First page Back Continue Last page Overview Graphics
Integrity approaches
Integrity shells
- Read: 1988: "Models of Practical Defenses Against Computer Viruses"
Isolation environments
- VMware and similar VMs
- Chroot and similar approaches
Multi-processor isolation
- Real Machines instead of Virtual Machines
- Excellent in multiprocessor applications
Notes: