Changes

Jump to: navigation, search
no edit summary
<table border="0" cellspacing="0" width="100%">
<tr>
<td width="20%">[[Command Line Management of VMware Virtual Disks|Previous]]<td align="center">[[VMware Server 2.0 Essentials|Table of Contents]]<td width="20%" align="right">[[Controlling VMware Virtual Machines from the Command Line with vmrun|Next]]</td>
<tr>
<td width="20%">Command Line Management of VMware Virtual Disks<td align="center"><td width="20%" align="right">Controlling VMware Virtual Machines from the Command Line with vmrun</td>
</table>
<hr>
 
 
<google>BUY_VMWARE_SERVER_2</google>
 
 
Whilst there has been much coverage of the advantages offered by virtualization solutions such as VMware Server, it is only relatively recently that attention has been given to the potential security risks associated with deploying such technology. Whilst the guest operating systems running in virtual machines are, arguably, no less vulnerable than those running on physical hardware (unless the underlying hypervisor itself is in some way compromised), unauthorized access to the virtualization management interface gives an intruder the ability to power off and even permanently delete mission critical systems and data.
1,798
edits

Navigation menu