Virtualbox R

Total Page:16

File Type:pdf, Size:1020Kb

Virtualbox R Oracle R VM VirtualBox R Programming Guide and Reference Version 6.1.20 c 2004-2021 Oracle Corporation http://www.virtualbox.org Contents 1 Introduction 24 1.1 Modularity: the building blocks of VirtualBox................... 24 1.2 Two guises of the same “Main API”: the web service or COM/XPCOM...... 25 1.3 About web services in general............................ 26 1.4 Running the web service............................... 27 1.4.1 Command line options of vboxwebsrv................... 27 1.4.2 Authenticating at web service logon.................... 28 2 Environment-specific notes 30 2.1 Using the object-oriented web service (OOWS)................... 30 2.1.1 The object-oriented web service for JAX-WS................ 30 2.1.2 The object-oriented web service for Python................ 32 2.1.3 The object-oriented web service for PHP................. 33 2.2 Using the raw web service with any language................... 33 2.2.1 Raw web service example for Java with Axis............... 34 2.2.2 Raw web service example for Perl..................... 35 2.2.3 Programming considerations for the raw web service.......... 35 2.3 Using COM/XPCOM directly............................. 39 2.3.1 Python COM API.............................. 39 2.3.2 Common Python bindings layer...................... 40 2.3.3 C++ COM API............................... 41 2.3.4 Event queue processing........................... 42 2.3.5 Visual Basic and Visual Basic Script (VBS) on Windows hosts...... 42 2.3.6 C binding to VirtualBox API........................ 43 3 Basic VirtualBox concepts; some examples 50 3.1 Obtaining basic machine information. Reading attributes............. 50 3.2 Changing machine settings: Sessions........................ 50 3.3 Launching virtual machines............................. 51 3.4 VirtualBox events................................... 51 4 The VirtualBox shell 53 5 Classes (interfaces) 55 5.1 IAdditionsFacility................................... 55 5.1.1 Attributes.................................. 55 5.2 IAdditionsStateChangedEvent (IEvent)....................... 55 5.2.1 Attributes.................................. 56 5.3 IAppliance....................................... 56 5.3.1 Attributes.................................. 57 5.3.2 addPasswords................................ 58 5.3.3 createVFSExplorer.............................. 58 5.3.4 createVirtualSystemDescriptions...................... 58 5.3.5 getMediumIdsForPasswordId........................ 58 5.3.6 getPasswordIds............................... 59 5.3.7 getWarnings................................. 59 2 Contents 5.3.8 importMachines............................... 59 5.3.9 interpret................................... 59 5.3.10 read..................................... 59 5.3.11 write..................................... 60 5.4 IAudioAdapter..................................... 60 5.4.1 Attributes.................................. 60 5.4.2 getProperty................................. 61 5.4.3 setProperty.................................. 61 5.5 IAudioAdapterChangedEvent (IEvent)........................ 61 5.5.1 Attributes.................................. 62 5.6 IBIOSSettings..................................... 62 5.6.1 Attributes.................................. 62 5.7 IBandwidthControl.................................. 63 5.7.1 Attributes.................................. 63 5.7.2 createBandwidthGroup........................... 64 5.7.3 deleteBandwidthGroup........................... 64 5.7.4 getAllBandwidthGroups........................... 64 5.7.5 getBandwidthGroup............................. 64 5.8 IBandwidthGroup................................... 64 5.8.1 Attributes.................................. 64 5.9 IBandwidthGroupChangedEvent (IEvent)...................... 65 5.9.1 Attributes.................................. 65 5.10 IBooleanFormValue (IFormValue).......................... 65 5.10.1 getSelected.................................. 65 5.10.2 setSelected.................................. 65 5.11 ICPUChangedEvent (IEvent)............................. 65 5.11.1 Attributes.................................. 66 5.12 ICPUExecutionCapChangedEvent (IEvent)..................... 66 5.12.1 Attributes.................................. 66 5.13 ICanShowWindowEvent (IVetoEvent)........................ 66 5.13.1 Attributes.................................. 66 5.14 ICertificate....................................... 66 5.14.1 Attributes.................................. 67 5.14.2 isCurrentlyExpired............................. 69 5.14.3 queryInfo................................... 69 5.15 IChoiceFormValue (IFormValue)........................... 69 5.15.1 Attributes.................................. 69 5.15.2 getSelectedIndex.............................. 69 5.15.3 setSelectedIndex............................... 69 5.16 IClipboardFileTransferModeChangedEvent (IEvent)................ 70 5.16.1 Attributes.................................. 70 5.17 IClipboardModeChangedEvent (IEvent)....................... 70 5.17.1 Attributes.................................. 70 5.18 ICloudClient...................................... 70 5.18.1 createImage................................. 70 5.18.2 deleteImage................................. 70 5.18.3 exportImage................................. 71 5.18.4 exportVM.................................. 71 5.18.5 getExportDescriptionForm......................... 71 5.18.6 getImageInfo................................. 71 5.18.7 getImportDescriptionForm......................... 71 5.18.8 getInstanceInfo............................... 72 5.18.9 getLaunchDescriptionForm......................... 72 3 Contents 5.18.10 importImage................................. 72 5.18.11 importInstance................................ 72 5.18.12 launchVM.................................. 72 5.18.13 listImages.................................. 73 5.18.14 listInstances................................. 73 5.18.15 pauseInstance................................ 73 5.18.16 setupCloudNetworkEnvironment...................... 73 5.18.17 startCloudNetworkGateway........................ 74 5.18.18 startInstance................................. 74 5.18.19 terminateInstance.............................. 74 5.19 ICloudNetwork.................................... 74 5.19.1 Attributes.................................. 74 5.20 ICloudNetworkEnvironmentInfo........................... 75 5.20.1 Attributes.................................. 75 5.21 ICloudNetworkGatewayInfo............................. 75 5.21.1 Attributes.................................. 75 5.22 ICloudProfile..................................... 75 5.22.1 Attributes.................................. 75 5.22.2 createCloudClient.............................. 75 5.22.3 getProperties................................. 76 5.22.4 getProperty................................. 76 5.22.5 remove.................................... 76 5.22.6 setProperties................................. 76 5.22.7 setProperty.................................. 77 5.23 ICloudProvider.................................... 77 5.23.1 Attributes.................................. 77 5.23.2 createProfile................................. 78 5.23.3 getProfileByName.............................. 78 5.23.4 getPropertyDescription........................... 78 5.23.5 importProfiles................................ 78 5.23.6 prepareUninstall............................... 78 5.23.7 restoreProfiles................................ 79 5.23.8 saveProfiles................................. 79 5.24 ICloudProviderManager............................... 79 5.24.1 Attributes.................................. 79 5.24.2 getProviderById............................... 79 5.24.3 getProviderByName............................. 79 5.24.4 getProviderByShortName.......................... 79 5.25 IConsole........................................ 79 5.25.1 Attributes.................................. 80 5.25.2 addDiskEncryptionPassword........................ 82 5.25.3 addDiskEncryptionPasswords........................ 82 5.25.4 attachUSBDevice.............................. 83 5.25.5 clearAllDiskEncryptionPasswords..................... 83 5.25.6 createSharedFolder............................. 83 5.25.7 detachUSBDevice.............................. 84 5.25.8 findUSBDeviceByAddress.......................... 84 5.25.9 findUSBDeviceById............................. 84 5.25.10 getDeviceActivity.............................. 84 5.25.11 getGuestEnteredACPIMode......................... 85 5.25.12 getPowerButtonHandled.......................... 85 5.25.13 pause..................................... 85 5.25.14 powerButton................................. 85 4 Contents 5.25.15 powerDown................................. 85 5.25.16 powerUp................................... 86 5.25.17 powerUpPaused............................... 86 5.25.18 removeDiskEncryptionPassword...................... 86 5.25.19 removeSharedFolder............................ 87 5.25.20 reset..................................... 87 5.25.21 resume.................................... 87 5.25.22 sleepButton................................. 87 5.25.23 teleport.................................... 87 5.26 ICursorPositionChangedEvent (IEvent)....................... 88 5.26.1 Attributes.................................. 88 5.27 IDHCPConfig..................................... 88 5.27.1 Attributes.................................. 88 5.27.2 getAllOptions................................ 89 5.27.3 getOption.................................. 89 5.27.4
Recommended publications
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Ovirt and Openstack Storage (Present and Future)
    oVirt and OpenStack Storage (present and future) Federico Simoncelli Principal Software Engineer, Red Hat January 2014 1 Federico Simoncelli – oVirt and OpenStack Storage (present and future) Agenda ● Introduction ● oVirt and OpenStack Overview ● Present ● oVirt and Glance Integration ● Importing and Exporting Glance Images ● Current Constraints and Limitations ● Future ● Glance Future Integration ● Keystone Authentication in oVirt ● oVirt and Cinder Integration 2 Federico Simoncelli – oVirt and OpenStack Storage (present and future) oVirt Overview ● oVirt is a virtualization management application ● manages hardware nodes, storage and network resources, in order to deploy and monitor virtual machines running in your data center ● Free open source software released under the terms of the Apache License 3 Federico Simoncelli – oVirt and OpenStack Storage (present and future) The oVirt Virtualization Architecture 4 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Overview ● Cloud computing project to provide an Infrastructure as a Service (IaaS) ● Controls large pools of compute, storage, and networking resources ● Free open source software released under the terms of the Apache License ● Project is managed by the OpenStack Foundation, a non-profit corporate entity established in September 2012 5 Federico Simoncelli – oVirt and OpenStack Storage (present and future) OpenStack Glance Service ● Provides services for discovering, registering, and retrieving virtual machine images ● RESTful API that allows querying
    [Show full text]
  • Oracle Virtualbox Installation, Setup, and Ubuntu Introduction
    ORACLE VIRTUALBOX INSTALLATION, SETUP, AND UBUNTU INTRODUCTION • VirtualBox is a hardware virtualization program. • Create virtual computers aka virtual machines. • Prototyping, sandboxing, testing. • The computer that VirtualBox is installed on is called the “host”, and each virtual machine is called a “guest”. PREREQUISITES Since virtual machines share resources with the host computer, we need to know what resources we have available on our host. • Click “Type here to search”. • Search for “System Information”. • Note the number of processor cores and the amount of RAM installed in your host. PREREQUISITES • Expand “Components”. • Expand “Storage”. • Select “Drives”. • Note the amount of free space available on your host. Every computer is different, so how we will need to balance these resources between our host and guest systems will differ. DOWNLOADING VIRTUALBOX • VISIT VIRTUALBOX.ORG • SELECT THE CORRECT PACKAGE • CLICK THE DOWNLOAD LINK. FOR YOUR HOST. INSTALLING VIRTUALBOX • Browse to where you downloaded VirtualBox and run the installer. • All default options will be fine. Simply follow the prompts. INSTALLING VIRTUALBOX • CLICK “FINISH”. • VIRTUALBOX INSTALLED! SETTING THINGS UP Before we build our first virtual machine, we need to download an operating system to install as our “guest”. • Visit Ubuntu.com • Click “Download”. • Select the current Ubuntu Desktop “LTS” release. • LTS releases focus on stability rather than cutting edge features. SETTING THINGS UP • IN VIRTUALBOX, CLICK “NEW”. • NAME THE VIRTUAL MACHINE. SETTING THINGS UP Here’s where we will need the system resources information that we looked up earlier. Each virtual machine functions like a separate computer in and of itself and will need to share RAM with the host.
    [Show full text]
  • Vmware Workstation Pro 16.0 Using Vmware Workstation Pro
    Using VMware Workstation Pro VMware Workstation Pro 16.0 Using VMware Workstation Pro You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Workstation Pro 14 1 Introduction and System Requirements 15 Host System Requirements for Workstation Pro 15 Processor Requirements for Host Systems 15 Supported Host Operating Systems 16 Memory Requirements for Host Systems 16 Display Requirements for Host Systems 16 Disk Drive Requirements for Host Systems 17 Local Area Networking Requirements for Host Systems 18 ALSA Requirements 18 Virtual Machine Features and Specifications 18 Supported Guest Operating Systems 18 Virtual Machine Processor Support 18 Virtual Machine Chipset and BIOS Support 19 Virtual Machine Memory Allocation 19 Virtual Machine Graphics and Keyboard Support 19 Virtual Machine IDE Drive Support 19 Virtual Machine SCSI Device Support 20 Virtual Machine Floppy Drive Support 20 Virtual Machine Serial and Parallel Port Support 20 Virtual Machine USB Port Support 20 Virtual Machine Mouse and Drawing Tablet Support 21 Virtual Machine Ethernet Card Support 21 Virtual Machine Networking Support 21 Virtual Machine Sound Support 21 2 Installing and Using Workstation Pro 23 Obtaining the Workstation Pro Software and License Key 23 Trial Version Expiration Date Warnings 24 Installing Workstation Pro with Other VMware Products 24 Reinstalling Workstation Pro When Upgrading a Windows Host Operating System 24 Installing the Integrated Virtual Debuggers for Eclipse 25 Installing Workstation Pro 25 Install Workstation Pro on a Windows Host 26 Run an Unattended Workstation Pro Installation on a Windows Host 26 Install Workstation Pro on a Linux Host 28 Upgrading Workstation Pro 31 VMware, Inc.
    [Show full text]
  • Oracle VM Virtualbox Data Sheet
    ORACLE DATA SHEET ORACLE VM VIRTUALBOX KEY FEATURES Oracle VM VirtualBox is cross-platform virtualization software that allows you • Available for Windows, Mac OS X, Linux to extend your existing computer to run multiple operating systems at the same and Oracle Solaris host operating systems time. Designed for IT professionals, Oracle VM VirtualBox runs on Windows, • Supports a wide-range of guest Mac OS X, Linux and Oracle Solaris systems and is ideal for testing, platforms developing, demonstrating and deploying solutions across multiple platforms on • Easy to use graphical user interface one machine. • Powerful, scriptable command-line interface • Import and export virtual machines using OVF/OVA standards • Shared folders between guest vm and host machine • Seamless, resizable, and full screen window display modes • Video and 3D (OpenGL, DirectX) acceleration • Multiple virtual screen support • Powerful and flexible networking options • USB and serial ports • SAS, SATA, SCSI and IDE storage controllers • Built-in iSCSI initiator • Built-in Remote Display Server • Multi-generational branched snapshots • Linked and Full Clones • Controllable Copy-and-Paste • VM Groups Easy to use, Fast and Powerful, Great Platform coverage KEY BENEFITS Designed for use on systems ranging from ultrabooks to high-end server class hardware, • Run almost any type of application on your existing machine Oracle VM VirtualBox is lightweight and easy to install and use. Yet under the deceptively simple exterior lies an extremely fast and powerful virtualization engine. With a formidable • Quickly and easily try out new platforms reputation for speed and agility, Oracle VM VirtualBox contains innovative features to deliver • Create an optimum test and tangible business benefits: significant performance improvements; a more powerful development environment virtualization system; and a wider range of supported guest operating system platforms.
    [Show full text]
  • Managed Conversion of Guests to Ovirt
    Managed Conversion of Guests to oVirt Arik Hadas Senior Software Engineer Red Hat 21/8/15 KVM Forum, August 2015 Agenda ● Motivation ● Architecture ● Demonstration ● Implementation ● Future work KVM Forum, August 2015 Many ways to run Virtual Machines ● There are many virtualization tools ● Different hypervisors – KVM, E !"E Xi, Xen, VirtualBo$, .%% ● Different management systems – oVirt, virt'manager, v phere, Ganeti, .%% KVM Forum, August 2015 “I don't want to lose my VMs” ● Virtualization technologies are used for a long time ● +o standardization ● ,eople are tied up to the technologies they currently use ● Conversion tools are neede). KVM Forum, August 2015 virt-v2v ● ,art of virt tools – /pen source virtualization management tools ● Foreign hypervisor -0 KVM ● Standalone conversion tool KVM Forum, August 2015 Conversion to oVirt using virt-v2v ● Converts disk formats ● Enables VirtIO drivers (If needed) – Network, torage ● Fixes boot'loader ● ,roduces full oVirt-compatible OVF ● Outputs the VM in oVirt's export domain KVM Forum, August 2015 Drawbacks ● Slow ● Tedious ● Error-prone ● 5equires separate installation ● Do not support conversion of OVA 7les ● Error handlin& KVM Forum, August 2015 Our goal Improve the conversion process to oVirt – Faster – Tools are availa1le – Graphical user interface ● To con7&ure ● To monitor/cancel – Ro1ust – Support conversion of OVA files KVM Forum, August 2015 Design principles ● 8se virt-v9v capabilities – For &uest-level operations ● oVirt mana&es the conversion – -on7&ure conversion properties
    [Show full text]
  • List of Versions Added in ARL #2547 Publisher Product Version
    List of Versions Added in ARL #2547 Publisher Product Version 2BrightSparks SyncBackLite 8.5 2BrightSparks SyncBackLite 8.6 2BrightSparks SyncBackLite 8.8 2BrightSparks SyncBackLite 8.9 2BrightSparks SyncBackPro 5.9 3Dconnexion 3DxWare 1.2 3Dconnexion 3DxWare Unspecified 3S-Smart Software Solutions CODESYS 3.4 3S-Smart Software Solutions CODESYS 3.5 3S-Smart Software Solutions CODESYS Automation Platform Unspecified 4Clicks Solutions License Service 2.6 4Clicks Solutions License Service Unspecified Acarda Sales Technologies VoxPlayer 1.2 Acro Software CutePDF Writer 4.0 Actian PSQL Client 8.0 Actian PSQL Client 8.1 Acuity Brands Lighting Version Analyzer Unspecified Acuity Brands Lighting Visual Lighting 2.0 Acuity Brands Lighting Visual Lighting Unspecified Adobe Creative Cloud Suite 2020 Adobe JetForm Unspecified Alastri Software Rapid Reserver 1.4 ALDYN Software SvCom Unspecified Alexey Kopytov sysbench 1.0 Alliance for Sustainable Energy OpenStudio 1.11 Alliance for Sustainable Energy OpenStudio 1.12 Alliance for Sustainable Energy OpenStudio 1.5 Alliance for Sustainable Energy OpenStudio 1.9 Alliance for Sustainable Energy OpenStudio 2.8 alta4 AG Voyager 1.2 alta4 AG Voyager 1.3 alta4 AG Voyager 1.4 ALTER WAY WampServer 3.2 Alteryx Alteryx Connect 2019.4 Alteryx Alteryx Platform 2019.2 Alteryx Alteryx Server 10.5 Alteryx Alteryx Server 2019.3 Amazon AWS Command Line Interface 1 Amazon AWS Command Line Interface 2 Amazon AWS SDK for Java 1.11 Amazon CloudWatch Agent 1.20 Amazon CloudWatch Agent 1.21 Amazon CloudWatch Agent 1.23 Amazon
    [Show full text]
  • Ovirt at Leeds Beckett University
    oVirt at Leeds Beckett University Using oVirt to provide a FOSS VDI solution to teach cyber security in a sandboxed realistic environment to remote students oVirt at Leeds Beckett University Paul Staniforth [email protected] Leeds Beckett University Leeds Polytechnic Leeds Metropolitan University Leeds Beckett University Previous teaching provision ● PC network workstations. ● 3 labs 25 PCs. ● Scripted imaging system (IMS). Why oVirt? ● Looking for a managed KVM solution. ● Free and Open Source Software. ● Open SDK and API. ● JAVA PYTHON RUBY Web. ● Community Support with option a vendor support. ● Scalable and Manageable. First Stages ● POC based on PC Workstations. ● Test Class with feedback session from students. ● Planned integration into course modules. Original Setup ● 1 Datacenter ● 1 Cluster ● 3 Hosts Resource Usage Upgrades to system ● 1 Datacenter ● 1 Cluster ● 3 Hosts + Increase Memory ● 4 Extra Hosts ● 8 more Hosts Security Courses ● Originally running on IMS machine. ● VMware Player. ● VirtualBox. ● Most Now moved to oVirt. Advantages with the oVirt System ● On premises there was a time penalty running VMs on physical machines. ● More flexible approach and quicker to roll out updates and changes. ● Less maintenance needed by the students. ● Can access the VMs remotely and on site. ● Staff can provide teaching support to students remotely. ● Extra flexiblility with group working. Networking for Security ● We separate the oVirt service networking and the VM networking for students. ● We have an air-gapped switch for student VM networks. ● Access outside the isolated networks is via a proxy. Remote Access for Students ● For student use they require web access to the portal really only https: ● And access to the console ports on the oVirt hosts.
    [Show full text]
  • Setting up C Programming Environment Before You Start
    Setting up C Programming Environment Before you start.. ! Please note that this is “NOT” a required part of the course and is not a homework. ! This manual is written for someone who has never programmed / never used Linux before. If you have background knowledge, you can ignore this. ! If you have any questions, please email Yoonji Shin [email protected] ! Don’t be scared, programming is fun! Enjoy :) Install VirtualBox 1. Visit http://www.virtualbox.org/wiki/downloads 2. Download VirtualBox platform packages for your OS 3. Open the Installation Package by double clicking MAC PC Install VirtualBox 4. Click continue and finish installing VirtualBox MAC PC 5. When finished installation, close the window. Download Linux 1. Visit the page http://www.ubuntu.com/download/ubuntu/download 2. Choose the Latest version of Ubuntu and 32-bit and click “Start Download” CLICK Install Linux using Virtual Box 1. Run VirtualBox by double-clicking the icon 2. Click “New” button on the top left corner MAC PC Install Linux using Virtual Box 3. Click “Continue” on the pop-up window 4. Type VM name, select “Linux” for the OS and choose “Ubuntu” for the version. MAC PC Install Linux using Virtual Box 5. Choose the amount of memory to allocate (I suggest choosing between 512 MB to 1024 MB) 6. Click Continue or Next MAC PC Install Linux using Virtual Box 7. Choose create a new virtual hard disk 8. Click Continue or Next MAC PC Install Linux using Virtual Box 9. Choose VDI (VirtualBox Disk Image) 10. Click Continue or Next MAC PC Install Linux using Virtual Box 11.
    [Show full text]
  • Oracle VM Virtualbox User Manual
    Oracle VM VirtualBox R User Manual Version 5.1.4 c 2004-2016 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 11 1.1 Why is virtualization useful?............................. 12 1.2 Some terminology................................... 12 1.3 Features overview................................... 13 1.4 Supported host operating systems.......................... 15 1.5 Installing VirtualBox and extension packs...................... 16 1.6 Starting VirtualBox.................................. 17 1.7 Creating your first virtual machine......................... 18 1.8 Running your virtual machine............................ 21 1.8.1 Starting a new VM for the first time.................... 21 1.8.2 Capturing and releasing keyboard and mouse.............. 22 1.8.3 Typing special characters.......................... 23 1.8.4 Changing removable media......................... 24 1.8.5 Resizing the machine’s window...................... 24 1.8.6 Saving the state of the machine...................... 25 1.9 Using VM groups................................... 26 1.10 Snapshots....................................... 26 1.10.1 Taking, restoring and deleting snapshots................. 27 1.10.2 Snapshot contents.............................. 28 1.11 Virtual machine configuration............................ 29 1.12 Removing virtual machines.............................. 30 1.13 Cloning virtual machines............................... 30 1.14 Importing and exporting virtual machines..................... 31 1.15 Global Settings...................................
    [Show full text]
  • QEMU As a Platform for PLC Virtualization an Analysis from a Cyber Security Perspective
    QEMU as a platform for PLC virtualization An analysis from a cyber security perspective HANNES HOLM, MATS PERSSON FOI Swedish Defence Research Agency Phone: +46 8 555 030 00 www.foi.se FOI-R--4576--SE SE-164 90 Stockholm Fax: +46 8 555 031 00 ISSN 1650-1942 April 2018 Hannes Holm, Mats Persson QEMU as a platform for PLC virtualization An analysis from a cyber security perspective Bild/Cover: Hannes Holm FOI-R--4576--SE Titel QEMU as a platform for PLC virtualization Title Virtualisering av PLC:er med QEMU Rapportnr/Report no FOI-R--4576--SE Månad/Month April Utgivningsår/Year 2018 Antal sidor/Pages 36 ISSN 1650-1942 Kund/Customer MSB Forskningsområde 4. Informationssäkerhet och kommunikation FoT-område Projektnr/Project no E72086 Godkänd av/Approved by Christian Jönsson Ansvarig avdelning Ledningssytem Detta verk är skyddat enligt lagen (1960:729) om upphovsrätt till litterära och konstnärliga verk, vilket bl.a. innebär att citering är tillåten i enlighet med vad som anges i 22 § i nämnd lag. För att använda verket på ett sätt som inte medges direkt av svensk lag krävs särskild överenskommelse. This work is protected by the Swedish Act on Copyright in Literary and Artistic Works (1960:729). Citation is permitted in accordance with article 22 in said act. Any form of use that goes beyond what is permitted by Swedish copyright law, requires the written permission of FOI. FOI-R--4576--SE Sammanfattning IT-säkerhetsutvärderingar är ofta svåra att genomföra inom operativa industriella informations- och styrsystem (ICS) då de medför risk för avbrott, vilket kan få mycket stor konsekvens om tjänsten som ett system realiserar är samhällskritisk.
    [Show full text]
  • Windows Authentication
    Windows Authentication August 3, 2021 Verity Confidential Copyright 2011-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents Get Started .........................................................................................................4 Windows Domain Account Setup.................................................................6 Create an Administrator Account ......................................................................................... 6 Group Policy Settings .............................................................................................................. 6 Verify Functionality of the New Account (recommended) ................................................. 7 WMI Service Configuration ............................................................................ 8 How to increase WMI authentication level .......................................................................... 8 What happens when high level authentication is not provided? ...................................... 8 Manage Authentication Records...................................................................9 Create one or more Windows Records .................................................................................. 9 Windows Authentication Settings ......................................................................................
    [Show full text]