> Is this important if, say, a malicious user has access to a container?
> Or, can a container be configured such that they could do little harm?

You can easily make a container have its own filesystem and no access
to the host's filesystem or devices. Is that what you are getting at?

John

------------------------------------------------------------------------------
The modern datacenter depends on network connectivity to access resources
and provide services. The best practices for maximizing a physical server's
connectivity to a physical network are well understood - see how these
rules translate into the virtual world? 
http://p.sf.net/sfu/oracle-sfdevnlfb
_______________________________________________
Lxc-users mailing list
Lxc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-users

Reply via email to