eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

196
active users

#hypervisor

0 posts0 participants0 posts today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a>'s <a href="https://mastodon.thenewoil.org/tags/pKVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pKVM</span></a> <a href="https://mastodon.thenewoil.org/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> earns <a href="https://mastodon.thenewoil.org/tags/SESIP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SESIP</span></a> Level 5 security certification</p><p><a href="https://www.bleepingcomputer.com/news/security/androids-pkvm-hypervisor-earns-sesip-level-5-security-certification/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/androids-pkvm-hypervisor-earns-sesip-level-5-security-certification/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Linux Magazine<p>ICYMI: <span class="h-card" translate="no"><a href="https://opensocial.at/profile/linuxnews" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>linuxnews</span></a></span> shows you how to install a containerized Linux distribution with Distrobox<br><a href="https://www.linux-magazine.com/Issues/2025/295/Distrobox?utm_source=mlm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Issues/2025</span><span class="invisible">/295/Distrobox?utm_source=mlm</span></a><br><a href="https://fosstodon.org/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> <a href="https://fosstodon.org/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> <a href="https://fosstodon.org/tags/Lilipod" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lilipod</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/containers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>containers</span></a> <a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://fosstodon.org/tags/Distrobox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Distrobox</span></a> <a href="https://fosstodon.org/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>So far, I have already written 15 articles (1045 pages), which have been published on my blog:</p><p>blog: <a href="https://exploitreversing.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com</span><span class="invisible"></span></a></p><p>Series:</p><p>[+] ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway).</p><p>[+] MAS: Malware Analysis Series (606 pages -- finished).</p><p>I'll soon begin writing the next articles in the Exploiting Reversing series. </p><p>Enjoy reading and have a great day.</p><p><a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://mastodon.social/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://mastodon.social/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>So far, I have already written 15 articles (1045 pages), which have been published on my blog:</p><p>blog: <a href="https://exploitreversing.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com</span><span class="invisible"></span></a></p><p>ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): </p><p>[+] ERS 05: <a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a><br>[+] ERS 04: <a href="https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/02/0</span><span class="invisible">4/exploiting-reversing-er-series-article-04/</span></a><br>[+] ERS 03: <a href="https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/2</span><span class="invisible">2/exploiting-reversing-er-series-article-03/</span></a><br>[+] ERS 02: <a href="https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/01/0</span><span class="invisible">3/exploiting-reversing-er-series-article-02/</span></a><br>[+] ERS 01: <a href="https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/04/1</span><span class="invisible">1/exploiting-reversing-er-series/</span></a></p><p>MAS: Malware Analysis Series (606 pages -- finished): </p><p>[+] MAS 10: <a href="https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/1</span><span class="invisible">5/malware-analysis-series-mas-article-10/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a><br>[+] MAS 08: <a href="https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/08/0</span><span class="invisible">7/malware-analysis-series-mas-article-08/</span></a><br>[+] MAS 07: <a href="https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/01/0</span><span class="invisible">5/malware-analysis-series-mas-article-7/</span></a><br>[+] MAS 06: <a href="https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/11/2</span><span class="invisible">4/malware-analysis-series-mas-article-6/</span></a><br>[+] MAS 05: <a href="https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/09/1</span><span class="invisible">4/malware-analysis-series-mas-article-5/</span></a><br>[+] MAS 04: <a href="https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/1</span><span class="invisible">2/malware-analysis-series-mas-article-4/</span></a><br>[+] MAS 03: <a href="https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/0</span><span class="invisible">5/malware-analysis-series-mas-article-3/</span></a><br>[+] MAS 02: <a href="https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/02/0</span><span class="invisible">3/malware-analysis-series-mas-article-2/</span></a><br>[+] MAS 01: <a href="https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2021/12/0</span><span class="invisible">3/malware-analysis-series-mas-article-1/</span></a></p><p>I'll soon begin writing the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I've laid all the necessary groundwork. </p><p>Enjoy reading and have a great day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
CryptGoat<p>For anyone still using or considering the free <a href="https://fedifreu.de/tags/oVirt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oVirt</span></a> as virtualization management platform:⚠️ Please don't. It is a broken nightmare on community life support.⚠️</p><p>After <a href="https://fedifreu.de/tags/RedHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHat</span></a> has ended support for its commercial spin Red Hat Virtualization (RHV) last year the development of oVirt practically came to a halt.</p><p>There hasn't been an official stable release for over a year despite security issues, and numerous bugs. The official recommendation is to use nightly releases to get the latest fixes. Too bad you won't be able to roll back via DNF if an update fails because older nightly releases are gone from the repo.</p><p>And yes, nightly releases do break oVirt at times. The latest nightly causes updates to fail because of incomplete dependency changes.</p><p>The web interface of the official mailing list is offline most of the time, the documentation is a confusing and outdated mess.</p><p>Upgrades to newer Linux distribution releases such as RHEL 9 or even 10 based systems are extremely painful and not officially supported.</p><p>Move your VMs to <a href="https://fedifreu.de/tags/ProxmoxVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxmoxVE</span></a> or any other actively maintained KVM based solution.</p><p><a href="https://fedifreu.de/tags/Virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualization</span></a> <a href="https://fedifreu.de/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a> <a href="https://fedifreu.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fedifreu.de/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisor</span></a> <a href="https://fedifreu.de/tags/Admin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Admin</span></a> <a href="https://fedifreu.de/tags/oVirtEngine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oVirtEngine</span></a></p>
CryptGoat<p>Und zack, da ist schon die offizielle Veröffentlichung von <a href="https://fedifreu.de/tags/ProxmoxVE9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxmoxVE9</span></a> auf Basis von <a href="https://fedifreu.de/tags/Debian13" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian13</span></a>: <a href="https://forum.proxmox.com/threads/proxmox-virtual-environment-9-0-released.169257/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.proxmox.com/threads/prox</span><span class="invisible">mox-virtual-environment-9-0-released.169257/</span></a></p><p>Natürlich gibt es tonnenweise Änderungen, u.a. ein aufgefrischtes Mobile-UI: <a href="https://pve.proxmox.com/wiki/Roadmap#Proxmox_VE_9.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pve.proxmox.com/wiki/Roadmap#P</span><span class="invisible">roxmox_VE_9.0</span></a><br>Ein Upgrade von 8.4 soll nahtlos klappen.</p><p><a href="https://fedifreu.de/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://fedifreu.de/tags/Trixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trixie</span></a> folgt vermutlich am 9. August.</p><p><a href="https://fedifreu.de/tags/Virtualisierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualisierung</span></a> <a href="https://fedifreu.de/tags/Virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virtualization</span></a> <a href="https://fedifreu.de/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisor</span></a> <a href="https://fedifreu.de/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> <a href="https://fedifreu.de/tags/ProxmoxVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxmoxVE</span></a> <a href="https://fedifreu.de/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a> <a href="https://fedifreu.de/tags/QEMU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QEMU</span></a> <a href="https://fedifreu.de/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://fedifreu.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
R1 Open Source Project<p>Proxmox VE 9.0 released based on Debian 13 "Trixie", with snapshots for thick-provisioned LVM shared storage, affinity rules in HA clusters, new fabrics function for SDN, support for adding new devices to a ZFS RAID-Z Pool with minor downtime</p><p><a href="https://www.proxmox.com/en/about/company-details/press-releases/proxmox-virtual-environment-9-0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">proxmox.com/en/about/company-d</span><span class="invisible">etails/press-releases/proxmox-virtual-environment-9-0</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/proxmoxve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmoxve</span></a> <a href="https://mastodon.bsd.cafe/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a> <a href="https://mastodon.bsd.cafe/tags/debian13" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian13</span></a> <a href="https://mastodon.bsd.cafe/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> <a href="https://mastodon.bsd.cafe/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.bsd.cafe/tags/virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtualization</span></a></p>
Chris :damnified:<p>Die Aussage vom <a href="https://metalhead.club/tags/Broadcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Broadcom</span></a> CTO in EMEA, dass der Preis fuer VMware zu hoch sei, weil viele nicht alle Features nutzen finde ich witzig. Ich stelle mir vor, ich bin ein Unternehmen nutzte vorher alle Features von <a href="https://metalhead.club/tags/VMware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VMware</span></a> z.b. von vSphere und muss jetzt 150% mehr bezahlen ... dann habe ich den kompletten Vendor-Lock-In und komme so schnell nicht weg und muss einfach nur mehr zahlen. Schoene neue Welt und schoene Ansichten werden hier versucht runterzuspielen. Source: <a href="https://www.golem.de/news/vmware-broadcom-liefert-einfache-antwort-auf-preiskritik-2506-197329.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/vmware-broadcom-</span><span class="invisible">liefert-einfache-antwort-auf-preiskritik-2506-197329.html</span></a></p><p>Mein Hint: <a href="https://metalhead.club/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a>, <a href="https://metalhead.club/tags/kvm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kvm</span></a>, <a href="https://metalhead.club/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Some Bits: Nelson's Linkblog<p>WSL open source: Microsoft's Windows Subsystem for Linux is now open source. Article includes a nice project history.<br><a href="https://blogs.windows.com/windowsdeveloper/2025/05/19/the-windows-subsystem-for-linux-is-now-open-source/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.windows.com/windowsdevel</span><span class="invisible">oper/2025/05/19/the-windows-subsystem-for-linux-is-now-open-source/</span></a><br> <a href="https://tech.lgbt/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a> <a href="https://tech.lgbt/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://tech.lgbt/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://tech.lgbt/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://tech.lgbt/tags/wsl2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wsl2</span></a> <a href="https://tech.lgbt/tags/wsl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wsl</span></a> <a href="https://tech.lgbt/tags/vm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vm</span></a> #+</p>

To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community.

ERS (439 pages, so far):

[+] ERS 05: exploitreversing.com/2025/03/1
[+] ERS 04: exploitreversing.com/2025/02/0
[+] ERS 03: exploitreversing.com/2025/01/2
[+] ERS 02: exploitreversing.com/2024/01/0
[+] ERS 01: exploitreversing.com/2023/04/1

MAS (606 pages -- finished):

[+] MAS 10: exploitreversing.com/2025/01/1
[+] MAS 09: exploitreversing.com/2025/01/0
[+] MAS 09: exploitreversing.com/2024/08/0
[+] MAS 07: exploitreversing.com/2023/01/0
[+] MAS 06: exploitreversing.com/2022/11/2
[+] MAS 05: exploitreversing.com/2022/09/1
[+] MAS 04: exploitreversing.com/2022/05/1
[+] MAS 03: exploitreversing.com/2022/05/0
[+] MAS 02: exploitreversing.com/2022/02/0
[+] MAS 01: exploitreversing.com/2021/12/0

The blog home page is: exploitreversing.com/

I will be back in a few months with the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I have laid all the necessary groundwork. I'm currently taking a break from writing to focus on research.

Enjoy reading and have an excellent day.

#windows#iOS#macOS

New learning unit in our #NetworkAutomation #eAcademy focused on #Xen, a highly efficient and scalable #hypervisor 👉 connect.geant.org/2024/10/04/n

Whether you’re just starting with virtualisation or looking to expand your expertise, this course will provide you with the skills to deploy and manage virtualised environments using Xen.

👤 Trainer: Bojana Koteska, UKIM
⏳Duration: 90min

New unit in our #Network #eAcademy: #KVM -#KernelBasedVirtualMachine!

The unit covers KVM’s features, setup and management, with practical exercises on installation, commands, and virtual machine creation.

Get started to enhance your skills and leverage KVM for effective #virtualisation solutions👉 connect.geant.org/2024/07/31/n

👤Trainer: Bojana Koteska, UKIM
⏳Duration: 50min