I want to do something involving untrusted code and I’d prefer if each request was completely isolated. Would it be enough to stop then start the machine or should i completely destroy it?
(reposted from Is restarting a machine enough to ensure isolation between requests? , as I would also very much like to have an answer to this.)