Skip to main content

Questions tagged [virtualization]

Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources.

1vote
1answer
115views

How to securely build code from the internet on my servers?

I need to create a build server which will clone code from GitHub (npm repositories) and then build an OCI image using Buildpack or Nixpack. I am currently researching how to achieve this securely ...
JangoCG's user avatar
0votes
0answers
112views

The security of different virtualization systems, specifically comparing Qubes hypervisor with separation kernels like INTEGRITY-178B and LynxSecure

I've often heard that Qubes is considered one of the most secure virtualization options because it uses a small Xen hypervisor, which is only about 150KB in size. However, even Qubes isn't immune to ...
Scientist NA's user avatar
1vote
0answers
89views

What is the difference between enhanced container isolation projects like runq, Kata Containers, Firecracker and gVisor?

I'm diving into different solutions to use (virtual machine based) isolation for containers. I found these promising projects: runq, Kata Containers, Firecracker and gVisor. I think that runq, Kata ...
Bob Ortiz's user avatar
1vote
1answer
78views

What is the easiest way to have a standalone implementation of Passkeys on generic hardware with backup?

In previous question I asked about simple login systems, and WebAuthn was the answer. From a brief read of the web pages I THINK it is possible to create a standalone GPL implementation of Passkeys ...
User65535's user avatar
3votes
1answer
186views

Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model

Goal: I'm seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain ...
arderstt's user avatar
0votes
1answer
102views

Virtual machine as Secure Admin Workstation?

I would like to use a dedicated machine to perform administrative tasks in my company network, which are: Using RSAT to administer the Active Directory domain Using SSH to connect some Linux servers ...
Honza Vojtěch's user avatar
1vote
1answer
163views

is it less secure to run the onion (TOR) protocol on a virtual machine running on a host with an ordinary Internet connection?

I'm thinking in an analogy of the Postal Service. If you mail a package of drugs with an encrypted return address, it does not seem secure to send it through the US mail in another envelope with a ...
Miss Understands's user avatar
1vote
0answers
62views

macOS Parallels firewall configuration?

I use Parallels to run different type of OS (Windows, Linux) on the macOS ARM64. I would like to improve the overall security of the machine to be able to connect to a LAN or Wifi and still have a ...
Dev1n.101's user avatar
0votes
1answer
346views

Is an isolated VM (Hyper-V) still safe despite the fact that the host uses RDP to view/control the VM?

This question is directed towards creating an isolated environment for a reverse engineering VM, where malicious programs will be disassembled, debugged by executing them, so static and dynamic ...
stringExchange's user avatar
0votes
1answer
173views

Can VirtualBox VM prevent malware infection in my case?

I have installed an exe downloaded from an ad. After a while, my files started to be encrypted gradually, I shut down my PC for days, and reinstalled Windows fresh. After a few days, my PC crashed a ...
Nourdine Dali's user avatar
1vote
1answer
1kviews

PCR 7 in TPM 2.0 has always the same value

First of all, I must say that I'm using a VM with an emulated TPM 2.0. I've created an LUKS2 encrypted partition and configured the TPM 2.0 to unseal the key only if the PCR 7 has a certain value. For ...
Blasco's user avatar
1vote
3answers
352views

Does emulation/software virtualization provide more isolation/security vs hardware virtualization?

From my understanding: I can emulate many different architectures and systems with qemu as a user(mode) process. There is separate user address space per process. If a malicious process were to ...
ift-436t's user avatar
0votes
1answer
696views

How to transfer files from a virtual machine to the host without risking getting infected?

I have to transfer some files such as movies, TV series and other large stuff (so I can not to use a cloud) from a virtual machine to the host. I read that an infected virtual machine can spread ...
woyim46107's user avatar
1vote
2answers
177views

Is hardware linked between different operating systems installed in same computer?

I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
Elias LP's user avatar
10votes
5answers
7kviews

Why is Kali released as a VM?

I have completed a few Bug Bounty tutorials. All of them use Kali Linux installed on VMs. Either VirtualBox or VMWare. Is there a reason why Web App Pen testing would be done from a VM? I'm just ...
Neil Meyer's user avatar

153050per page
close