• The flaw, which affected the virtual machine monitor (VMM) in Virtual PC, could enable an attacker to use applications running in user-space on a guest OS to access portions of the Virtual PC memory that should be inaccessible to those applications.

    FORBES: How Bad Assumptions Are Making Software Less Secure

  • For those tracking the growing malicious elements on the Web, Chrome's innovation--and GreenBorder's contribution to the open-source browser--is a technology known as "sandboxing, " a tactic that limits Web applications' access to a computer's memory beyond a virtual border.

    FORBES: The Web's Edge

  • Flash memory offers fast ways to cache and serve up digital content to support high usage virtual machine environments.

    FORBES: VM World is a Flashy Place

  • Gamers cannot customise consoles, but they can, and do, upgrade their PCs regularly with faster processors, graphics cards, extra memory, and anything else that will give them an edge over their opponents on the virtual field of honour.

    ECONOMIST: Are video-gamers heading for the big money?

  • Techniques such as extracting operating parameters, comparing application profiles across VMs (to look for signs that one has been successfully attacked), and analyzing application behavior in memory (as opposed to just code stored on disk) are far easier in a virtual environment and provide a huge advantage for stopping the most sophisticated threats.

    FORBES: Best of Times, Worst of Times: Is Virtualization in the Data Center a Problem or an Opportunity?

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定