This article presented a set of pages to work with virtual machine images, running instances of those images, and the key pairs and security groups that allow you to manage them.
本文呈现一组页面以处理虚拟机映像,映像的运行实例,以及允许您管理实例的密匙对和安全组。
The security and administrative advantages are significant; for instance, there's simply no way for an attacker who's penetrated one virtual machine to affect another.
安全性和优势是很显著的;例如,渗透到一台虚拟机的攻击者根本没有办法影响另一台虚拟机。
In this paper, we identify eight application-level security architectures based on the following three elements: Virtual Machine, Control Set, and Distribution Style.
本文基于三个因素:虚拟机、控制集以及分发类型,把迄今为止的应用级安全结构分为八种。
Caution Enabling all Shared folders can pose a security risk because a Shared folder might enable existing programs inside the virtual machine to access the host file system without your knowledge.
注意:使用所有共享目录会暴露安全风险,因为共享目录可能会使虚拟机中的程序在你不知情的情况下存取主机文件系统。
Fault containment is proposed to construct a survivable kernel of the network security device based on the IBM virtual machine.
提出在IBM虚拟机器的架构上,使用错误围堵策略建立可生存的网络安全设备内核的思想。
The design of a script language and its virtual machine is explained in detail. The compiling and security test of the proofing rules are realized by the back-end system.
详细描述了脚本语言和脚本编译器的设计方法,在监控后台实现五防规则的编译和安全测试。
The design of a script language and its virtual machine is explained in detail. The compiling and security test of the proofing rules are realized by the back-end system.
详细描述了脚本语言和脚本编译器的设计方法,在监控后台实现五防规则的编译和安全测试。
应用推荐