I'll buy a separate computer then for that purpose.
Thanks.
why not use a virtual machine?
1. because there are ways to break out of Virtual Machines (VMs)?
2. if you get root access to the guest, it is usually pretty trivial to detect if it is a VM, especially if it is Windows based or otherwise has guest addons installed?
3. if it is on the same network as computers you care about, the VM could launch an attack on computers you do care about from within the network?
I don't know much about hacking, but those would be my guesses