←back to thread

535 points raddad | 3 comments | | HN request time: 1.002s | source
Show context
FLGMwt ◴[] No.11388514[source]
Would anyone be able to give insight on why this would be useful? Im curious, sure, but I'm at a loss to think of a use case.
replies(12): >>11388600 #>>11388608 #>>11388634 #>>11388642 #>>11388665 #>>11388706 #>>11388760 #>>11388822 #>>11388945 #>>11389018 #>>11389918 #>>11391075 #
1. joezydeco ◴[] No.11389918[source]
My office IT will only allow and manage Windows PCs on directory server. So I need to run VirtualBox everywhere to develop in Linux. If I could cut that step out, that wouldn't be a bad thing.
replies(1): >>11416884 #
2. JdeBP ◴[] No.11416884[source]
You'd almost certainly be in for a nasty shock.

IT departments not worrying much about what you do as the superuser inside a virtual machine that is running only with your user credentials, is one thing. But tell them that you're now going to be installing and running random Ubuntu softwares, not in a virtual machine but natively within Windows, and they will prick up their ears and start to take notice. Even the ones who are alright about what's being installed will want to think about things like control over what packages can be installed and locally-hosted repositories. "So, tell me how I set group policy for your apt-get installer?"

And if that is not a worry, let me relate some personal experience of using the Windows NT POSIX subsystem. Anti-virus programs, particularly the ones with the whizz-o features of "let's check what 'the crowd' said about this program" or "let's run this program for a little bit in my controlled execution environment to see whether it does malware-type things", don't like this a lot. I had to go through the unblocking of "/bin/foo is a rare program" so often, for everything from "ls" to "ftp", that it was in danger of becoming an automatic reflex.

Goodness knows what the likes of DeepGuard will make of programs that use a wholly new set of system call entrypoints into the kernel. (-:

replies(1): >>11422251 #
3. joezydeco ◴[] No.11422251[source]
Very good point. Looks like I'm sticking with Virtualbox. =)