<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prevent host infection from spreading to a VM in VMware Workstation Pro Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706047#M100213</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes there is. But it can be done in gui itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) If you do not want internet connection in guest at all, change the network setting to host only.&lt;/P&gt;&lt;P&gt;2) Disable shared folders&lt;/P&gt;&lt;P&gt;3) disable drag and drop / copy and paste under guest sharing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you can have total isolation&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 11 Nov 2012 07:57:30 GMT</pubDate>
    <dc:creator>avanish321</dc:creator>
    <dc:date>2012-11-11T07:57:30Z</dc:date>
    <item>
      <title>Prevent future host infection from spreading to a VM</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706044#M100210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Been browsing the internet using VM's for years but available hardware is getting too old for this and now the host will have to be used for browsing, with browser sandboxing or even system sandboxing (deepfreeze).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If all personal data is kept encrypted in a VM from now on, and this VM has no access to the internet, and the host gets infected or owned by a hacker, then how can the host infection be prevented from spreading to the VM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can a hacker's keylogger running in the host make a recording of what I am typing inside the VM? And therefore steal the password typed to access truecrypt-encrypted personal data in the VM?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Nov 2012 23:31:10 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706044#M100210</guid>
      <dc:creator>UlyssesOfEpirus</dc:creator>
      <dc:date>2012-11-10T23:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent host infection from spreading to a VM</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706045#M100211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Well if you are sure that your VM is not yet infected, I would recommend you to take the backup of entire VM or, take snapshot of the current state.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second, install any latest version of Antivirus programs ( Avast, macaffe ) .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if you are concerned about keyloggers on host, connect a secondary keyboard to your guest directly. For Details, refer this &lt;A href="http://pubs.vmware.com/workstation-9/topic/com.vmware.ws.using.doc/GUID-07883F0A-E7B5-4CBA-837D-0BA986E8B900.html"&gt;Article&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 05:24:02 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706045#M100211</guid>
      <dc:creator>avanish321</dc:creator>
      <dc:date>2012-11-11T05:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent host infection from spreading to a VM</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706046#M100212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Aren't there some .vmx options to completely isolate the VM from the host so no access to the (encrypted) VM is possible even if the hacker finds a way to disable antivirus software?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 07:25:24 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706046#M100212</guid>
      <dc:creator>UlyssesOfEpirus</dc:creator>
      <dc:date>2012-11-11T07:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent host infection from spreading to a VM</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706047#M100213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes there is. But it can be done in gui itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) If you do not want internet connection in guest at all, change the network setting to host only.&lt;/P&gt;&lt;P&gt;2) Disable shared folders&lt;/P&gt;&lt;P&gt;3) disable drag and drop / copy and paste under guest sharing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you can have total isolation&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 07:57:30 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706047#M100213</guid>
      <dc:creator>avanish321</dc:creator>
      <dc:date>2012-11-11T07:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent host infection from spreading to a VM</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706048#M100214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was concerned with virtual hardware backdoors that vmware have put in to make VIX possible.&amp;nbsp; Can this sort of thing be safely disabled?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 08:02:44 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706048#M100214</guid>
      <dc:creator>UlyssesOfEpirus</dc:creator>
      <dc:date>2012-11-11T08:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent host infection from spreading to a VM</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706049#M100215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;avanish wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes there is. But it can be done in gui itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) If you do not want internet connection in guest at all, change the network setting to host only.&lt;/P&gt;&lt;P&gt;2) Disable shared folders&lt;/P&gt;&lt;P&gt;3) disable drag and drop / copy and paste under guest sharing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you can have total isolation&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not have total isolation because the Host Only Network is a path between Host and Guest and vice verse.&amp;nbsp; Even disabling the NIC along with other things you mention doesn't completely isolate the VM if VMware Tools are installed since vmrun and or VIX API technically could be called into play.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 11:41:12 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706049#M100215</guid>
      <dc:creator>WoodyZ</dc:creator>
      <dc:date>2012-11-11T11:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent host infection from spreading to a VM</title>
      <link>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706050#M100216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What sites are you going to that has you so concerned!? &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://communities.vmware.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp; In addition to normal best practices for safe surfing you might also employ the use of the free &lt;A href="http://en.wikipedia.org/wiki/Norton_DNS"&gt;Norton DNS&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 11:49:20 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-Workstation-Pro/Prevent-future-host-infection-from-spreading-to-a-VM/m-p/1706050#M100216</guid>
      <dc:creator>WoodyZ</dc:creator>
      <dc:date>2012-11-11T11:49:20Z</dc:date>
    </item>
  </channel>
</rss>

