F5F Stay Refreshed Software Operating Systems You have two operating systems installed. Installing risky files on one will not affect the other.

You have two operating systems installed. Installing risky files on one will not affect the other.

You have two operating systems installed. Installing risky files on one will not affect the other.

Pages (2): 1 2 Next
S
SillyDragon
Senior Member
586
01-10-2020, 07:38 PM
#1
It doesn't serve you well.
S
SillyDragon
01-10-2020, 07:38 PM #1

It doesn't serve you well.

L
louie018
Posting Freak
824
01-12-2020, 03:05 AM
#2
Second OS is not working—just remove it. What do you mean by "dangerous files"? If you're trying to install Linux on top of Windows, doing it properly should prevent conflicts.
L
louie018
01-12-2020, 03:05 AM #2

Second OS is not working—just remove it. What do you mean by "dangerous files"? If you're trying to install Linux on top of Windows, doing it properly should prevent conflicts.

G
Gabokazu
Posting Freak
814
01-12-2020, 07:28 PM
#3
You're asking if calling the secondary OS useless refers to trying malware in that environment. If both systems are the same OS, it might spread to each other. For testing purposes, use a virtual machine with isolation and no network access.
G
Gabokazu
01-12-2020, 07:28 PM #3

You're asking if calling the secondary OS useless refers to trying malware in that environment. If both systems are the same OS, it might spread to each other. For testing purposes, use a virtual machine with isolation and no network access.

T
T___________T
Member
224
01-13-2020, 02:19 AM
#4
Yes Long answer: When both operating systems reside on the identical storage device, access is confirmed. If they are separated across distinct drives, functionality may vary depending on system configuration and connectivity methods. Since RAM interacts with any active files regardless of location, including those stored on external media like USB sticks, compatibility remains possible under certain conditions.
T
T___________T
01-13-2020, 02:19 AM #4

Yes Long answer: When both operating systems reside on the identical storage device, access is confirmed. If they are separated across distinct drives, functionality may vary depending on system configuration and connectivity methods. Since RAM interacts with any active files regardless of location, including those stored on external media like USB sticks, compatibility remains possible under certain conditions.

S
schrijverkes
Member
107
01-13-2020, 07:53 AM
#5
In principle anything can be achieved, but stay cautious. If you wish to try less common software, go ahead. For testing malicious programs, use a different drive with disconnected drivers.
S
schrijverkes
01-13-2020, 07:53 AM #5

In principle anything can be achieved, but stay cautious. If you wish to try less common software, go ahead. For testing malicious programs, use a different drive with disconnected drivers.

R
River__Song
Junior Member
15
01-13-2020, 10:02 AM
#6
@Polemical
R
River__Song
01-13-2020, 10:02 AM #6

@Polemical

K
KorviZen
Junior Member
26
01-13-2020, 10:26 AM
#7
I experiment with certain cracked games. On the second operating system, sometimes ads appear. Additionally, I have encrypted the first OS using BitLocker, so viruses can't reach it.
K
KorviZen
01-13-2020, 10:26 AM #7

I experiment with certain cracked games. On the second operating system, sometimes ads appear. Additionally, I have encrypted the first OS using BitLocker, so viruses can't reach it.

S
196
01-13-2020, 11:37 AM
#8
Ensure the initial operating system is protected by BitLocker encryption.
S
StampyKittenNZ
01-13-2020, 11:37 AM #8

Ensure the initial operating system is protected by BitLocker encryption.

B
Bloemkool33
Member
223
01-13-2020, 12:06 PM
#9
I’m not familiar with setting up harmful software.
B
Bloemkool33
01-13-2020, 12:06 PM #9

I’m not familiar with setting up harmful software.

Y
yojin091024
Member
137
01-14-2020, 07:10 AM
#10
When I started with the first one, should the second also be encrypted?
Y
yojin091024
01-14-2020, 07:10 AM #10

When I started with the first one, should the second also be encrypted?

Pages (2): 1 2 Next