ICore Virtual Accounts
Encyclopedia
iCore Virtual Accounts is free download OS level virtualization (container-based virtualization) for Microsoft Windows
Microsoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...

 XP.

Program

The program is an isolated virtual machine
Virtual machine
A virtual machine is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software emulation or hardware virtualization or both together.-VM Definitions:A virtual machine is a software...

 that runs on top of the existing hardware
Hardware
Hardware is a general term for equipment such as keys, locks, hinges, latches, handles, wire, chains, plumbing supplies, tools, utensils, cutlery and machine parts. Household hardware is typically sold in hardware stores....

 and operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...

. It allows the user to create multiple virtual
Virtual
The term virtual is a concept applied in many fields with somewhat differing connotations, and also, differing denotations.The term has been defined in philosophy as "that which is not real" but may display the salient qualities of the real....

 "accounts" (virtual machines) that can be easily created or deleted without affecting each others’ state or the state of the core
Core
- Science and Academics :* Core , in mathematics, an object in group theory* Core , in mathematics, a subset of the domain of a closable operator* Core , in mathematics, the homomorphically minimal subgraph of a graph...

 operating system.

Such machines create and capture the output of a virtual "account" inside a virtual disk. Only the changes to specific files and programs accessible to that virtual account will be stored in the virtual disk attached to that account. One can install programs inside it that will be sandbox
Sandbox (computer security)
In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers, untrusted users and untrusted websites....

ed from the entire system, existing only inside the virtual disk. Each virtual account has full dedicated PC functionality with its own processes, files, and applications. This is accomplished by using a virtualization layer in the kernel of the host OS.

In contrast, programs accessible to all users of the computer will be usable in the virtual accounts without taking up space there, but the settings and bookmarks for the users of that account will stay inside the virtual disk.

Technical overview

For every application and/or user, the program is an autonomous OS
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...

, with its own registry, process, files, services and so on.

Software from vendors can run inside a container without modification.

See also

  • Comparison of platform virtual machines
  • Operating system-level virtualization
    Operating system-level virtualization
    Operating system-level virtualization is a server virtualization method where the kernel of an operating system allows for multiple isolated user-space instances, instead of just one. Such instances may look and feel like a real server, from the point of view of its owner...

  • Sandbox (computer security)
    Sandbox (computer security)
    In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers, untrusted users and untrusted websites....

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK