Comment Yeah, right (Score 1) 252
At most, all the fresh honey contained therein will come out. This may be less than all the fresh honey I want.
At most, all the fresh honey contained therein will come out. This may be less than all the fresh honey I want.
Doesn't work – you can modify the VM's memory contents and read/mutate its I/O operations from the host machine. It would in many respects make the attacker's job easier as they would only have one OS/browser version to go at.
Even better if you are a little technical, set up a "frugal" boot partition. This will unpack and boot a CD image much faster than booting from CD and when you power down it doesn't keep any state. No viruses survive the reboot.
Since it's on writable media, this is only true until someone writes a more sophisticated piece of malware. The same applies to a Live CD on a CD-RW to an extent. A Live CD on a finalized CD-R really is immutable.
UNLESS you forcibly close that session by closing your browser.
Doesn't help. Web servers do not (and cannot) know when your browser has been closed.
Besides, if the hijacker has done their job properly and you've only ever been communicating with the server you think you're connected to via their proxy, you can't disconnect unless they let you do so.
The relative error in a measurement is unaffected by multiplying it by a constant, however large. If your m is accurate to 1in 1.75e-7 the result of e=mc^2 is also accurate to 1 in 1.75e-7.
If it was e=cm^2 you'd have a point.
TwoGirlsOne.kp?
Just out of interest, do you work at IBM?
System i, formerly iSeries, AS/400 are minicomputers.
System z, formerly zSeries, System/390, System/370, System/360 are mainframes; some of which have longer uptimes than AS/400 (or indeed Sun) have existed for.
Not the same at all.
No amount of careful planning will ever replace dumb luck.