Questions tagged [virtualization]
Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.
498 questions
1vote
1answer
115views
How to securely build code from the internet on my servers?
I need to create a build server which will clone code from GitHub (npm repositories) and then build an OCI image using Buildpack or Nixpack. I am currently researching how to achieve this securely ...
0votes
0answers
112views
The security of different virtualization systems, specifically comparing Qubes hypervisor with separation kernels like INTEGRITY-178B and LynxSecure
I've often heard that Qubes is considered one of the most secure virtualization options because it uses a small Xen hypervisor, which is only about 150KB in size. However, even Qubes isn't immune to ...
1vote
0answers
89views
What is the difference between enhanced container isolation projects like runq, Kata Containers, Firecracker and gVisor?
I'm diving into different solutions to use (virtual machine based) isolation for containers. I found these promising projects: runq, Kata Containers, Firecracker and gVisor. I think that runq, Kata ...
1vote
1answer
78views
What is the easiest way to have a standalone implementation of Passkeys on generic hardware with backup?
In previous question I asked about simple login systems, and WebAuthn was the answer. From a brief read of the web pages I THINK it is possible to create a standalone GPL implementation of Passkeys ...
3votes
1answer
186views
Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model
Goal: I'm seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain ...
0votes
1answer
102views
Virtual machine as Secure Admin Workstation?
I would like to use a dedicated machine to perform administrative tasks in my company network, which are: Using RSAT to administer the Active Directory domain Using SSH to connect some Linux servers ...
1vote
1answer
163views
is it less secure to run the onion (TOR) protocol on a virtual machine running on a host with an ordinary Internet connection?
I'm thinking in an analogy of the Postal Service. If you mail a package of drugs with an encrypted return address, it does not seem secure to send it through the US mail in another envelope with a ...
1vote
0answers
62views
macOS Parallels firewall configuration?
I use Parallels to run different type of OS (Windows, Linux) on the macOS ARM64. I would like to improve the overall security of the machine to be able to connect to a LAN or Wifi and still have a ...
0votes
1answer
346views
Is an isolated VM (Hyper-V) still safe despite the fact that the host uses RDP to view/control the VM?
This question is directed towards creating an isolated environment for a reverse engineering VM, where malicious programs will be disassembled, debugged by executing them, so static and dynamic ...
0votes
1answer
173views
Can VirtualBox VM prevent malware infection in my case?
I have installed an exe downloaded from an ad. After a while, my files started to be encrypted gradually, I shut down my PC for days, and reinstalled Windows fresh. After a few days, my PC crashed a ...
1vote
1answer
1kviews
PCR 7 in TPM 2.0 has always the same value
First of all, I must say that I'm using a VM with an emulated TPM 2.0. I've created an LUKS2 encrypted partition and configured the TPM 2.0 to unseal the key only if the PCR 7 has a certain value. For ...
1vote
3answers
352views
Does emulation/software virtualization provide more isolation/security vs hardware virtualization?
From my understanding: I can emulate many different architectures and systems with qemu as a user(mode) process. There is separate user address space per process. If a malicious process were to ...
0votes
1answer
696views
How to transfer files from a virtual machine to the host without risking getting infected?
I have to transfer some files such as movies, TV series and other large stuff (so I can not to use a cloud) from a virtual machine to the host. I read that an infected virtual machine can spread ...
1vote
2answers
177views
Is hardware linked between different operating systems installed in same computer?
I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
10votes
5answers
7kviews
Why is Kali released as a VM?
I have completed a few Bug Bounty tutorials. All of them use Kali Linux installed on VMs. Either VirtualBox or VMWare. Is there a reason why Web App Pen testing would be done from a VM? I'm just ...