Chapter 8
Virtual Data Hiding
Information in this chapter:
Introduction
Hiding a Virtual Environment
A Review of Virtual Machines
Introduction
Corporations continue to enforce stricter rules and requirements on end user computers to deter infection by malware, viruses, Trojans, and undesired use. With the proliferation of virtual machines or virtual environments, users are becoming craftier in finding ways to use these virtual machines to access programs ...
Get Data Hiding now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.