Technical White Paper: Running Applications Under CrossOver: An Analysis of Security Risks
|
|
|
- Solomon Potter
- 9 years ago
- Views:
Transcription
1 Technical White Paper: Running Applications Under CrossOver: An Analysis of Security Risks
2 Wine, Viruses, and Methods of Achieving Security Running Windows software via CrossOver is, on average, much safer than running them under Windows Overview: Wine is a Windows compatibility technology that allows a wide variety of Windows software to run as-if-natively on Unix-based operating systems like Linux and Mac OS X. From a theoretical standpoint, Wine should also enable malware and viruses to run, thereby (unfortunately) exposing Wine users to these same hazards. However, CrossOver (based on Wine) also incorporates security features that bring this risk down to almost zero. This White Paper examines the reasons behind the enhanced safety that CrossOver provides. With the increasing popularity of running Windows software on Linux and Mac OS X via compatibility solutions such as Wine, VMWare, and Parallels, users have been able to enjoy a degree of computing freedom heretofore unseen. Yet with that freedom has come peril. As many VMWare and Parallels users have discovered, running applications like Outlook and IE under those PC emulation solutions also opens up their machine to the same viruses and malware they faced under Windows. Indeed, one of the first things any VMWare or Parallels customer should do upon is install a commercial anti-virus package. Failure to do so can result in a host of dire consequences for their Windows partition, just as it would if they were running a Windows PC. Not surprisingly, a question we sometimes hear is whether or not Wine exposes users to the same level of risk. The short answer is: in theory, perhaps; in practice, no. That is, a virus could theoretically infect a Unix-based system (either Mac OS X or Linux) running a Windows program, but it would require an extremely unlikely scenario for that to happen. To our knowledge, it has never happened. As a result, we maintain that it is far safer running Windows software under CrossOver than it is running them under Windows. Why is this? The answer lies in both the superior security of Unix-based operating systems, which makes it extremely difficult for viruses to run, as well as active steps we have taken to make CrossOver more secure. Page 2 of 5
3 Viruses vs. Unix-based Operating Systems Windows viruses take advantage of specific chinks in the armor of Windows. Those same vulnerabilities largely do not exist under Unixbased operating systems. A Wine user s first line of defense against viruses is that they simply don t run under Wine. Why is this? After all, in theory, programs that are vulnerable to virii such as Outlook and Internet Explorer will retain those same vulnerabilities when running via CrossOver. And if a Windows virus exploits a weakness in Internet Explorer which allows it to upload code into memory and cause that code to start execution, then that same weakness will theoretically exist under Wine as well. Yet, again, in practice we have never run into a single instance of this happening. On the face of it, this seems incredible. Wine, after all is designed to be a general-purpose Windows compatability solution. And while it doesn t run all Windows software yet, it does run a respectable percentage of them. It would seem reasonable to assume that at least some Windows viruses would run as well. Why don t they? The answer has to do with the specific nature of malware applications, and how they interact with their target operating systems. When you are running an application under CrossOver, CrossOver serves as the intermediary between the application and the operating system. Wine is constantly taking in requests from the application for services, via the Win32 API (which is Wine) and then translating those Windows requests into something intelligible by the target OS (Linux or Mac OS X). Under normal circumstances, Wine processes these requests seamlessly, and the target OS satisfies the needs of the program. By their very nature, though, Windows viruses are built to take advantage of specific security holes in Windows. They rely upon a very exact operating system configuration, and use certain Windows-specific commands to do their dirty work. What happens when a piece of Windows malware tries doing that under CrossOver, though, is two-fold. First off, the vast majority of the time the executable just doesn t run. But even more important, the chinks in the armor of Windows that the malware is trying to address typically make no sense to a Unix-based OS. In most cases, the particular weakness the virus is going after probably doesn t even exist in Unix. Could a virus be written that would work under Wine? Again, theoretically yes. But writing a virus to attack, say, a Mac via CrossOver would require that 1) it went after specific security flaws in the Mac OS, but also 2) ran as a Windows executable, that 3) also ran flawlessly under CrossOver. That s a very tough bill to fill. This is not to say that it wouldn t be theoretically possible to do, but in practice it s very, very difficult. Even if such a virus were crafted, it would still be constrained by the Unix system as to the damage it could do. Since CrossOver is Page 3 of 5
4 meant to be run by a regular user, the user is protected by Unix s security system. A Windows virus would generally only know of the Windows file systems (which under CrossOver is confined to a virtual C: drive located in two separate directories under the user s home directory.) If the C: drive were somehow to get infected, that infection would find it very difficult to get into either the user s other directories, or into the root file space. A reminder to our customers: you re only vulnerable if you run vulnerable applications. We strongly advocate the usage of Firefox except for those sites that absolutely require Internet Explorer. Even better, your personal data (your documents, videos, etc.) need not reside on Wine s virtual C: drive at all. After all, one of the benefits that Wine provides is being able to use the native file system of the host computer, meaning that your personal data most likely won t be stored on the virtual C: drive in any case it will be located whereever you normally put your document files under, say, OS X. Disinfecting a Wine C: drive is extremely easy, too. Simply deleting the pair of CrossOver directories housing the C: drive destroys the infection completely. CrossOver s Interaction with other Security Software The second major line of defense for any CrossOver customer is that CodeWeavers has taken active steps to enhance Wine s security by providing CrossOver with number of mechanisms to either interact with other security applications, or to detect and disallow the running of any questionable code. First of all, CrossOver allows a system administrator to install all the Outlook service packs and updates that s/he would normally install as part of a rigorous approach to Windows security. In other words, CrossOver gives a user access to all the tools that Microsoft provides to ensure the security of its own products. A second facility that CrossOver provides is the ability to interact with local and server-based anti-virus software. Just as a Windows user can have their checked by commercial anti-virus software, so too CrossOver has the necessary hooks to allow Outlook to be monitored by, say, a Linux-based antivirus package. Thus, CrossOver replicates all the facilities that a Windows user has to protect themselves. However, because of the power of Unix, we can actually take this several steps further. By default, CrossOver will have any item placed in the system s temporary directories scanned (which is typically where attachments are placed before they are opened). However, a third facility CrossOver has is the optional ability to require scanning of any item that is opened. Thus, CrossOver provides a facility that Windows itself does not provide the ability to force a scan of any/all items at the user s discretion. Page 4 of 5
5 CrossOver allows the creation of tailored security environments that, at their most rigorous, are practically unassailable. A fourth and final facility that CrossOver customers can take advantage of is using CrossOver s Managed Multi-user Mode and running applications in a chroot jail. Under this mode of operation, all Windows applications are installed into a readonly area on the drive. This read-only area is temporary, and is erased prior to every invocation of the application in question. This mode of operation absolutely guarantees that no virus could harm anything outside of the jail. We don t actually recommend this approach because we don t feel its necessary and it makes working with files awkward. However, this is an absolutely safe method for those customers that are genuinely concerned about the possibility of viruses. Finally, we remind our customers that you re only vulnerable if you run vulnerable applications. Internet Explorer is a magnet for malware. As a result, we advocate that users switch to Firefox whenever possible, and only use IE for sites where Firefox simply does not work (which is becoming increasingly less common in any case.) Outlook, of course, is the other prevalent source of incoming viruses. However under CrossOver, Outlook is prevented from running files with typical virus file formats. This is an outstanding example of customizing an open-source technology in the best interests of the user. Normal Windows won t prevent users from doing this sort of thing, but since actual users control the development of Wine, it has been crafted in such a way as to prevent virus and malware attacks. To summarize: Running Internet Explorer and/or Outlook under CrossOver is not only safe, it is more safe than running those same applications under Windows. Using CrossOver presents viruses and malware with an OS target that is very difficult to attack in the first place. So difficult, in fact, that we know of no case where a virus has actually run under Wine. But CrossOver also provides additional facilities that raise the bar still further, and in a user-configurable fashion. CrossOver allows its users to establish whatever level of security they desire. Indeed, for those customers with very high security needs, the special hooks inside CrossOver allow for the creation of customized, secure work environments that are practically unassailable something that no Windows solution can provide. Page 5 of 5
A Semi-Technical White Paper: An Introduction to Wine
A Semi-Technical White Paper: An Introduction to Wine Wine: An Introduction Using Wine offers the best of both worlds being able to run the applications you want on the operating system you want. Overview:
REVIEWER S GUIDE TO CROSSOVER
REVIEWER S GUIDE TO CROSSOVER 700 Raymond Avenue, Suite 120 St. Paul, MN 55114 http://www.codeweavers.com INTRODUCTION CrossOver is a Windows compatibility tool that allows Mac and Linux users to run their
CrossOver Compared to Competing Emulation Solutions
CrossOver Compared to Competing Emulation Solutions CrossOver Compared to Competing Emulation Solutions Every Windows compatibility solution has pros and cons. Overview: Whether you re running a Linux
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Using Windows Update for Windows Me
Using Windows Update for Windows Me Contents Introduction... 1 Before You Begin... 2 Downloading and Installing the Windows Update Components... 2 Maintaining a Secure Computing Environment... 6 Introduction
Malware: Malicious Code
Malware: Malicious Code UIC 594/Kent Law: Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations 2007, 2008 Robert H. Sloan Malicious code: Viruses Most famous type of
IQware's Approach to Software and IT security Issues
IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.
Comparing Virtualization Technologies
CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational
Performance Optimization Guide
Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.
Using Windows Update for Windows XP
Using Windows Update for Windows XP Introduction This document provides instructions on updating Windows XP with the necessary patches. It is very important to update your operating system software in
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Chapter 2 Installing ShareScope
What you will learn in this chapter: Minimum hardware requirements. How to run ShareScope on a Mac. Where to find your account number & password. How to download the ShareScope software. How to install
TIME TO LIVE ON THE NETWORK
TIME TO LIVE ON THE NETWORK Executive Summary This experiment tests to see how well commonly used computer platforms withstand Internet attacks in the wild. The experiment quantifies the amount of time
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Speeding up a Slow SuperSalon PC
Speeding up a Slow SuperSalon PC Inevitably, a computer will slow down in operation when an improper maintenance and/or set up is a factor. And unfortunately, most salon staff do not double as IT personnel.
Virtual Hosting & Virtual Machines
& Virtual Machines Coleman Kane [email protected] September 2, 2014 Cyber Defense Overview / Machines 1 / 17 Similar to the network partitioning schemes described previously, there exist a menu of options
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
What is virtualization
Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10
Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 4 System Software: The Operating System, Utility Programs, and File Management. Chapter Topics
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Code Injection From the Hypervisor: Removing the need for in-guest agents. Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs
Code Injection From the Hypervisor: Removing the need for in-guest agents Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs SADE: SteAlthy Deployment and Execution Introduction
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Discovering Computers
Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
Building Docker Cloud Services with Virtuozzo
Building Docker Cloud Services with Virtuozzo Improving security and performance of application containers services in the cloud EXECUTIVE SUMMARY Application containers, and Docker in particular, are
Operating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first
Operating Systems Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first JavaScript interpreter Web browser menu / icon / dock??? login??? CPU,
Quick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
SPYWARE & MALWARE. ComputerFixed.co.uk Page: 1 Email: [email protected]. How do you get infected? Will Anti-virus software protect me?
ComputerFixed.co.uk Page: 1 Email: [email protected] SPYWARE & MALWARE How do you get infected? You can get infected by malware (malicious Software) in several ways. Malware often comes bundled
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Samsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
What's the difference between spyware and a virus? What is Scareware?
What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials
The BackTrack Successor
SCENARIOS Kali Linux The BackTrack Successor On March 13, Kali, a complete rebuild of BackTrack Linux, has been released. It has been constructed on Debian and is FHS (Filesystem Hierarchy Standard) complaint.
THE SECURITY EXPOSURE
Secunia Whitepaper - February 2010 THE SECURITY EXPOSURE OF SOFTWARE PORTFOLIOS An empirical analysis of the patching challenge faced by the average private user In this paper, we examine the software
InterWorx Clustering Guide. by InterWorx LLC
InterWorx Clustering Guide by InterWorx LLC Contents 1 What Is Clustering? 3 1.1 What Does Clustering Do? What Doesn t It Do?............................ 3 1.2 Why Cluster?...............................................
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Understanding Virus Behavior in 32-bit Operating Environments
Understanding Virus Behavior in 32-bit Operating Environments Executive Summary Computer Viruses and How They Spread Types of Viruses How Viruses Spread Virus Damage Viruses in a Windows 95 Environment
WINDOWS UPDATES AND MAJOR BUILDS
WINDOWS UPDATES AND MAJOR BUILDS Updates install automatically, and you can t pick and choose Another big change with Window 10 is that there will be automatic updates, so there s less chance of you missing
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Outline: Operating Systems
Outline: Operating Systems What is an OS OS Functions Multitasking Virtual Memory File Systems Window systems PC Operating System Wars: Windows vs. Linux 1 Operating System provides a way to boot (start)
RecoverIt Frequently Asked Questions
RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with
Information Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives
Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science [email protected] 1 Reminders After
Table of Contents Getting Started... 3 The Motors... 4 The Control Board... 5 Setting up the Computer with Mach3... 6 Starting up the Equipment...
User Manual Table of Contents Getting Started... 3 The Motors... 4 The Control Board... 5 Setting up the Computer with Mach3... 6 Starting up the Equipment... 12 G-Code Example... 13 2 Getting Started
Popular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of
Meeting Workspace Alternatives
Meeting Workspace Alternatives Three Solutions for SharePoint and SharePoint Online MARK ECKERT AND EARON SOTTO Contents Introduction... 1 Benefits and Configuration Examples of the Meeting Workspace in
4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
PC Power Management FAQ
PC Power Management FAQ What is Verismic Power Manager? Verismic Power Manager is a powerful web- based PC Power Management Software that enables people to benefit from the carbon and energy savings that
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
Using Virtual PC 7.0 for Mac with GalleryPro
Using Virtual PC 7.0 for Mac with GalleryPro Installing and Configuring What is Virtual PC for Mac? Virtual PC (VPC) is emulation software that simulates an actual (though virtual) Windows computer running
WHITE PAPER. Be Active about Passives! Why Corporations need to rethink how they recruit for executive and strategic roles
WHITE PAPER Be Active about Passives! Why Corporations need to rethink how they recruit for executive and strategic roles Published by Dillistone Systems September 2015 Introduction Today, passive candidate
BitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
1/5/2013. Technology in Action
0 1 2 3 4 5 6 Technology in Action Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management Chapter Topics System software basics Types of operating systems What the
White Paper - Crypto Virus. A guide to protecting your IT
White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra
Delphi 9.5.3 System Requirements
Market Intelligence Enterprise Business Management Sales & Catering Distribution & Content Delphi 9.5.3 System Requirements Revision 1.3 November 1, 2011 Delphi 9.5.3 System Requirements Users Server Hardware
Working with your NTU email off campus
Working with your NTU email off campus When you are working on a laptop or at home you can access your email via a number of methods. Using Outlook Web Access or NOW, you can access your email via any
Whitepaper: Cloud Computing for Credit Unions
Whitepaper: Cloud Computing for Credit Unions A new twist on an old strategy MYCU SERVICES December 29, 2011 Authored by: Lingle, Linda Table of Contents Introduction... 2 Cloud Providers... 3 Cloud Components...
Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh
Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh Introduction History, Advantages, Common Uses OS-Level Virtualization Hypervisors Type 1 vs. type 2 hypervisors
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
Windows Server 2008 and BackupAssist
Windows Server 2008 and BackupAssist WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. Labs 2001-2007 Windows Server 2008 and BackupAssist 2 Contents Introduction... 2 Advantages and disadvantages
RJS Software Systems Inc AS/400 Report Delivery System
AS/400 Report Delivery System Introduction This document is designed to help our customers and future customers learn more about RJS Software Systems and the RJS AS/400 Report Delivery System. The document
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
How to prevent computer viruses in 10 steps
How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
USB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
WINDOWS AZURE EXECUTION MODELS
WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,
Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010
W H I T E P A P E R : T E C H N I C A L S E C U R I T Y S O L U T I O N S Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper Updated 7/20/2010 White Paper: Symantec
VMware Virtualization and Software Development
VMware Virtualization and Software Development 1 VMware Virtualization and Software Development Mark Cloutier Undergraduate Student, Applied Math and Computer Science Keywords: Virtualization, VMware,
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches, refer to http://www.trendmicro.com/download/product.asp?productid=5 Enable
Patch management with WinReporter and RemoteExec
White Paper Patch management with WinReporter and RemoteExec This white paper provides an overview on how to use WinReporter and RemoteExec in conjunction to keep Windows systems updated and immune to
Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test
Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security
Intrusion Detection Systems. Darren R. Davis Student Computing Labs
Intrusion Detection Systems Darren R. Davis Student Computing Labs Overview Intrusion Detection What is it? Why do I need it? How do I do it? Intrusion Detection Software Network based Host based Intrusion
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY
VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size
