How safe is Windows Virtual PC?
#1
Original Poster
FlyerTalk Evangelist
Join Date: Mar 2004
Location: Newport Beach, California, USA
Posts: 36,062
How safe is Windows Virtual PC?
I've previously recounted my struggles against malware that got on my machine, I think, because of Mrs. PTravel's surfing. As some of you advised, I'm in the process of setting up a virtual machine on my Windows 7 to computer to run a copy of Windows 7 that will be Mrs. PTravel's computer.
I just want to make absolutely sure that, whatever she does in her sandbox, it will not do any damage to the real PC's data.
I just want to make absolutely sure that, whatever she does in her sandbox, it will not do any damage to the real PC's data.
#2
FlyerTalk Evangelist




Join Date: Sep 2000
Programs: BA, AA, DL, KLM, UA
Posts: 37,489
It is 100% separated, unless you open things up like access to local folders.
In a normal setup, nothing that happens in the VM will make its way across.
In a normal setup, nothing that happens in the VM will make its way across.
Last edited by ScottC; Jun 4, 2013 at 12:14 pm
#3

Join Date: Mar 2011
Location: FLL/MIA
Programs: AA Gold
Posts: 140
it is separate but always back up your data externally (the least to an external drive, preferably something in the cloud) and in this case make sure she is not an administrator and use a browser with add ons (firefox) that will help keep things from downloading in the first place. a good anti-virus as well.
i might reocommend a dual boot instead or just a cheap laptop that you can reimage at the drop of a hat. i recommend macrium reflect, free program, to do so.
i might reocommend a dual boot instead or just a cheap laptop that you can reimage at the drop of a hat. i recommend macrium reflect, free program, to do so.
#4
Original Poster
FlyerTalk Evangelist
Join Date: Mar 2004
Location: Newport Beach, California, USA
Posts: 36,062
it is separate but always back up your data externally (the least to an external drive, preferably something in the cloud) and in this case make sure she is not an administrator and use a browser with add ons (firefox) that will help keep things from downloading in the first place. a good anti-virus as well.
In other words, all of the usual precautions failed -- I suspect she went to some website and got a particularly nasty drive-by infection.
i might reocommend a dual boot instead or just a cheap laptop that you can reimage at the drop of a hat. i recommend macrium reflect, free program, to do so.
#5

Join Date: Mar 2011
Location: FLL/MIA
Programs: AA Gold
Posts: 140
i see, well i would use some type of backup that has versioning and/or multiple copies, real time is great in theory, but if the data gets damaged so does your backup. and raid is not bulletproof.
your 32" monitor won't accept a laptop signal? you can't throw a KVM on there and run a separate machine?
virtual machine, in my opinion, won't solve your problems completely but good luck.
your 32" monitor won't accept a laptop signal? you can't throw a KVM on there and run a separate machine?
virtual machine, in my opinion, won't solve your problems completely but good luck.
#6
Original Poster
FlyerTalk Evangelist
Join Date: Mar 2004
Location: Newport Beach, California, USA
Posts: 36,062
your 32" monitor won't accept a laptop signal? you can't throw a KVM on there and run a separate machine?

virtual machine, in my opinion, won't solve your problems completely but good luck.
#7
FlyerTalk Evangelist




Join Date: Jul 2000
Location: in the vicinity of SFO
Programs: AA 2MM (LT-PLT, PPro for this year)
Posts: 19,784
Also, I'd guess she doesn't play any games (etc), as the 3D performance tends to be abysmal on VMs, but as long as she doesn't need it, it's an irrelevance. (* there are some exceptions, where you can pass the GPU entirely to the VM, but they are currently a bear to get set up.)
The alternatives would be a hypervisor where there's no outer OS to log into (or a very thin one she can't get into trouble with) like ESX/Xen/Hyper-V. The free edition of Hyper-V is likely your best choice there (eta: and by "best" I mean easiest to get set up if you're familiar with Windows.)
--
As an alternative, what about a second cheapie USFF desktop with a KVM switch? Something like an Intel NUC or Mac Mini is even smaller than a laptop, and would share the same screen.
Also, given her propensity towards picking up malware, any chance of getting her onto Linux or the MacOS? Neither's inherently that much more secure than Windows, but both are the targets of less malware at this point.
Lastly, if still on Windows, any chance of keeping her on a non-administrative account?
Last edited by nkedel; Jun 4, 2013 at 10:26 pm
#8
Original Poster
FlyerTalk Evangelist
Join Date: Mar 2004
Location: Newport Beach, California, USA
Posts: 36,062
I've set it up this way: I use Fences, which lets me organize icons into groups inside translucent boxes with labels at the top. One of the boxes has my wife's name and there's just one icon in it, labeled "start." When she clicks on that, the virtual machine starts and opens into full screen with a different background than main desktop. As long as she sees the Grand Canyon instead of the Ocean Sunset, she knows she's good to go.
Also, I'd guess she doesn't play any games (etc), as the 3D performance tends to be abysmal on VMs, but as long as she doesn't need it, it's an irrelevance. (* there are some exceptions, where you can pass the GPU entirely to the VM, but they are currently a bear to get set up.)
The alternatives would be a hypervisor where there's no outer OS to log into (or a very thin one she can't get into trouble with) like ESX/Xen/Hyper-V. The free edition of Hyper-V is likely your best choice there (eta: and by "best" I mean easiest to get set up if you're familiar with Windows.)
As an alternative, what about a second cheapie USFF desktop with a KVM switch? Something like an Intel NUC or Mac Mini is even smaller than a laptop, and would share the same screen.
Also, given her propensity towards picking up malware, any chance of getting her onto Linux or the MacOS? Neither's inherently that much more secure than Windows, but both are the targets of less malware at this point.
I can barely manage in Linux. Mrs. PTravel will just blink at me, walk away and then sit down at my Windows 7 machine. As for MacOS -- no way, on principle.With Virtual PC, she can pick up all the malware she wants. If her PC-in-a-PC gets too messed up, I'll just copy over the backup of virtual PC and she's good to go again . . . 'til the next time.
Lastly, if still on Windows, any chance of keeping her on a non-administrative account?
* If anyone has any experience using FreePBX as a front-end for a Cisco SPA 8800, I could sure use some advice. I've got the SPA 8800 working with a POTS phone and a VOIP provider that has really, really cheap rates to China (1.2 cents/minute), but I'd ultimately like to run 3 VOIP lines and 3 POTS line through the Cisco, with FreePBX providing dedicated mailboxes, intelligent forwarding, and voice message attachments to email with both VOIP and POTS phones. I know it can do this but, as I said, "Damnit, Jim, I'm a lawyer, not a digital communications engineer."
#9




Join Date: Dec 2002
Location: Oregon
Programs: AA EXP, UA 1MM, HH Diamond, National EE, Hertz PC
Posts: 4,055
Here is my only concern, PTravel: You said last time that once one PC was infected inside your firewall, the problem spread. That could be because credentials were already established with those other PC's, or it could be because there were vulnerabilities in the operating systems of those other computers that could be easily targeted by an infected computer inside your firewall. If the latter, an infected VM is just as good as any other infected computer at probing vulnerabilities.
Personally, I think that as long as you never - ever establish connections between the VM and any other computer on your network, so no credentials could be saved, you'll be fine. I would even go into the network control panel and disable the microsoft networking client on the VM just to make sure. If you have firewall software on the other "actual" pc's that lets you specifically tag the VM as "untrusted" that wouldn't hurt either, but at minimum you'll want to make sure those other PC's have their own software firewall since you will have an "unsafe" computer behind your router. Thousandth's of a percent chance kind of stuff at this point though. I think you'll be fine. Personally I'm not a fan of Microsoft Virtual PC. I much prefer VMware workstation (or even VMware Player) or VirtualBox. Once they changed VPC to the windows 7 version that it ran it's connections via RDP, it seemed far slower to me.
Edited to add: You can run ChromiumOS inside of VirtualBox or VMware. Then you wouldn't even have to have a "vulnerable" windows box. This seems pretty bulletproof and maybe not so intimidating as plain 'ol Linux.
Personally, I think that as long as you never - ever establish connections between the VM and any other computer on your network, so no credentials could be saved, you'll be fine. I would even go into the network control panel and disable the microsoft networking client on the VM just to make sure. If you have firewall software on the other "actual" pc's that lets you specifically tag the VM as "untrusted" that wouldn't hurt either, but at minimum you'll want to make sure those other PC's have their own software firewall since you will have an "unsafe" computer behind your router. Thousandth's of a percent chance kind of stuff at this point though. I think you'll be fine. Personally I'm not a fan of Microsoft Virtual PC. I much prefer VMware workstation (or even VMware Player) or VirtualBox. Once they changed VPC to the windows 7 version that it ran it's connections via RDP, it seemed far slower to me.
Edited to add: You can run ChromiumOS inside of VirtualBox or VMware. Then you wouldn't even have to have a "vulnerable" windows box. This seems pretty bulletproof and maybe not so intimidating as plain 'ol Linux.
Last edited by elCheapoDeluxe; Jun 4, 2013 at 11:52 pm
#10
Original Poster
FlyerTalk Evangelist
Join Date: Mar 2004
Location: Newport Beach, California, USA
Posts: 36,062
Here is my only concern, PTravel: You said last time that once one PC was infected inside your firewall, the problem spread. That could be because credentials were already established with those other PC's, or it could be because there were vulnerabilities in the operating systems of those other computers that could be easily targeted by an infected computer inside your firewall. If the latter, an infected VM is just as good as any other infected computer at probing vulnerabilities.
Personally, I think that as long as you never - ever establish connections between the VM and any other computer on your network, so no credentials could be saved, you'll be fine. I would even go into the network control panel and disable the microsoft networking client on the VM just to make sure. If you have firewall software on the other "actual" pc's that lets you specifically tag the VM as "untrusted" that wouldn't hurt either, but at minimum you'll want to make sure those other PC's have their own software firewall since you will have an "unsafe" computer behind your router. Thousandth's of a percent chance kind of stuff at this point though. I think you'll be fine. Personally I'm not a fan of Microsoft Virtual PC. I much prefer VMware workstation (or even VMware Player) or VirtualBox. Once they changed VPC to the windows 7 version that it ran it's connections via RDP, it seemed far slower to me.
Edited to add: You can run ChromiumOS inside of VirtualBox or VMware. Then you wouldn't even have to have a "vulnerable" windows box. This seems pretty bulletproof and maybe not so intimidating as plain 'ol Linux.
Personally, I think that as long as you never - ever establish connections between the VM and any other computer on your network, so no credentials could be saved, you'll be fine. I would even go into the network control panel and disable the microsoft networking client on the VM just to make sure. If you have firewall software on the other "actual" pc's that lets you specifically tag the VM as "untrusted" that wouldn't hurt either, but at minimum you'll want to make sure those other PC's have their own software firewall since you will have an "unsafe" computer behind your router. Thousandth's of a percent chance kind of stuff at this point though. I think you'll be fine. Personally I'm not a fan of Microsoft Virtual PC. I much prefer VMware workstation (or even VMware Player) or VirtualBox. Once they changed VPC to the windows 7 version that it ran it's connections via RDP, it seemed far slower to me.
Edited to add: You can run ChromiumOS inside of VirtualBox or VMware. Then you wouldn't even have to have a "vulnerable" windows box. This seems pretty bulletproof and maybe not so intimidating as plain 'ol Linux.
#11
FlyerTalk Evangelist



Join Date: Nov 2002
Location: ORD
Posts: 14,771
If your DD-WRT flavor supports VLANs, you could potentially put the VM on a different VLAN from the rest of the network - but your hypervisor would need to support 802.11q VLAN tagging. Not sure they do.
#13
FlyerTalk Evangelist



Join Date: Nov 2002
Location: ORD
Posts: 14,771
That could work too...but if you let any traffic out of the VM on any port, it's conceivable that malware could use that.
It all depends on how paranoid you want to be. Given your wife's penchant for dodgy websites, I'd go with a more paranoid solution: a totally separate PC. Get her a nice big monitor, put Chrome OS or Linux on the PC, and put it on a separate VLAN.
It all depends on how paranoid you want to be. Given your wife's penchant for dodgy websites, I'd go with a more paranoid solution: a totally separate PC. Get her a nice big monitor, put Chrome OS or Linux on the PC, and put it on a separate VLAN.
#14
Original Poster
FlyerTalk Evangelist
Join Date: Mar 2004
Location: Newport Beach, California, USA
Posts: 36,062
That could work too...but if you let any traffic out of the VM on any port, it's conceivable that malware could use that.
It all depends on how paranoid you want to be. Given your wife's penchant for dodgy websites, I'd go with a more paranoid solution: a totally separate PC. Get her a nice big monitor, put Chrome OS or Linux on the PC, and put it on a separate VLAN.
It all depends on how paranoid you want to be. Given your wife's penchant for dodgy websites, I'd go with a more paranoid solution: a totally separate PC. Get her a nice big monitor, put Chrome OS or Linux on the PC, and put it on a separate VLAN.
#15
FlyerTalk Evangelist




Join Date: Sep 2000
Programs: BA, AA, DL, KLM, UA
Posts: 37,489
Not if you know what you are doing. In a normal setup, well configured, a PC on a LAN can't just go ahead and compromise another PC on the same LAN. In fact, that should NEVER be possible.

