 Oracle VM VirtualBox 4.3.2 User Manualhosts . . . . . . . . 218 13 Security guide 219 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 220 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 5Cloning0 码力 | 351 页 | 5.95 MB | 1 年前3 Oracle VM VirtualBox 4.3.2 User Manualhosts . . . . . . . . 218 13 Security guide 219 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 220 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 5Cloning0 码力 | 351 页 | 5.95 MB | 1 年前3
 Oracle VM VirtualBox 4.3.0 User Manualhosts . . . . . . . . 215 13 Security guide 216 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 217 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 5Cloning0 码力 | 346 页 | 5.94 MB | 1 年前3 Oracle VM VirtualBox 4.3.0 User Manualhosts . . . . . . . . 215 13 Security guide 216 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 217 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 5Cloning0 码力 | 346 页 | 5.94 MB | 1 年前3
 Oracle VM VirtualBox 5.1.32 User Manual232 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 232 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 10 Technical background VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 262 13 Security guide 264 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 13.2 . . . . . . . . . . . . . . . . . 265 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 363 页 | 4.18 MB | 1 年前3 Oracle VM VirtualBox 5.1.32 User Manual232 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 232 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 10 Technical background VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 262 13 Security guide 264 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 13.2 . . . . . . . . . . . . . . . . . 265 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 363 页 | 4.18 MB | 1 年前3
 Oracle VM VirtualBox 5.1.26 User Manual232 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 232 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 10 Technical background VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 262 13 Security guide 264 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 13.2 . . . . . . . . . . . . . . . . . 265 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 361 页 | 4.18 MB | 1 年前3 Oracle VM VirtualBox 5.1.26 User Manual232 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 232 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 10 Technical background VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 262 13 Security guide 264 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 13.2 . . . . . . . . . . . . . . . . . 265 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 361 页 | 4.18 MB | 1 年前3
 Oracle VM VirtualBox 4.3.18 User Manualhosts . . . . . . . . 224 13 Security guide 225 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 226 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 A wizard0 码力 | 369 页 | 6.00 MB | 1 年前3 Oracle VM VirtualBox 4.3.18 User Manualhosts . . . . . . . . 224 13 Security guide 225 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 226 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 A wizard0 码力 | 369 页 | 6.00 MB | 1 年前3
 Oracle VM VirtualBox 4.3.22 User Manualhosts . . . . . . . . 224 13 Security guide 225 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 226 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 A wizard0 码力 | 372 页 | 6.01 MB | 1 年前3 Oracle VM VirtualBox 4.3.22 User Manualhosts . . . . . . . . 224 13 Security guide 225 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 226 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 A wizard0 码力 | 372 页 | 6.01 MB | 1 年前3
 Oracle VM VirtualBox 4.3.12 User Manualhosts . . . . . . . . 223 13 Security guide 224 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 225 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 A wizard0 码力 | 364 页 | 5.99 MB | 1 年前3 Oracle VM VirtualBox 4.3.12 User Manualhosts . . . . . . . . 223 13 Security guide 224 13.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 13.1.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . 225 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . running. 1.13 Cloning virtual machines To experiment with a VM configuration, test different guest OS levels or to simply backup a VM, VirtualBox can create a full or a linked copy of an existing VM.5 A wizard0 码力 | 364 页 | 5.99 MB | 1 年前3
 Oracle VM VirtualBox 5.2.40 User Manual240 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 240 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 9.35 VISO file format / 2 VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 275 13 Security guide 277 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 13.2 . . . . . . . . . . . . . . . . . 278 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 387 页 | 4.27 MB | 6 月前3 Oracle VM VirtualBox 5.2.40 User Manual240 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 240 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 9.35 VISO file format / 2 VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 275 13 Security guide 277 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 13.2 . . . . . . . . . . . . . . . . . 278 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 387 页 | 4.27 MB | 6 月前3
 Oracle VM VirtualBox 5.2.42 User Manual240 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 240 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 9.35 VISO file format VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 275 13 Security guide 277 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 13.2 . . . . . . . . . . . . . . . . . 278 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 387 页 | 4.27 MB | 1 年前3 Oracle VM VirtualBox 5.2.42 User Manual240 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 240 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 9.35 VISO file format VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 275 13 Security guide 277 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 13.2 . . . . . . . . . . . . . . . . . 278 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 387 页 | 4.27 MB | 1 年前3
 Oracle VM VirtualBox 5.2.34 User Manual240 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 240 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 9.35 VISO file format VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 275 13 Security guide 277 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 13.2 . . . . . . . . . . . . . . . . . 278 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 386 页 | 4.27 MB | 1 年前3 Oracle VM VirtualBox 5.2.34 User Manual240 9.34.1 Setting up USB/IP support on a Linux system . . . . . . . . . . . . . . . 240 9.34.2 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 9.35 VISO file format VM aborts with out of memory errors on Solaris 10 hosts . . . . . . . . 275 13 Security guide 277 13.1 General Security Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 13.2 . . . . . . . . . . . . . . . . . 278 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . .0 码力 | 386 页 | 4.27 MB | 1 年前3
共 108 条
- 1
- 2
- 3
- 4
- 5
- 6
- 11













