Chapter 13. Protection in Untrusted Environments
Solutions in this chapter:
- Using Virtual Machines to Segregate Data
- Using Virtual Machines to Run Software You Don't Trust
- Using Virtual Machines for Users You Don't Trust
- Summary
- Solutions Fast Track
- Frequently Asked Questions
Introduction
One great use of virtual machines is to provide the architecture to give someone access to a machine that can be used in an untrusted environment. Imagine one of your grandparents surfing the web. They enter a URL and make a typing mistake. They are confronted with a pop up message telling them that they have a virus and need to click on a link to fix it. How many of them would resist doing just that? There are obviously ways to prevent damaging the server and ...
Get Virtualization for Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.