VirtualBox

Changeset 38559 in vbox


Ignore:
Timestamp:
Aug 29, 2011 1:38:00 PM (13 years ago)
Author:
vboxsync
Message:

doc/manual/security: minor corrections

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/doc/manual/en_US/user_Security.xml

    r38556 r38559  
    2323                software versions and patches up to date. Activate the VirtualBox
    2424                update notification to get notified when a new VirtualBox release
    25                 is available. When updating VirtualBox, don't forget to update
     25                is available. When updating VirtualBox, do not forget to update
    2626                the Guest Additions. Keep the host operating system as well as the
    2727                guest operating system up to date.
     
    4747              <para>
    4848                The principle of least privilege states that users should be given the
    49                 least amount of privilege to perform their jobs. Execute VirtualBox
    50                 always as regular user. We strongly discourage from executing
     49                least amount of privilege necessary to perform their jobs. Always execute VirtualBox
     50                as a regular user. We strongly discourage anyone from executing
    5151                VirtualBox with system privileges.
    5252              </para>
     
    5858            <glossdef>
    5959              <para>
    60                 System security stands on three legs: good security protocols, proper
     60                System security builds on three pillars: good security protocols, proper
    6161                system configuration and system monitoring. Auditing and reviewing audit
    62                 records address this third requirement. Each component within a system
     62                records address the third requirement. Each component within a system
    6363                has some degree of monitoring capability. Follow audit advice in this
    6464                document and regularly monitor audit records.
     
    101101      regular case is to install the complete VirtualBox package. The installation
    102102      must be done with system privileges. All VirtualBox binaries should be
    103       executed as regular user and never as privileged user.
     103      executed as a regular user and never as a privileged user.
    104104    </para>
    105105    <para>
    106106      The Oracle VM VirtualBox extension pack provides additional features
    107107      and must be downloaded and installed separately, see
    108       <xref linkend="intro-installing"/>. Like the for base package, the SHA256
     108      <xref linkend="intro-installing"/>. As for the base package, the SHA256
    109109      checksum of the extension pack should be verified. As the installation
    110110      requires system privileges, the VirtualBox GUI will ask for the system
     
    118118      Normally there is no post installation configuration of VirtualBox components
    119119      required. However, on Solaris and Linux hosts it is necessary to configure
    120       the proper permissions for users executing VMs which should be able to
     120      the proper permissions for users executing VMs and who should be able to
    121121      access certain host resources. For instance, Linux users must be member of
    122122      the <emphasis>vboxusers</emphasis> group to be able to pass USB devices to a
     
    167167        <para>
    168168          If bridged networking is used, the VM acts like a computer inside
    169           the same networking as the host, see <xref linkend="network_bridged"/>.
     169          the same network as the host, see <xref linkend="network_bridged"/>.
    170170          In this case, the guest has the same network access as the host and
    171171          a firewall might be necessary to protect other computers on the
     
    176176        </para>
    177177        <para>
    178           Some setups don't require a VM to be connected to the public network
     178          Some setups do not require a VM to be connected to the public network
    179179          at all. Internal networking (see <xref linkend="network_internal"/>)
    180180          or host-only networking (see <xref linkend="network_hostonly"/>)
     
    196196        <title>Clipboard</title>
    197197        <para>
    198           The shared clipboard allows to share data between the host and
     198          The shared clipboard allows users to share data between the host and
    199199          the guest. Enabling the clipboard in "Bidirectional" mode allows
    200200          the guest to read and write the host clipboard. The "Host to guest"
    201201          mode and the "Guest to host" mode limit the access to one
    202202          direction. If the guest is able to access the host clipboard it
    203           could also access sensitive data from the host which are shared over
     203          could also access sensitive data from the host which is shared over
    204204          the clipboard.
    205205        </para>
     
    314314       
    315315        <listitem>
    316           <para>All traffic sent over an UDP Tunnel network attachment is not
     316          <para>Traffic sent over a UDP Tunnel network attachment is not
    317317          encrypted. You can either encrypt it on the host network level (with
    318318          IPsec), or use encrypted protocols in the guest network (such as
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette