The advantage of this method is that it will protect all your data from being accessed by potentially rogue software, assuming that you're using a separate/clean disk or other partitions are not mounted. The ultimate approach would be to install a throwaway OS just for this purpose.Your original disk stays untouched the entire time. Once you're done just repartition & format the clone. If you have a second internal disk of at least the same size and without anything important on it, you can clone the system disk to that one, swap them and install the software on the cloned disk. make sure you have an independent copy on another media. This will undo everything that happened on that disk in the meantime, including changes in user files, so if you're using a password manager etc. You can take a full disk image (or OS partition image) to an external drive before installing software in question and restore the image later. They can take up a (probably insignificant) amount of disk space, but they won't make a difference security- and privacy-wise. can remain after this, as System Restore is preserving user files and only restoring executables to the earlier state, but without anything to make use of them these files will be harmless. Some configuration and temporary files etc. The "probably good enough" approach would be to make a System Restore point before installing the software and rollback to it later.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |