> Is this important if, say, a malicious user has access to a container? > Or, can a container be configured such that they could do little harm?
You can easily make a container have its own filesystem and no access to the host's filesystem or devices. Is that what you are getting at? John ------------------------------------------------------------------------------ The modern datacenter depends on network connectivity to access resources and provide services. The best practices for maximizing a physical server's connectivity to a physical network are well understood - see how these rules translate into the virtual world? http://p.sf.net/sfu/oracle-sfdevnlfb _______________________________________________ Lxc-users mailing list Lxc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-users