For people that are interested, read this: link
Good find, I'll enjoy reading the rest of that tomorrow.
I've also found that running an AV product on the host protects the guests also, whether intentionally or not. For example, I started getting an FP on a certain file I use quite regularly (a DLL in GOM, for the record).
When I loaded up GOM in one of my VMs my host's AV fired up in the usual way and said the file was 'infected'. So it's clearly monitoring guest as well as host activity. Whether the vendor anticipated that or not, I don't know. But it doesThe false positive was rectified inside two hours of submission (way to go Avira!) BTW.
Correct me if I'm wrong, but that's really strange behaviour. That means the AV (which is just an application after all) is directly reading the memory allocated the to virtualised OS. Rather ironically this is a security risk in itself. What OS/VM software were you running?
Correct me if I'm wrong, but that's really strange behaviour. That means the AV (which is just an application after all) is directly reading the memory allocated the to virtualised OS. Rather ironically this is a security risk in itself. What OS/VM software were you running?
Short answer is yes, it is secure.
Not sure I agree.
Short answer might be it is slightly more secure but nothing is infallible.