wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Linux -V Server Virtual Machine

profile
Priti Barot
Jul 11, 2023
0 Likes
0 Discussions
31 Reads

Linux-VServer is a jail mechansim in that it can be used to securely partition resources on a computer system (such as the file-system CPU time, network addresses and memory) in such a way that processes cannot mount a DDoS Attack on anything outside their partition.

Each partition is called a security context and the virtualized system within it is the virtual private server. A chroot like utility for descending into security contexts is provided. Booting a virtual private server is then simply a matter of kickstarting in it in a new security context; likewise, shutting it down simply entails killing all processes with that security context. The contexts themselves are robust enough to boot many Linux distribution unmodified, including Debian and Fedora.Virtual private servers are commonly used in web hosting services, where they are useful for segregating customer accounts, pooling resources and containing any potential security breaches. 

Virtual servers share the same system call interface and do not have any emulation overhead. Virtual servers do not have to be backed by opaque disk images, but can share a common file system and common sets of files (through copy-on-write hard links). This makes it easier to back up a system and to pool disk space amongst virtual servers. Networking is based on isolation rather than virtualization, so there is no additional overhead for packets.

Processes within the virtual server run as regular processes on the host system. This is somewhat more memory-efficient and I/O-efficient than whole-system emulation, although memory ballooning and modern VMs allow returning unused memory and sharing disk cache with the host and other virtual servers. Requires that the host kernel be patched. No clustering or process migration capability is included, so the host kernel and host computer is still a single point of failure for all virtual servers.


Comments ()


Sign in

Read Next

SECURITY TOOLS

Blog banner

Fashion marketing in india

Blog banner

Deadlock in operating system

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Riddhi Miyani 53003220140

Blog banner

Know your Processors!

Blog banner

The Right way of cooking

Blog banner

Deadlocks in operating system

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Wedding photographer

Blog banner

Technical SEO : Total Guide

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

What is Amazon?

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Blockchain in IoT Applications

Blog banner

Routers

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Beatbox

Blog banner

Types Of Interrupt

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Odoo

Blog banner

What is Email? Uses of Emails

Blog banner

Information Technology In E- Commerce

Blog banner

Types of Threads

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Virtual machine

Blog banner

Buffers in Operating Systems

Blog banner

File management

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

SNAPCHAT

Blog banner

INTRODUCTION

Blog banner

Business-to-Business

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Outlook mail

Blog banner

Precision-Recall in Data Science

Blog banner

5 Stages of Digital Marketing

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner