wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Linux -V Server Virtual Machine

profile
Priti Barot
Jul 11, 2023
0 Likes
0 Discussions
31 Reads

Linux-VServer is a jail mechansim in that it can be used to securely partition resources on a computer system (such as the file-system CPU time, network addresses and memory) in such a way that processes cannot mount a DDoS Attack on anything outside their partition.

Each partition is called a security context and the virtualized system within it is the virtual private server. A chroot like utility for descending into security contexts is provided. Booting a virtual private server is then simply a matter of kickstarting in it in a new security context; likewise, shutting it down simply entails killing all processes with that security context. The contexts themselves are robust enough to boot many Linux distribution unmodified, including Debian and Fedora.Virtual private servers are commonly used in web hosting services, where they are useful for segregating customer accounts, pooling resources and containing any potential security breaches. 

Virtual servers share the same system call interface and do not have any emulation overhead. Virtual servers do not have to be backed by opaque disk images, but can share a common file system and common sets of files (through copy-on-write hard links). This makes it easier to back up a system and to pool disk space amongst virtual servers. Networking is based on isolation rather than virtualization, so there is no additional overhead for packets.

Processes within the virtual server run as regular processes on the host system. This is somewhat more memory-efficient and I/O-efficient than whole-system emulation, although memory ballooning and modern VMs allow returning unused memory and sharing disk cache with the host and other virtual servers. Requires that the host kernel be patched. No clustering or process migration capability is included, so the host kernel and host computer is still a single point of failure for all virtual servers.


Comments ()


Sign in

Read Next

City of Mumbai (Bombay):

Blog banner

Modern Operating System

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Kafka - A Framework

Blog banner

Types Of Interrupt

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Understanding - Proof of Work!

Blog banner

Why Friendship at Work is Important

Blog banner

What is OS Fingerprinting?

Blog banner

Emerging threats in cyber Forensics

Blog banner

PPT methodology

Blog banner

Deadlock

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

IoT Architecture Based Security

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

VIRUS

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

INTERNET SECURITY

Blog banner

geographic information system (GIS)

Blog banner

Microsoft Windows Overview

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Network Forensics Tools and Techniques

Blog banner

Linux 94

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Raid and levels of raid.

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

BIRYANI ! The history you never knew about

Blog banner

E-mail security

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Memory Management

Blog banner

Network Forensics

Blog banner

Information Technology In E- Commerce

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Memory Management

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

On-Page SEO

Blog banner

How can parents support a child’s mental health?

Blog banner

Data Exfiltration

Blog banner

WomenEmpowerment

Blog banner