5 of 5Image
Each person in the main AFCC control room has two virtual computers, which they access through thin client devices seen here.
One thin client device is described as the "dirty computer", and is used to visit phishing websites or those infected with Trojans.
The second virtual machine is used to access email, word processors and other corporate applications.
Once a member of staff completes their shift the virtual "dirty" machine will be wiped and a new virtual machine is created to carry out inspections of other compromised sites.
Photo credit: Nick Heath/silicon.com