wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Linux -V Server Virtual Machine

profile
Priti Barot
Jul 11, 2023
0 Likes
0 Discussions
31 Reads

Linux-VServer is a jail mechansim in that it can be used to securely partition resources on a computer system (such as the file-system CPU time, network addresses and memory) in such a way that processes cannot mount a DDoS Attack on anything outside their partition.

Each partition is called a security context and the virtualized system within it is the virtual private server. A chroot like utility for descending into security contexts is provided. Booting a virtual private server is then simply a matter of kickstarting in it in a new security context; likewise, shutting it down simply entails killing all processes with that security context. The contexts themselves are robust enough to boot many Linux distribution unmodified, including Debian and Fedora.Virtual private servers are commonly used in web hosting services, where they are useful for segregating customer accounts, pooling resources and containing any potential security breaches. 

Virtual servers share the same system call interface and do not have any emulation overhead. Virtual servers do not have to be backed by opaque disk images, but can share a common file system and common sets of files (through copy-on-write hard links). This makes it easier to back up a system and to pool disk space amongst virtual servers. Networking is based on isolation rather than virtualization, so there is no additional overhead for packets.

Processes within the virtual server run as regular processes on the host system. This is somewhat more memory-efficient and I/O-efficient than whole-system emulation, although memory ballooning and modern VMs allow returning unused memory and sharing disk cache with the host and other virtual servers. Requires that the host kernel be patched. No clustering or process migration capability is included, so the host kernel and host computer is still a single point of failure for all virtual servers.


Comments ()


Sign in

Read Next

On-Page SEO

Blog banner

Number Guessing game --lisp

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Cache Memory in Operating Systems

Blog banner

Access management

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Music helps reduce stress

Blog banner

Uniprocessor and Types

Blog banner

Computer security techniques

Blog banner

Importance Of Yoga.

Blog banner

Fashion marketing in india

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Deadlock and Starvation

Blog banner

Domain Name System

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Online Education

Blog banner

What is Email? Uses of Emails

Blog banner

Mumbai Metro 3

Blog banner

Decision Tree: A Diagram Model

Blog banner

Service Design Model

Blog banner

Importance of self defence for girls

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Big O Notation

Blog banner

GIS Mapping

Blog banner

The functions of operating system

Blog banner

Memory Management

Blog banner

Risk management in IT

Blog banner

Types Of scheduling

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

HTML vs HTML5

Blog banner

E-Cash (Electronic Cash)

Blog banner

How to Run your First android App

Blog banner

Deadlocks

Blog banner

IT service level agreement

Blog banner

Confidence Building Activities for the New School Year

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

10 Survival Tips that might save your life

Blog banner

Life lesson

Blog banner

Direct Memory Access

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

The Future of Web Development in 2026: Trends Every Business Must Know

Blog banner