Jump to content
|Topic||Stats||Last action by|
|Unannounced Lumia shows up in Indian import logs||
|The Peterson Group : Fraud Company and Failed Promises||
|Xbox integration and more changes are coming to the People Hub with Windows 10||
|Formula 1 World Championship 2015 Season Discussion||
Posted 02 November 2012 - 18:21
Posted 02 November 2012 - 19:35
Posted 02 November 2012 - 20:08
Posted 04 November 2012 - 08:42
The recent one was fine if you use vmware, it was not vulnerable.
Here's some links to things about the bugs;
Posted 04 November 2012 - 09:00
"about these security flaws will be governments and incredibly sophisticated hackers"
So you think a virus scanner you got from mcafee or nod or whatever is going to protect against a government backed attack?
So as I was saying, generally speaking guest-host escapes is not something the general user base - say running some vms on my home lab box for example needs to be worried about protecting against. Other than making sure your VM software be it type1 or 2 is updated, and host os are patched and securely configured.
And in this context you could be pretty sure that this form of exploit is not going to be used when you download that keygen or hacked exe of some game or application or surf the dark underbelly of the net. What you should be concerned with is more that you can roll the vm back after you play with something like that. Or that the box does not become infected with the lastest worm that could infect your other vms/local network.
I think we are the same page yes?