Once upon a time, the Book of Faces was hacked. Afterwards, Burger King’s Twitter account was broken into. Pretty soon, several computers at Apple HQ were attacked by a Java exploit. In the end, it turned out that everything pointed to an iPhone SDK message board (that didn’t know it was rigged with malware).
And then I thought…what if I needed to look at a site that I wasn’t sure was booby-trapped? Then I thought, ‘oho! I could set up a virtual machine that I can view the site on. If the site does turn out to be infested and ruins the VM, I can just close it and restore it to the snapshot pre-infestation.’
(more…)