> Certainly! That is not the point, however. The point is that users of OTHER > 'application domains' have better security with a VM (or one of the other > approaches discussed) because THEIR environment has no ability to interact
^^^^^^^^^ How do you know these 'VM' enviroments provide that gaurantee? You don't. You don't know, and you are not even qualified in the least to judge if they are able to gaurantee that. > with the OTHER environments. The digression into VM vs. separate machine > vs. compoud vulnerabilities is totally tangent to the original topic, and, > while educational, is certainly no longer productive at this time. > > I strongly suggest that we all retire with a lot of good information on > vulnerabilities and an agreement that there are different methods for > addressing security problems. You're just a system administrator who sells his services to gullible clients. Can you please stop talking like you know anything about how secure products are built or judged?