On Fri, Aug 13, 2010 at 11:58 AM, Enrico Weigelt <weig...@metux.de> wrote:
> * Mark Knecht <markkne...@gmail.com> wrote:
>
> Hi,
>
>>    Since I'm not an IT guy could you please explain this just a bit
>> more? What is 'a container'? Is it a chroot running on the same
>> machine? A different machine? Something completely different?
>
> http://lxc.sourceforge.net/
> http://wiki.openvz.org/Main_Page
>
> Unlike VM solutions like kvm, vmware, etc, these (OS-side)
> container implementations split off the operating system
> resources (filesystem, network interfaces, process-IDs, ...)
> into namespaces, so each container only sees its own resources,
> not those of the host system or other containers.
>
> That's essentially what's behind the "virtual private server"
> solutions offered by various ISPs.
>
>>    In the OP's case (I believe) he thought a personal machine at home
>> was compromised. If that's the case then without doubling my
>> electrical bill (2 computers) how would I implement your containers?
>
> He would have several virtual servers running on just one metal.
> If the host system is not accessible from the outside world, just
> the virtual servers - an attacker could probably highjack what's
> inside the virtual servers, but cant get to the host system.
>
>
> cu

Thank you Enrico. I'll have to learn about this.

Cheers,
Mark

Reply via email to