The standard way to run known insecure software is to run it inside a virtual machine created specifically for it. Make a snapshot of the machine state before the first time you run the software. Then after you finish using the software restore the VM snapshot.
While that is not 100% secure (it's possible for virtual machines to have security bugs allowing code to escape the virtual machine) it does make it much harder for malicious code to cause any damage.
|