chance of getting her onto Linux or the MacOS? Neither's inherently that much more secure than Windows, but both are the targets of less malware at this point. With Virtual PC, she can pick up all the malware she wants. If her PC-in-a-PC gets too messed up, I'll just copy over the backup of virtual PC and she's good to go again . . . 'til the next time. Lastly, if still on Windows, any chance of keeping her on a non-administrative account? * If anyone has any experience using FreePBX as a front-end for a Cisco SPA 8800, I could sure use some advice. I've got the SPA 8800 working with a POTS phone and a VOIP provider that has really, really cheap rates to China (1.2 cents/minute), but I'd ultimately like to run 3 VOIP lines and 3 POTS line through the Cisco, with FreePBX providing dedicated mailboxes, intelligent forwarding, and voice message attachments to email with both VOIP and POTS phones. I know it can do this but, as I said, "Damnit, Jim, I'm a lawyer, not a digital communications engineer." |
Here is my only concern, PTravel: You said last time that once one PC was infected inside your firewall, the problem spread. That could be because credentials were already established with those other PC's, or it could be because there were vulnerabilities in the operating systems of those other computers that could be easily targeted by an infected computer inside your firewall. If the latter, an infected VM is just as good as any other infected computer at probing vulnerabilities.
Personally, I think that as long as you never - ever establish connections between the VM and any other computer on your network, so no credentials could be saved, you'll be fine. I would even go into the network control panel and disable the microsoft networking client on the VM just to make sure. If you have firewall software on the other "actual" pc's that lets you specifically tag the VM as "untrusted" that wouldn't hurt either, but at minimum you'll want to make sure those other PC's have their own software firewall since you will have an "unsafe" computer behind your router. Thousandth's of a percent chance kind of stuff at this point though. I think you'll be fine. Personally I'm not a fan of Microsoft Virtual PC. I much prefer VMware workstation (or even VMware Player) or VirtualBox. Once they changed VPC to the windows 7 version that it ran it's connections via RDP, it seemed far slower to me. Edited to add: You can run ChromiumOS inside of VirtualBox or VMware. Then you wouldn't even have to have a "vulnerable" windows box. This seems pretty bulletproof and maybe not so intimidating as plain 'ol Linux. |
Originally Posted by elCheapoDeluxe
(Post 20868532)
Here is my only concern, PTravel: You said last time that once one PC was infected inside your firewall, the problem spread. That could be because credentials were already established with those other PC's, or it could be because there were vulnerabilities in the operating systems of those other computers that could be easily targeted by an infected computer inside your firewall. If the latter, an infected VM is just as good as any other infected computer at probing vulnerabilities.
Personally, I think that as long as you never - ever establish connections between the VM and any other computer on your network, so no credentials could be saved, you'll be fine. I would even go into the network control panel and disable the microsoft networking client on the VM just to make sure. If you have firewall software on the other "actual" pc's that lets you specifically tag the VM as "untrusted" that wouldn't hurt either, but at minimum you'll want to make sure those other PC's have their own software firewall since you will have an "unsafe" computer behind your router. Thousandth's of a percent chance kind of stuff at this point though. I think you'll be fine. Personally I'm not a fan of Microsoft Virtual PC. I much prefer VMware workstation (or even VMware Player) or VirtualBox. Once they changed VPC to the windows 7 version that it ran it's connections via RDP, it seemed far slower to me. Edited to add: You can run ChromiumOS inside of VirtualBox or VMware. Then you wouldn't even have to have a "vulnerable" windows box. This seems pretty bulletproof and maybe not so intimidating as plain 'ol Linux. |
If your DD-WRT flavor supports VLANs, you could potentially put the VM on a different VLAN from the rest of the network - but your hypervisor would need to support 802.11q VLAN tagging. Not sure they do.
|
How about a firewall in the virtual machine? I could block all ports except 80 for everything but the printers.
|
That could work too...but if you let any traffic out of the VM on any port, it's conceivable that malware could use that.
It all depends on how paranoid you want to be. Given your wife's penchant for dodgy websites, I'd go with a more paranoid solution: a totally separate PC. Get her a nice big monitor, put Chrome OS or Linux on the PC, and put it on a separate VLAN. |
Originally Posted by gfunkdave
(Post 20870407)
That could work too...but if you let any traffic out of the VM on any port, it's conceivable that malware could use that.
It all depends on how paranoid you want to be. Given your wife's penchant for dodgy websites, I'd go with a more paranoid solution: a totally separate PC. Get her a nice big monitor, put Chrome OS or Linux on the PC, and put it on a separate VLAN. |
Originally Posted by PTravel
(Post 20870451)
I don't see how a separate PC would be any safer than a VM. Both still need internet access and printer access, which would give both the ability to compromise other machines on my LAN.
|
| All times are GMT -6. The time now is 3:43 pm. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.