Can we rely on virtualization software?

Discussion in 'sandboxing & virtualization' started by COMPYPY, Oct 19, 2011.

Thread Status:
Not open for further replies.
  1. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    Does the NSA qualify as an expert source? :D
    Details common VM setups and exploits them using Cloudburst.
    Trusted Computing Using TPM - NSA Flash Video
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.