Chapter 8

Virtual Data Hiding

Information in this chapter:

ent Introduction

ent Hiding a Virtual Environment

ent A Review of Virtual Machines

Introduction

Corporations continue to enforce stricter rules and requirements on end user computers to deter infection by malware, viruses, Trojans, and undesired use. With the proliferation of virtual machines or virtual environments, users are becoming craftier in finding ways to use these virtual machines to access programs ...

Get Data Hiding now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.