Is restarting a machine enough to ensure isolation between requests?

I want to do something involving untrusted code and I’d prefer if each request was completely isolated. Would it be enough to stop then start the machine or should i completely destroy it?


This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.