Serverspace Black Friday
BM
Boris Moore
October 16, 2022
Updated October 24, 2022

Virtualization

Virtualization is a technology that allows you to run multiple operating systems on a single physical server. Allocating server/personal computer resources to an isolated environment, it works the same way as a simple personal computer, that is, to run a virtual machine you need to isolate some of the resources of the main physical device.

Isolation can be physical devices (hardware virtualization: CPU, Ram, HDD), or software resources. Virtualization originated in the 1960s and 1970s and is still evolving today, helping us create our own virtual machines, clouds, and data centers.

Types of hardware virtualization

Normal server or pc operation:

  • Physical "Hardware" (Motherboard; Processor; RAM; Storage)
  • Operating system (The system installed on your media, Linux, Windows, etc.)
  • Applications under the operating syste

Virtualization of the first type

For virtualization of the first type, you do not need to use a shell of another operating system.

  • Physical "Hardware" (Motherboard; Processor; RAM; Storage)
  • Hypervisor

It will require a server with all the necessary components, just like a simple PC. An operating system for virtualization, Hypervisor, is installed on this device. Under this hypervisor, hardware virtualization is done, which creates many isolated environments, that is, virtual machines.

Virtualization of the second type

A virtual machine requires the same resources as a simple PC:

  • Physical "Hardware" (Motherboard; Processor; RAM; Storage)
  • Operating System (The system installed on your media, Linux, Windows, etc.)
  • Virtualization Soft (Hypervisor)
  • Any OS (Any operating system for the virtual machine)

The virtual machine runs thanks to virtualization applications (VmWARE; VirtualBOX; HyperV), they isolate some of the resources of your computer in exchange for another system to run.

Virtualization is not only for system administrators, it can also help the average user to secure a working PC.

Let's take one example

You as a user have downloaded a file from a suspicious site, and you think it might have a virus. To avoid infecting your work computer, you can create a virtual machine with the operating system you want and run the file on it, thereby infecting the virtual computer and not the work computer. After infecting a virtual machine, the user has a choice between deleting the virtual machine or going back to a system restore point (otherwise known as a Snapshot).

 

We use cookies to make your experience on the Serverspace better. By continuing to browse our website, you agree to our
Use of Cookies and Privacy Policy.