Running suspicious code more safely There are several things you can do to investigate suspicious code Pull the network cable out and Run under a debugger Run in a chroot jail Copy to a sacrificial system and run there Run in a VMWare or UML system