wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Linux -V Server Virtual Machine

profile
Priti Barot
Jul 11, 2023
0 Likes
0 Discussions
31 Reads

Linux-VServer is a jail mechansim in that it can be used to securely partition resources on a computer system (such as the file-system CPU time, network addresses and memory) in such a way that processes cannot mount a DDoS Attack on anything outside their partition.

Each partition is called a security context and the virtualized system within it is the virtual private server. A chroot like utility for descending into security contexts is provided. Booting a virtual private server is then simply a matter of kickstarting in it in a new security context; likewise, shutting it down simply entails killing all processes with that security context. The contexts themselves are robust enough to boot many Linux distribution unmodified, including Debian and Fedora.Virtual private servers are commonly used in web hosting services, where they are useful for segregating customer accounts, pooling resources and containing any potential security breaches. 

Virtual servers share the same system call interface and do not have any emulation overhead. Virtual servers do not have to be backed by opaque disk images, but can share a common file system and common sets of files (through copy-on-write hard links). This makes it easier to back up a system and to pool disk space amongst virtual servers. Networking is based on isolation rather than virtualization, so there is no additional overhead for packets.

Processes within the virtual server run as regular processes on the host system. This is somewhat more memory-efficient and I/O-efficient than whole-system emulation, although memory ballooning and modern VMs allow returning unused memory and sharing disk cache with the host and other virtual servers. Requires that the host kernel be patched. No clustering or process migration capability is included, so the host kernel and host computer is still a single point of failure for all virtual servers.


Comments ()


Sign in

Read Next

Man VS Nature

Blog banner

Ubiquitous Computing

Blog banner

An Overview of Virtual Machines

Blog banner

A BLOG ON MYSQL

Blog banner

BUFFER OVERFLOW_142

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Python as a tool for data analysis

Blog banner

Microsoft Word

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Virtual Machine

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Blockchain uses and use cases

Blog banner

MENDELEY

Blog banner

Incident management in ITSM

Blog banner

Ethical Hacking

Blog banner

Artical on FreshBooks

Blog banner

De-Coding Love

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Starvation

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Routers

Blog banner

Optimization of operating system design

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Mariana Trench: The deepest depths

Blog banner

Memory management

Blog banner

Starvation

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

The Five Steps of Data Science

Blog banner

E-security systems | CCTV

Blog banner

Python as a tool for Data science task & project

Blog banner

Deadlock

Blog banner

Process Creation

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

The Peephole

Blog banner

ONLINE NEWSROOMS

Blog banner

Understanding - Proof of Work!

Blog banner

Blog on Smartsheet.

Blog banner

Be you

Blog banner

Google App Engine

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Mumbaicha Dabbawalla

Blog banner

File Allocation Methods

Blog banner