Discovered such a thing as a virtual machine. I watch different versions of Linux. I enter the team, poke buttons and see what happens.

And the question is simple: Everything that is in a virtual machine remains in the virtual machine? Can I not worry about the security of my physical computer? Even if all Internet viruses get into my VMware.

  • 2
    Sometimes seemingly stupid questions turn out to be very good. :) - Nick Volynkin ♦
  • one
    There is a category of viruses specifically for such a scenario - to get out of the virtual machine into the main one (using the vulnerabilities of the virtual machine). So there are chances. - Vladimir Gamalyan
  • one
    There are no 100% secure systems. Even OpenBSD find holes. Work inside snapshot and do not clear the ball (via a connected network drive with rw) files that are dear to you. From 99% of threats helps. Oh yes. Backups. - don Rumata
  • 2
    For 8+ years of working with Wyrm, I have not met a single one who would break through a VM and get to the host. And colleagues did not tell about this, so the chances are almost nil. Through the ball access to the host can be obtained, but do not keep anything useful in the ball. - Vladimir Martyanov
  • one
    Basically m. there are dangerous network worms (are they dangerous now?), and also turning your virtual machine into a part of a botnet. - avp

1 answer 1

There are no open exploits of exploits that “break through” the protection of virtual machines. Therefore, unless you are working with sensitive information and are not Snowden, you can consider the protection provided by the virtual machine as a whole reliable.

Unless you break it yourself.


First of all, your virtual machine is usually connected to your computer through a virtual network. Thus, a network worm that has infected a virtual machine gets a convenient platform for attacking your main system. If your computer has closed ports, this will not be a problem, but if a router with NAT was selected as the only protection measure, you have problems.

So it's time to deal with a firewall or firewall and find out what permissions you managed to give.


A promising method of attacking a host system is a video card emulator. If you have a choice between several virtual video cards, it makes sense for a virtual machine to limit itself to a standard virtual video card without support for DirectX and OpenGL.

Also a source of danger are virtualization utilities kits for guest operating systems — if you experiment with viruses, they are better not to install them.

In any case, you should not allow a virtual machine unlimited access to the disk.


And finally - it must be remembered that sometimes a virus does not necessarily get out of the virtual machine. Obviously, if you use the same virtual machine to experiment with viruses and to pay for anything from the card, the virus will drag out your billing information in the same way as he would on a real computer.

A less obvious scenario is that a virus that has infected a virtual user may include it on the botnet and DDOS another site from it. Or mine cryptocurrency for your electricity.

Update Intel processors found a Meltdown vulnerability, which, in the absence of patches closing it, allows any process to arbitrarily read any places in RAM. Therefore, it is better not to work with important data when running a virtual machine with viruses if you have Intel.