The description of Returnil Virtual System 2008 Personal - Play With New Friends
Returnil Virtual System Personal Edition’s powerful virtualization technology copies your system and lets you use the copy, sparing your real system from wear, harm and viruses. Try out different software, surf the web freely without any risks or consequences. With Returnil, only the copy of the system is used, which can be renewed at any time with a reboot. Slowing down effects of daily use and program (un)installations and even damage caused by viruses is permanently erased each time you perform a restart of your system.
Returnil virtualization technology does this by cloning the computer’s System Partition and starting up the system there instead of native Windows, allowing you to run your applications in a totally isolated environment. All activity, malicious or otherwise, will happen in the virtual environment, not in the real one. No program or process will ever be able to get to the real system, since it will have no way of knowing of its existence. If the virtual computer is attacked or gets infected, all you need to do to return to a normal state is to simply reboot, after which the system will be returned to its original state, as if nothing ever happened. And what’s best, you need not sacrifice computer performance or usability ever again, on the contrary, since the system can run in memory rather then hard disk, considerable performance gains are realized. Returnil reduces the need of technical support intervention and routine maintenance performed by any professional IT staff drastically.
Returnil is ideal in for home users that wish to keep their PC's integrity and security intact and not need to get a degree in computer science while doing so. Easy install and forget, no matter how many different members of the family are using the computer, Returnil will ensure that all have access to a new, clean system with each restart. Not only a guarantee of system integrity, Returnil is also your last line of defense against viruses, trojans and malware.