It is a good tutorial, but I think the super simple way to do this these days is to use Whonix. They make preconfigured VirtualBox images so all you have to do is File -> Import Appliance for each image, then start the Gateway and Workstation. All the hardware parameters are configured for you, and Whonix isolates Tor from the main OS, so you can download the potentially malicious files over Tor directly to the Workstation and not worry about disabling networking or shared folders (which can be a security threat in themselves). Everything can be done relatively safely with a default Whonix configuration. And if you want disposable VMs, it's simpler and easier to delete and reimport the Workstation after each use, then to go through a full distro installation. I can import the Workstation in like a minute, so I can destroy and create fresh VMs all day with little annoyance or work involved. Alternatively, you could boot Tails in a VM, which is a truly disposable VM, because nothing is ever installed or saved to disk, and you get a fresh VM each time you boot it with zero work, but it's slightly less safe than Whonix, since Tor runs in the same VM as the potentially malicious files. An even cooler thing is that you can use the Whonix Gateway with any OS, so you could install Lubuntu or any distro, like in pine's tutorial, but change the networking to work with the Whonix Gateway. Once you have everything configured with all the apps that you might need, you export it as an appliance, so you you can destroy and recreate that VM with minimal effort, and you get the safety of the Whonix Gateway with the comfort and convenience of your own distro (the Workstation is kind of crappy, tbh).