Thank You for Your time and answer, Boyd: >VServer and OpenVZ requires the guests to know they are running in a >virtualized environment, since they share a kernel with the host. They don't >support unmodified guest OSes.
In case of guest crack - will the attacker identify that he is in the virtual environment? >The KVM kernel module does that, and more, through >the use of the VT extensions. What do You think makes more overhead comparing KVM and Xen? -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org