Time
10 hours 41 minutes
Difficulty
Beginner
CEU/CPE
12

Video Transcription

00:05
So this is gonna be a demo on a virtual ization. In this case, we're gonna do Show an example of software virtualization.
00:13
Virtualization is an important new emerging technology that allows you to run other OS is simultaneously on top off another OS or run
00:22
Multiple os is on the same hardware. If you're going hardware virtualization, this case we're going to show Hey, come on. Multiple OS is on top of an existing OS. This important because you could use it for testing, software development, testing, older version of hardware, older version of software, newer versions of software and also for running.
00:42
Other service is that you want to run your host a West.
00:45
So in this case, I'm running windows A. As you can see from the about screen here, Windows eight. So for this example, I'm using the end where Workstation, a commercial
00:57
program that's available for Windows.
01:00
If I open the end where
01:03
so you could see right here I have to
01:06
virtual machines running, that's all refer to him as virtual machine, so at the top you could see it says Boon to and Windows seven. So I'm running. Windows seven is my host OS. But then, on top of that, I'm learning to other machines that as far as anyone's concerned, our individual hardware separate machines from the outside world. So I could be running
01:26
a Web server inside here that runs off
01:27
UNIX. So you see, in this one, I'm on the boon to machine, which is based off Lennox running Boon to 13.4 I could have network access, or it can also segregated to its own network that could only talk to itself or talk to other virtual machines.
01:45
I'm also running Windows seven. So remember Windows eight, Machine Running, Windows seven and Lennox at the same time. So if I had a program that was not compatible with Windows A, I could run a virtual machine of Windows seven
01:57
that could run that program for me.
02:00
Now
02:00
it's also important to note that it shares its resource is with
02:05
the host machine, in this case, the Windows eight machine, so I can assign it
02:08
more, more hard drive space, more random or see few part than I already have on the machine itself, and it will take away some of that CPU and ran hard drive space from the host machine that I won't be able to use. So if I had quite a few virtual machines running and I gave them a lot of RAM, I would see my
02:25
my host Windows eight.
02:28
Our current system runs slower. Also,
02:31
Another important another really nice feature is that you concussed you can to some extent you can customize the hardware that the virtual machine can use. So in this case, on the window. Seven. Don't do the VM menu and I'll go to settings,
02:46
and you can see the different settings that are available so I could assign more ram or less ram. I could assign multiple processor course to it in this case, I decide to, because my machine eight course that means two of my eight cores on my Windows eight machine will be dedicated to running
03:00
this guest os.
03:04
I can also assigned hard drive space. I can assign multiple hard drives so well to do is
03:08
basically make a file on my existing hard drive that will map, too,
03:14
that look like a hard drive inside my virtual machine here. So in this case I made a 60 gigabyte hard drive, and I'm not running scuzzy bye made it, uh, emulate a scuzzy interface.
03:25
And it does that translation. Now, a lot of this stuff, especially with the processor park, can be accelerated by having virtual ization capability in the CPU. Newer. See if you were coming with
03:37
ways to optimize virtualization that will
03:39
make these machines run a lot more efficient.
03:43
I can add to remove, see Rahm drives.
03:46
Here's my network adapter, Aiken set to bridge where will emulate being its own network adapter on the actual into whatever network I'm plugged into from my Windows eight machine. Or I can set host only as I have in this case where it can't see the Internet thinks it's on its own network,
04:02
so I could run these two machines both on their own network. That doesn't see anything else but each other.
04:10
So if I want to check out if something's doing a lot of traffic, I don't have to do that on a production network. Aiken Aiken. Look at the traffic going between those two machines, or if I think I might have think application. We have a virus, I can run it inside a virtual machine. It's not gonna go out with network because it's only connected to itself.
04:29
It's a miscellaneous options or such like us be controller. In this case, I'm running the latest version of the M where I could have emulate USB three because
04:38
my host machine supports us. Be three. But I could also, if I don't want to, I can set down to us people important one or a USB two.
04:46
Now what this will do This will map the USB ports directly from my hardware on my host, Oso I could plug in a USB drive and it'll mak inside the U. S. So I show up is if I plug the U. S. U S B drive directly into a virtual machine, it'll pass through. And I could do that with printers and other USB for referrals.
05:08
I can have it have a sound. Carter, I can say has no sound card.
05:12
If I was doing a survey, I probably sound cards. I just I'd remove that from these options,
05:18
um, printer
05:21
and display. Aiken set to use some of my resource is for my graphics card. So in this case, I have three d acceleration enabled, which, because I have enough. Good enough graphs card in the host machine. I can use some of that processing part towards my
05:33
VM. Now you're not gonna be playing games inside your virtual machine, but a lot of these new roos is they just look nicer if you have three d acceleration. So if you're using it for
05:44
slightly higher end type activity, then you can also use through the acceleration could also set the resolution. If I always want to appear in a certain resolution like two and 24 by 7 68 I can set that here. Also,
05:57
if you have a virtual machine on and it gets a virus, does that in fact, the whole
06:03
machine like your non virtual.
06:06
So that is a very good question. So
06:11
there are ways that
06:13
there are ways to transfer between the host OS and the virtual guests.
06:18
It's not widespread. It is not very common. Your typical type of viruses and malware won't
06:25
past that barrier between as you very tailored
06:28
to be looking for a virtual machine environment. Try to get to the host of West. But
06:33
generally speaking, though in most cases it is a good way to do any kind of virus analysis, or see if malicious activity is running it by doing running that program in a virtual environment because
06:46
most of them will not. 99% won't make that threshold
06:50
to the host of West
06:53
if you're using it. If
06:56
and if you're doing it to test the virus. Something like that. You also want to make sure you have it toe host only mode for your network, so it doesn't go out because if you have it as a nap, if you have the network enabled outside the host and
07:05
it's not gonna do with the virtual machines could go out over the network like a regular machine and come back into your host computer like a regular type of
07:14
virus would do.
07:16
We're gonna be using as a production environment like another really good case. Use
07:21
another good case of using the virtual machine environment that I've seen Is
07:26
they locked? They create a virtual machine that's really locked down and all can do is run the Web
07:32
and in some corporate environments will use that as a way to do safe web surfing so you can't take anything in or out of that virtual machine through, you can download go every website you want because it's gonna maintain that virtual machine. And then when you're done surfing, you turn off the machine and it just goes back to its original configuration.
07:51
That way you have a separation between your everyday work environment, and then you could have, like an unfiltered
07:58
Web access, sir.
07:59
Give a little more leeway on the Web access because you're only allowing through that
08:03
persuasion. You could assign the virtual machine to be on a separate network to that
08:07
goes out of different pipe. You know, when you're
08:09
on your corporate Internet,
08:13
any other questions.

Up Next