Vmware ACE As a Tool for Computer-Room Desktop Maintenance Ing

Total Page:16

File Type:pdf, Size:1020Kb

Vmware ACE As a Tool for Computer-Room Desktop Maintenance Ing VMware ACE as a tool for computer-room desktop maintenance Ing. Lukáš Slánský, Mgr. Tomáš Hudec Institute of Electrical Engineering and Informatics, University of Pardubice, Czech Republic [email protected], [email protected] Abstract systems which run on top of it. Each VM can have the same set of standard virtual hardware (i.e. CPU, memory, VMware ACE is one of the latest products in the family of hard disk, graphical device, input/output devices). An virtualization tools of VMware Company. It offers unmodified OS can run inside this type of VM instruments for consistent, safe and rapid production and (see Fig. 2). This is referred as native virtualization or full distribution of client computers. Main benefit is the virtualization. Examples include VMware Workstation, possibility to secure virtual machine’s environment VMware Server (formerly GSX Server), Parallels against changing and possible misuse of installed Desktop or Adeos. software. Institute of Electrical Engineering and Informatics uses VMware ACE as a tool for distributing safe desktop environment in computer-rooms. Its proper usage lowers the maintenance costs and simultaneously eliminates Application threats leading to compromising target desktop by both external environment and students. Desktop systems can be simply provided with different prepared systems Operating System according to individual teacher’s demands. Bare HW 1. What is the Virtualization Fig. 1. Before Virtualization In general, virtualization is a technique for hiding the physical hardware and replacing it by virtual hardware of the same type or even duplicating it creating exact copy of the bare hardware [1]. This technique is not that new. In 1970s already existed Application Application virtual machine from IBM called VM/370 [2]. The heart Operating Operating of this system was virtual machine monitor which runs on System System bare hardware (IBM370) and does the multiprogramming, Virtual HW Virtual HW providing several virtual machines of the same type (also IBM370) which can run operating system installable on Virtualization Layer this machine. In this example, virtual machine is the exact copy of the hardware. Several operating systems can be Bare HW installed in several VM in the same time on only single piece of hardware. Fig. 2. After Virtualization Such virtual system can require some modifications to the operating system that has to run on top of it. The idea is to There are also other techniques of virtualization at the somewhat hide real hardware by kind of API which can operating system level. There techniques enable some make VM much simpler and it can then achieve higher servers to have isolated secure environment inside the OS. performance. The system calls to VM can be called The same OS kernel must implement this environment hypercalls (Xen, Parallels Workstation) or diagnose code and hosts such servers. Examples are Linux-VServer, (IBM). This type of virtualization is called Virtuozzo, Solaris containers and FreeBSD Jails. para-virtualization. Another examples beside Xen and The last example is application virtualization. It allows Parallels Workstation is VMware ESX Server or running the applications locally without being installed. Win4Lin 9x. Such virtualized application runs in the special virtual Other virtualization method is hiding bare hardware environment which is the layer between the application (see Fig. 1) details and providing some kind of and the OS. This environment eliminates conflicts standardized hardware possibly of the same type. This between the application and the rest of the system or VM can be installed on more types of hardware and between applications themselves. Examples include Java provides consistent standard environment for operating Virtual Machine, Thinstall, Altris or Trigence. 2. Virtualization – Pros and Cons VM simplifying installation of the same system to just copying. If something goes wrong during installing Virtualization comes with some enhancements and updates of any kind, you can easily come back to the benefits but also can have some drawbacks [3]. Let us snapshot you made in the past. examine the benefits of its features and possible drawbacks. 2.5. Testing and debugging environment 2.1. Standardization The use of the previously described snapshots can be applied by software developers for tuning a new software, The key benefit is that standard HW is provided in the drivers etc. Virtual machines provide excellent VM, so operating systems have uniform environment environment for testing and debugging. If the driver or (possibly leaving only CPU as a “pass-through” update fails so that it crashes the operating system, component). On top of other hardware there is a virtual developer can return to previous state very easily. standardized one. For example on top of some SCSI Stability of the system while trying changes in RAID-level hard disk there it can be virtualized some configuration can be tested this way too. Administrators kind of standard SCSI or even IDE hard disk. The same can easily rollback to previous configuration if the change for network adapters, sound cards etc. This benefit has of crashes or damages the system. One can make even course requirements for the VM layer to be able to virtual networks from virtual machines and latency or operate the various kinds of HW. packet loss can be easily tested using different configuration in the operating systems without need of 2.2. Isolation several physical machines. With virtualization it is possible running single service (or 2.6. Summary of pros and cons: set of application) in the single VM, so potential crash of the service or the OS itself does not interfere with the + Easier management of HW, reduced administration other OSs running in different VMs on the same HW. and maintenance costs. Except the performance, virtual machines are independent – Concentration risk, failure takes down several VMs machines. This has also another benefit: One can install + Better utilization of HW. applications which use several places in the OS to store its + Standard HW, no need for special drivers in the OS, data (i.e. registry, files across several possibly system increased system reliability and stability. folders) in different virtual machines. So application + Isolation of applications or even OSs / application which replaces system libraries does not break any portability. functionality to the other applications which can run in ± Cost – requires better HW, cheaper from some number different VM. There is no need to modify such software. of servers. + Mobility, duplication. 2.3. Consolidation + Fast recovery, debugging/testing environment, rollback of changes. Virtual machines increase utilization. If we have more servers each running on its own hardware, each one is using only its HW resources, possibly wasting some CPU 3. VMware ACE time when the service is not needed. On a single machine, several VM with servers can run concurrently, so if one VMware ACE1 is an enterprise class desktop service is not used, another server can make use of the virtualization tool. Security administrators can package an CPU. Also management of a single machine is easier than IT-managed PC within a secured virtual machine and management of several pieces of HW. The drawback is deploy it to an unmanaged physical PC [4]. Once that there is a risk that a failure of the HW shuts down installed, VMware ACE offers complete control of the many servers at the same time. Very reliable HW is hardware configuration and networking capabilities of an therefore needed. unmanaged PC, transforming it into an IT-compliant PC endpoint. 2.4. Mobility VMware ACE enables IT desktop managers to apply enterprise IT policies to a virtual machine containing an Virtual machines are easy to move or even duplicate to operating system, enterprise applications and data to another physical machine. In case of HW failure one can create an isolated PC environment known as an assured replace HW component or even the whole machine with computing environment. another one. The new piece of HW can be different brand Through Virtual Rights Management technology, but it has no consequences to the OS inside VM. No need VMware ACE enables IT desktop managers to control for new drivers, no need to reinstall. Only VM has to be assured computing environment lifecycles, secure modified to use the new HW. Many virtual machines also have a feature of snapshoting the OS state. This snapshot can be transferred easily to another physical machine with 1 ACE – Assured Computing Environment enterprise information on PCs and ensure compliance For this purpose is created special virtual machine with with IT policies. basic installation of OS and the insecure application. Unlike other products, VMware ACE is a hardware System is setup to auto-logon with account that has independent solution that can be provisioned to any PC enough rights for insecure application to run. and works either connected or disconnected from the However, such configuration would assure any special enterprise network. security. The security is enforced via VMware ACE: 1) the state of the virtual machine (especially HDD data) 3.1. Key features of VMware ACE is persistent, it could not be altered – it is rolled back on any restart of the virtual machine and 2) the Internet Manageability connection is limited only to servers that the insecure • Create standardized hardware independent application should use. Therefore any virus or cracker environments and deploy them to any PC. could get into system and if it eventually does it cannot • Virtual Rights Management interface. Control stay there for long. VMware ACE lifecycle, security settings, network settings or system configuration. 4.4. Solution – virtualized desktops Security • Rules-based network access. Identify and quarantine Fully virtualized desktops work in other way. The system unauthorized or out-of-date VMware ACE environments. contains any extra application – it is just added into Enable access to the network once the VMware ACE Active Directory.
Recommended publications
  • Virtual Machine Technologies and Their Application in the Delivery of ICT
    Virtual Machine Technologies and Their Application In The Delivery Of ICT William McEwan accq.ac.nz n Christchurch Polytechnic Institute of Technology Christchurch, New Zealand [email protected] ABSTRACT related areas - a virtual machine or network of virtual machines can be specially configured, allowing an Virtual Machine (VM) technology was first ordinary user supervisor rights, and it can be tested implemented and developed by IBM to destruction without any adverse effect on the corporation in the early 1960's as a underlying host system. mechanism for providing multi-user facilities This paper hopes to also illustrate how VM in a secure mainframe computing configurations can greatly reduce our dependency on environment. In recent years the power of special purpose, complex, and expensive laboratory personal computers has resulted in renewed setups. It also suggests the important additional role interest in the technology. This paper begins that VM and VNL is likely to play in offering hands-on by describing the development of VM. It practical experience to students in a distance e- discusses the different approaches by which learning environment. a VM can be implemented, and it briefly considers the advantages and disadvantages Keywords: Virtual Machines, operating systems, of each approach. VM technology has proven networks, e-learning, infrastructure, server hosting. to be extremely useful in facilitating the Annual NACCQ, Hamilton New Zealand July, 2002 www. Annual NACCQ, Hamilton New Zealand July, teaching of multiple operating systems. It th offers an alternative to the traditional 1. INTRODUCTION approaches of using complex combinations Virtual Machine (VM) technology is not new. It was of specially prepared and configured OS implemented on mainframe computing systems by the images installed via the network or installed IBM Corporation in the early 1960’s (Varian 1997 pp permanently on multiple partitions or on 3-25, Gribben 1989 p.2, Thornton 2000 p.3, Sugarman multiple physical hard drives.
    [Show full text]
  • CASE STUDY Userful Multiplier and Win4lin Pro Reduce Costs of Point
    CASE STUDY TM Userful Multiplier and Win4Lin Pro Reduce Costs of Point-of-Sale Terminals A Case Study by Omni Technology Solutions, leverage the Linux Desktop, he recommended the Userful a Userful Partner Multiplier*, a software add-on that allows multiple users to share a single computer. Win4Lin Pro Desktop was installed to allow Birchwood to run Simply Accounting on Linux. “Userful Multiplier* cut the hardware DOSEMU, which comes bundled with SUSE Linux, handled costs in half and Win4Lin Pro Desktop the DOS-based Framer’s Assistant point-of-sale application provided Windows compatibility to run quite nicely. their Simply Accounting package.” “Birchwood Art Gallery was always running into virus and - Mike Ducharme, spyware infections when they were using Windows 98 and IT consultant, Windows XP. Even with up-to-date anti-virus and anti- Birchwood Art Gallery spyware software, the systems were still getting major infections on a monthly basis, resulting in costly down-time Overview until they were cleaned up,” said Mr. Ducharme. “The security of Novell’s SUSE Linux Desktop provides peace of mind to Birchwood Art Gallery - based in Winnipeg, Canada - their staff,” continued Ducharme, “allowing them to carry out specializes in fine art reproductions and original artwork their work activities without fear of virus or spyware infesta- by a wide range of Canadian and international artists. On tion. Additionally, the Userful Multiplier* cut the hardware their web site and in their gallery, you will find artwork, costs in half and Win4Lin Pro Desktop provided Windows sculptures, prints and books from hundreds of artists. Lyn compatibility to run their Simply Accounting package.” Chercoe and Carole Solmundson, Birchwood Art Gallery’s owners, have earned a reputation for customer service The Results excellence since 1993 and sell art online all over the world.
    [Show full text]
  • Linux Games Page 1 of 7
    Linux Games Page 1 of 7 Linux Games INTRODUCTION such as the number of players and the size of the map, then you start the game. Once the game is running clients may Hello. My name is Andrew Howlett. I've been using Linux join the game. Clients connect to the game using TCP/IP, since 1997. In 2000 I cutover to Linux for all my projects, so it is very easy to play multi-player games over the except I dual-booted Windows to play games. I like to play Internet. Like many Free games, clients are available for computer games. About a year ago I stopped dual booting. many platforms, including Windows, Amiga and Now I play computer games under Linux. The games I Macintosh. So there are lots of players out there. If you play can be divided into four groups: Free Games, native don't want to play against other humans, then Freeciv linux commercial games, Windows Emulated games, and includes some nasty AIs. Win4Lin enabled games. This presentation will demonstrate games from each of these four groups. BZFlag Platform BZFlag is a tank combat game along the same lines as the old BattleZone game. Like FreeCiv, BZFlag uses a client/ Before I get started, a little bit about my setup so you can server architecture over TCP/IP networks. Unlike FreeCiv, relate this to whatever you are running. This is a P3 900 the game contains no AIs – you must play this game MHz machine. It has a Crystal Sound 4600 sound card and against other humans (? entities ?) over the Internet.
    [Show full text]
  • Win4lin — Emulator Windows Dla Linuksa
    Win4Lin — Emulator Windows dla Linuksa Karol Grela ako chemik−organik, używający Linuksa do codziennej dows 95 OSR2 PL mój stary komputer Pentium 233 MMX z 64 pracy, nie mam zazwyczaj problemu ze znalezieniem MB RAM−u był aż nadto wystarczający. potrzebnych programów. Większość narzędzi tworzonych Z punktu widzenia użytkownika, sesja Windows uruchomiona przez naukowców dla naukowców kompiluje się bez w emulatorze jest po prostu jeszcze jedną aplikacją działającą problemu w każdym Uniksie (np. VMD, mopac, platon), w środowisku X Window (Rysunek 1, [8a]). Okno MS Windows a komercyjne posiadają zazwyczaj wersje dla Linuksa (np. mol− może być także wyświetlone na zdalnym komputerze, za pomo− den, pcmodel). Z aplikacjami przeznaczonymi dla innych syste− cą mechanizmów sieciowych X−ów [8b]. mów uniksowych, takimi jak XWinnmr dla Silicon Graphics, daje się bez problemu pracować w systemie X Window. Czasem jed− Instalacja nak muszę używać lub testować oprogramowanie, które nie po− Ponieważ proces instalacji i konfiguracji Win4Lin oraz systemu siada jeszcze odpowiednika pod Linuksem. Dodatkowo prowa− Windows jest wyczerpująco opisany w dokumentacji dostarcza− dzę kilka projektów, takich jak ChemPerfect — zestaw narzędzi nej z programem oraz dostępnej na WWW firmy TreLOS [5], sku− chemicznych do Wordperfecta. Projekt ten rozwijam w dwu wer− pię się na kilku mniej oczywistych punktach. Zakładam też, że sjach — dla Windows i Linuksa. Czasem muszę wprowadzić drob− Czytelnik zna podstawy pracy z Linuksem (i Windows), posiada ne poprawki w tej pierwszej wersji, a nie chce mi się tylko z tego uprawnienia roota i (ewentualnie) wie jak skompilować i zainsta− powodu restartować komputera i ładować MS Windows. Co więcej, lować jądro systemu.
    [Show full text]
  • Crossover Compared to Competing Emulation Solutions
    CrossOver Compared to Competing Emulation Solutions CrossOver Compared to Competing Emulation Solutions CrossOver Compared to Competing Emulation Solutions Overview: Whether you’re running a Linux or Mac OS X machine, chances are you need a way to run at least some Windows applications or games that aren’t available on your platform of choice. And you have your choice of potential solutions to this problem. This page illustrates some of the key Every Windows advantages that CrossOver has in relation to the compatibility solution has other compatibility solutions. pros and cons. When presented with the need to run Windows applications on a Mac or Linux machine, you have basically three main choices: Dual-booting: running two separate operating systems on one PC, and switching between them as needed by rebooting. Applications such as Apple’s Bootcamp allow this to occur on a Mac OS X machine, for example. Running a virtual machine: Emulation products such as VMWare and Parallels allow you to install a copy of Windows within a logical partition within your native operating system. The Windows applications essentially run in a separate “box within a box.” Running Wine or CrossOver: Unlike emulation, Wine is a re-implementation of the Win32 API, allowing applications to run as if natively on the target OS. CrossOver is a commercialized version of Wine. Each solution has its advantages and disadvantages. This document is provided to help identify and evaluate key points of comparison between CodeWeavers’ CrossOver products and some of its key competitors. Technology Approach General Approach Dual-booting is exactly what it sounds like—shutting down one operating system, starting another, and dealing with the file transfer issues associated with same.
    [Show full text]
  • An Empirical Study Into the Security Exposure to Hosts of Hostile Virtualized Environments
    An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments Tavis Ormandy [email protected] Google, Inc. Abstract machine monitor is ‘root secure’[25], meaning that no level of As virtual machines become increasingly commonplace as privilege within the virtualized guest environment permits a method of separating hostile or hazardous code from com- interference with the host system. modity systems, the potential security exposure from imple- Detection mentation flaws has increased dramatically. This paper Detecting virtualized environments has been explored in investigates the state of popular virtual machine implementa- detail by other researchers[22]. Virtual machines employed in tions for x86 systems, employing a combination of source code malware analysis or honeypots should endeavour to be unde- auditing and blackbox random testing to assess the security tectable or risk changing the behaviour of the emulated code. exposure to the hosts of hostile virtualized environments. An emulated malware sample could choose to act benignly, Keywords for example, but when executed on a physical machine imme- virtualization, security, software testing diately performs some malicious action. Detection will not be considered any further in this paper, although being able to detect a virtual machine, or more spe- I. INTRODUCTION cifically, virtual machine implementation, may be a prerequi- Secure isolation is one of the fundamental concepts of vir- site for the more serious attacks investigated in this paper. tualization[15], confining a program to a virtualized environ- Without being able to identify which virtual machine imple- ment should guarantee that any action performed inside the mentation is present, an attacker would have difficulty deter- virtual machine cannot interfere with the system that hosts it1.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • Why Open Source Software / Free Software (OSS/FS, FLOSS, Or FOSS)? Look at the Numbers! 1. Introduction
    Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Nu...Page 1 of 139 Translations available: Czech | French | Japanese | Spanish Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers! David A. Wheeler http://www.dwheeler.com/contactme.html Revised as of November 14, 2005 This paper provides quantitative data that, in many cases, using open source software / free software (abbreviated as OSS/FS, FLOSS, or FOSS) is a reasonable or even superior approach to using their proprietary competition according to various measures. This paper’s goal is to show that you should consider using OSS/FS when acquiring software. This paper examines market share, reliability, performance, scalability, security, and total cost of ownership. It also has sections on non-quantitative issues, unnecessary fears, OSS/FS on the desktop, usage reports, governments and OSS/FS, other sites providing related information, and ends with some conclusions. An appendix gives more background information about OSS/FS. You can view this paper at http://www.dwheeler.com/oss_fs_why.html (HTML format). A short presentation (briefing) based on this paper is also available. Palm PDA users may wish to use Plucker to view this longer report. Old archived copies and a list of changes are also available. 1. Introduction Open Source Software / Free Software (OSS/FS) (also abbreviated as FLOSS or FOSS) has risen to great prominence. Briefly, OSS/FS programs are programs whose licenses give users the freedom to run the program for any purpose, to study and modify the program, and to redistribute copies of either the original or modified program (without having to pay royalties to previous developers).
    [Show full text]
  • Win4lin 3.0 Desktop.Book
    NeTraverse Win4Lin™ 3.0 Installation and Operations Guide 01-June-2001 NeTraverse Win4Lin End User License Agreement IMPORTANT - READ CAREFULLY: This NeTraverse Inc. End User License Agreement (“Agreement”) is a legal agreement between you (either an individual or a single entity) and NeTraverse Inc. for the use of the software product Win4Lin. BY INSTALLING THIS SOFTWARE, YOU AGREE TO THE FOLLOWING TERMS. The software program(s) and related documentation that you are about to install (collectively, the “Software”) are a proprietary product of NeTraverse Inc. By installing the Software, you acknowledge that you have read these terms and agree to be bound by them. If you do not agree to any of these terms, you should not install the Software, and you must delete all copies of the Software. 1. Ownership: NeTraverse and its suppliers retain ownership of all patents, copyrights, trademarks, trade secrets and other proprietary rights relating to or residing in the Software. You acquire no rights, express or implied, in the Software other than the limited right to use the Software as expressly specified in this Agreement. 2. License: Subject to the terms and conditions of this Agreement and your payment of the applicable license fee, NeTraverse grants you a limited, non-exclusive, non-transferable, personal license to use the Software in conjunction with the Linux operating system. You may use the Software on a single computer. 3. Use of Microsoft Windows: NeTraverse does not supply a license for the use of Microsoft Windows. You are required to have a Microsoft Windows license and access to Microsoft Windows installation media to use the NeTraverse Win4Lin Software.
    [Show full text]
  • VIRTUALIZATION Story About Forty Years in VIRTUALIZATION the Making
    is another overnight success SOME COMMON FEATURES OF VIRTUALIZATION story about forty years in VIRTUALIZATION the making. It seems like you can't swing a used computer around without hitting a vendor that is now doing some kind of virtualization on To make it possible to run multiple different operating systems on the their hardware or software. It's the newest gotta-have technology to be same computer, you have to insert a layer between the real hardware and competitive in the market: if you don't have an in-house virtualization the operating system. Usually called a “monitor,” this layer needs to be as solution, you have a partnership with someone who has the technology. “thin” as possible to allow for good speed. The secret to good speed in a Virtualization is not really a fad, though; it is a compelling concept virtual machine (VM, but not to be confused with the IBM operating sys- that is also very subtle. You cannot really “get” the power of virtual- tem by the same name) is the fact that a large number of hardware instruc- ization until you have tried it, and then ways to use it start occurring tions, including adding and subtracting and whatnot, can be allowed to run that the designer never thought of or intended. on the native hardware without fear of one virtual machine corrupting The first and still premier virtualization solution, any hardware, another. It is only when you are accessing memory or I/O devices and any software, anywhere is an operating system from IBM named VM similar things that the monitor has to intercept the VM and emulate a vir- for Virtual Machine: an operating system for the IBM mainframe tual environment for it.
    [Show full text]
  • Managing a Network TEX Installation Under Windows∗
    Managing a network TEX installation under Windows∗ SIEP KROONENBERG Rijksuniversiteit Groningen Faculteit der Economische Wetenschappen Postbus 800, 9700 AV Groningen, The Netherlands siepo (at) cybercomm dot nl Keywords MiKTEX, TeXnicCenter, filename database, registry, graphic file formats This paper is about the MiKTEX installation I main- tain for the Economics Department of the Rijksuni- versiteit Groningen. We have long been the home of 4TEX. But when development of that project stopped, the time came that this TEX installation had to be re- placed by something else. This something else was go- ing to be MiKTEX with TeXnicCenter as editor and front end (see fig. 1). There are various Windows editors which sup- port MiKTEX, i.e. editors which have menu items and buttons for compiling and viewing your TEX docu- ments with MiKTEX. Configuring e.g. TeXnicCenter Figure 1: TeXnicCenter, a MiKTEX front end. or WinEdt for MiKTEX is almost automatic. TeXnic- Center is free, both as in beer and as in speech. The I dropped support for the old LATEX 2.09 since it MiKT X site lists a few more free editors. LaTeX- E would have meant real work for something that might Editor2 and Texmaker3 seem to have a focus similar not even get used. to TeXnicCenter. The MiKTEX installation was put online early in MiKTEX itself comes with a configuration pro- 2003. For a year and a half, MiKTEX and 4TEX were gram, MiKT X Options or mo.exe,4 which has to E available side by side, but in the end, after six months be started from outside the editor.
    [Show full text]
  • Running Xen-A Hands-On Guide to the Art of Virt
    Running Xen: A Hands-On Guide to the Art of Virtualization by Jeanna N. Matthews; Eli M. Dow; Todd Deshane; Wenjin Hu; Jeremy Bongio; Patrick F. Wilbur; Brendan Johnson Publisher: Prentice Hall Pub Date: April 10, 2008 Print ISBN-10: 0-13-234966-3 Print ISBN-13: 978-0-13-234966-6 eText ISBN-10: 0-13-207467-2 eText ISBN-13: 978-0-13-207467-4 Pages: 624 Table of Contents | Index Overview "This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations." –Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems The Real—World, 100% Practical Guide to Xen Virtualization in Production Environments Using free, open source Xen virtualization software, you can save money, gain new flexibility, improve utilization, and simplify everything from disaster recovery to software testing. Running Xen brings together all the knowledge you need to create and manage high—performance Xen virtual machines in any environment. Drawing on the unparalleled experience of a world—class Xen team, it covers everything from installation to administration–sharing field-tested insights, best practices, and case studies you can find nowhere else. The authors begin with a primer on virtualization: its concepts, uses, and advantages. Next, they tour Xen's capabilities, explore the Xen LiveCD, introduce the Xen hypervisor, and walk you through configuring your own hard—disk—based Xen installation. After you're running, they guide you through each leading method for creating "guests" and migrating existing systems to run as Xen guests.
    [Show full text]