Working on a theory in the usage and defense of Virtual Machines. It seems that since a virtual OS is isolated from the original computer, people have been using it to make a simple "Disposable" OS. Writing a virus to this type of setup is moot, due to the os simply being destroyed upon logout, and then remade whenever they wish it so.
The question is, has anyone found potential exploits to subvert the virtual OS and attack the original, so as to avoid the shield.
This is not a question as to the application of the virus, but to find potential holes within the usage so they may be blocked, I find it to be a nice challenge to look around to eh?
Whats your thoughts? Figured a way around it? Gimme your opinion.