Jump to content
|Topic||Stats||Last action by|
|The wrongs with Indiana Jones & the Crystal Skull||
|Malaysia Airlines 'loses contact with plane'||
|No video on boot *desperate*||
|Answered Neowin's plan to go both IPv4 and IPv6 in the future?||
|Your observations on Windows 8.1 update 1 (a.k.a. Feature Pack)||
Posted 02 November 2012 - 18:21
Posted 02 November 2012 - 19:35
Posted 02 November 2012 - 20:08
Posted 04 November 2012 - 08:42
The recent one was fine if you use vmware, it was not vulnerable.
Here's some links to things about the bugs;
Posted 04 November 2012 - 09:00
"about these security flaws will be governments and incredibly sophisticated hackers"
So you think a virus scanner you got from mcafee or nod or whatever is going to protect against a government backed attack?
So as I was saying, generally speaking guest-host escapes is not something the general user base - say running some vms on my home lab box for example needs to be worried about protecting against. Other than making sure your VM software be it type1 or 2 is updated, and host os are patched and securely configured.
And in this context you could be pretty sure that this form of exploit is not going to be used when you download that keygen or hacked exe of some game or application or surf the dark underbelly of the net. What you should be concerned with is more that you can roll the vm back after you play with something like that. Or that the box does not become infected with the lastest worm that could infect your other vms/local network.
I think we are the same page yes?