Virtual machine safety isolation system under network environment
A technology of security isolation and network environment, which is applied in the field of computer security in the network environment, and can solve problems such as limiting the time and place of surfing the Internet
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] Referring now to the drawings, a description will be given in detail according to the present invention.
[0020] According to attached figure 1 , a virtual machine security isolation system in a network environment, comprising:
[0021] (1) Before the Internet is connected to the real computer, access the virtual machine and firewall, where the firewall is a network firewall, and scan the network communication flowing through it, so that some attacks can be filtered out to prevent it from being executed on the target computer, the firewall You can also close unused ports, prohibit outbound communications from specific ports, and block Trojan horses. In addition, the firewall can block access from special sites, thus preventing all communications from unknown intruders;
[0022] (2) Connect the firewall to the virtual machine, and the virtual machine is connected to the real computer through the data copy system;
[0023] (3) Install a fake streaking computer on the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 