Chapter 6. Solutions in this chapter:

  • How Should Network Access Be Limited?
  • Looking for Effects
  • Antivirtualization Techniques
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In the early 1990s viruses were prevalent. Their primary mode of transportation involved being executed by an unsuspecting user. The virus would then infect other similar files on the machine in hopes that one of these files would be copied to another unsuspecting user. The very operating system of the machine might also be altered in an attempt to continue to “infect” every file that the computer might come in contact with.

As computers got more sophisticated, so did the malware problem. Workgroup networks brought about viruses that could infect ...

Get Virtualization for Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.