Chapter 8

Virtual Data Hiding

Information in this chapter:

ent Introduction

ent Hiding a Virtual Environment

ent A Review of Virtual Machines

Introduction

Corporations continue to enforce stricter rules and requirements on end user computers to deter infection by malware, viruses, Trojans, and undesired use. With the proliferation of virtual machines or virtual environments, users are becoming craftier in finding ways to use these virtual machines to access programs ...

Get Data Hiding now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.