wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Linux -V Server Virtual Machine

profile
Priti Barot
Jul 11, 2023
0 Likes
0 Discussions
31 Reads

Linux-VServer is a jail mechansim in that it can be used to securely partition resources on a computer system (such as the file-system CPU time, network addresses and memory) in such a way that processes cannot mount a DDoS Attack on anything outside their partition.

Each partition is called a security context and the virtualized system within it is the virtual private server. A chroot like utility for descending into security contexts is provided. Booting a virtual private server is then simply a matter of kickstarting in it in a new security context; likewise, shutting it down simply entails killing all processes with that security context. The contexts themselves are robust enough to boot many Linux distribution unmodified, including Debian and Fedora.Virtual private servers are commonly used in web hosting services, where they are useful for segregating customer accounts, pooling resources and containing any potential security breaches. 

Virtual servers share the same system call interface and do not have any emulation overhead. Virtual servers do not have to be backed by opaque disk images, but can share a common file system and common sets of files (through copy-on-write hard links). This makes it easier to back up a system and to pool disk space amongst virtual servers. Networking is based on isolation rather than virtualization, so there is no additional overhead for packets.

Processes within the virtual server run as regular processes on the host system. This is somewhat more memory-efficient and I/O-efficient than whole-system emulation, although memory ballooning and modern VMs allow returning unused memory and sharing disk cache with the host and other virtual servers. Requires that the host kernel be patched. No clustering or process migration capability is included, so the host kernel and host computer is still a single point of failure for all virtual servers.


Comments ()


Sign in

Read Next

virtual memory

Blog banner

Dos (Denial of service) Attack

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Pandas Matrix Applications

Blog banner

COMMUNICATION

Blog banner

Crypto tax evasion

Blog banner

WINDOWS I/ O

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Data Analytics in Data Science

Blog banner

Session Vulnerabilities

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Defining youtubr

Blog banner

Random Forests

Blog banner

Landslide Hazard

Blog banner

Fitness regime by Deepesh

Blog banner

From Model Mistakes to Metrics

Blog banner

semaphores

Blog banner

What is Packet Filtering?

Blog banner

Wedding photographer

Blog banner

Segmentation and paging concept

Blog banner

Understanding Mobile Device Forensics

Blog banner

Monday. com App

Blog banner

Operating system

Blog banner

How to use GIT & GITHUB

Blog banner

What if COVID does not exist!

Blog banner

Mumbai Metro 3

Blog banner

Data Warehouse Bus Matrix

Blog banner

Memory Management

Blog banner

10 Reasons to date your best friend

Blog banner

Internet of Things and cyber security

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Hacking

Blog banner

Memory management

Blog banner

Place to visit in pune

Blog banner

Im Photographer

Blog banner

Spotify

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Rain

Blog banner

Multiprocessor and Multicore Organization

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner