You're replying to a comment by jang.

jang Permalink
December 02, 2010, 14:23

He can assume because it's his virtual machine, so he controls the OS and the folder location expected. That said I would probably use system states to reset everything, I presume it's more secure because even if the virtual machine is hacked, the vulnerability will stay, but any rogue software is wiped.

Reply To This Comment

(why do I need your e-mail?)

(Your twitter name, if you have one. (I'm @pkrumins, btw.))

Type the first letter of your name: (just to make sure you're a human)

Please preview the comment before submitting to make sure it's OK.