Is it true that using virtual systems like virtual box or vmware makes you safe from hackers?

in #hacker6 years ago

Is it true that using virtual systems like virtual box or vmware makes you safe from hackers?

Many people currently use virtual systems such as virtual box or vmware either to experience a certain system before stability as a main system or for reasons of security, such as the experience of programs downloaded from the Internet and want to make sure that it is safe from viruses or even Trojans, what we will focus on in this post is the second category Of the people of religion believe that their use of phantom systems can protect them from penetration, and here we will ask a very important question: Does your use of phantom systems prevents hackers from reaching you.
First of all, the phantom system installed on the system is called the guest machine. The basic system is called the host device, ie, the process of penetration on the main system (the host machine), makes the hacker able to access the imaginary system and this is obvious because it controlled the main device , But the question that arises is whether the reverse process is possible, that is, when hacker penetration of the imaginary system can penetrate the main system and whether hacker can penetrate the system.
هل صحيح ان استخدامك للانظمة الوهمية ك virtual box أو vmware يجعلك في مأمن عن الهاكرز ؟.png

The answer is yes. Hackers can penetrate the phantom systems only because these phantom systems use real resources (software, software ...) and are used as real hardware, ie they are vulnerable to various electronic attacks through which these fake systems can be controlled.
The answer to the second question is the possibility of hacker hacking the basic system from the penetration of the system of illusion, we say that it is very likely, but we know that the two systems are using the same resources and hardware has been in one of the security experiments exploit a certain loophole on the imaginary systems and implemented a buffer overflow attack This led to the control of the hacker on the two systems together the illusionary and basic, and raises the possibility of this happening is when we make both the main and imaginary machines in the same network with the possibility of sharing files between them.
From here you can say that there is no safe way 100%, make you safe from hackers, and what you can do in this case is to make sure to download the latest updates to the phantom programs.

Sort:  

Congratulations @aminfaqiri! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 2 years!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Do not miss the last post from @steemitboard:

The Steem community has lost an epic member! Farewell @woflhart!
SteemitBoard - Witness Update
Do not miss the coming Rocky Mountain Steem Meetup and get a new community badge!
Vote for @Steemitboard as a witness to get one more award and increased upvotes!

Coin Marketplace

STEEM 0.17
TRX 0.16
JST 0.031
BTC 61586.28
ETH 2569.21
USDT 1.00
SBD 2.55