F5F Stay Refreshed Software Operating Systems Infected user profiles can spread to other profiles if they share the same system or network.

Infected user profiles can spread to other profiles if they share the same system or network.

Infected user profiles can spread to other profiles if they share the same system or network.

E
ERKKIN
Member
218
09-09-2016, 07:22 AM
#1
You want to add an untrusted or suspicious app to a secondary user profile without interfering with your main account. Also, you mentioned issues with Windows Sandbox removing everything when closed. You need a method to run the program safely, keeping your important data secure.
E
ERKKIN
09-09-2016, 07:22 AM #1

You want to add an untrusted or suspicious app to a secondary user profile without interfering with your main account. Also, you mentioned issues with Windows Sandbox removing everything when closed. You need a method to run the program safely, keeping your important data secure.

L
Lucky_Arnout
Member
158
09-09-2016, 09:28 AM
#2
Another person wouldn't safeguard you; instead, focus on utilizing a virtual machine.
L
Lucky_Arnout
09-09-2016, 09:28 AM #2

Another person wouldn't safeguard you; instead, focus on utilizing a virtual machine.

J
Jasper2405
Junior Member
9
09-29-2016, 12:45 AM
#3
J
Jasper2405
09-29-2016, 12:45 AM #3

1
11_JOEL_11
Member
247
10-01-2016, 08:17 PM
#4
Consider setting up an additional partition, adding a fresh Windows installation, and securing the remaining partitions using BitLocker.
1
11_JOEL_11
10-01-2016, 08:17 PM #4

Consider setting up an additional partition, adding a fresh Windows installation, and securing the remaining partitions using BitLocker.

S
Slowbi
Junior Member
15
10-07-2016, 09:47 AM
#5
It might be possible, but handling all that trouble is excessive when a simple VM would solve it.
S
Slowbi
10-07-2016, 09:47 AM #5

It might be possible, but handling all that trouble is excessive when a simple VM would solve it.

M
mat_fram
Posting Freak
776
10-14-2016, 07:40 PM
#6
Any malicious software operates with privileges matching the user who executed it. If it targets the operating system directly, it might gain higher-level access through system functions. Executing untrusted code inside a virtual machine is the safest choice.
M
mat_fram
10-14-2016, 07:40 PM #6

Any malicious software operates with privileges matching the user who executed it. If it targets the operating system directly, it might gain higher-level access through system functions. Executing untrusted code inside a virtual machine is the safest choice.

P
piginmud
Junior Member
13
10-14-2016, 09:04 PM
#7
I'll attempt to use VM
P
piginmud
10-14-2016, 09:04 PM #7

I'll attempt to use VM