I want to do something involving untrusted code and I’d prefer if each request was completely isolated. Would it be enough to stop then start the machine or should i completely destroy it?
This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.