logo

Virtual Machine - Overview, Use, and Installation

Investigate the use of virtualization software in the computing industry and how it can be used to host an operating system environment.

18 Pages2500 Words174 Views
   

Added on  2023-04-23

About This Document

This assignment provides an overview of virtual machine software, its use, and installation process. It includes an overview of VMware Workstation, its advantages, and key features. It also provides step-by-step instructions for installing Kali Linux in a virtual machine on a Windows-based system. The assignment concludes with a set of recommendations for using virtualization software.

Virtual Machine - Overview, Use, and Installation

Investigate the use of virtualization software in the computing industry and how it can be used to host an operating system environment.

   Added on 2023-04-23

ShareRelated Documents
Running head: VIRTUAL MACHINE
Virtual Machine
Name of the Student
Name of the University
Virtual Machine - Overview, Use, and Installation_1
1VIRTUAL MACHINE
Table of Contents
Introduction:....................................................................................................................................2
Overview of Virtualisation Software:..............................................................................................2
Use of Virtualisation Software:.......................................................................................................4
Windows-based Virtualisation Software:........................................................................................5
Conclusion:....................................................................................................................................14
Recommendations:........................................................................................................................15
References:....................................................................................................................................17
Virtual Machine - Overview, Use, and Installation_2
2VIRTUAL MACHINE
Introduction:
The virtual machine is the OS or operating system or an application environment which is
installed on software or OS. The virtual machine replicates the dedicated hardware. The virtual
machine is designed such a way that end user can experience the same interaction, they would
have achieved in the real hardware (Ahmad et al. 2015). The Kali Linux is the operating system,
Linux distribution, is based on the Debian. The purpose of the Kali Linux is providing security
auditing and advanced penetration testing. In terms of security, the Kali Linux OS is far more
superior to its alternatives (Babincev and Vuletic 2016). The operating system is consisting of
many information security tasks.
The proposed virtual machine environment is installed in the windows software. The
analysis is done on the Kali Linux installed within the VM. The assignment describes the
overview of the virtual machine software. It also provides a brief description of how the virtual
machine is used in real-life. In the windows based Virtualisation software, actual Kali Linux is
installed and step by step screenshots are provided. The assignment also concludes the
information provided within it along with a set of recommendations. The assignment provides a
complete idea of how to install both the VMware and Kali Linux.
Overview of Virtualisation Software:
The Virtualisation technologies are of five types such as Full software Virtualisation,
para-virtualised machine, resource Virtualisation, hardware virtual machine and paravirtual
drivers. The selected Virtual Machine technology for installing the Kali Linux is full software
Virtualisation. The VMware Workstation has been selected as the Full Software Virtualisation
tool. The VMware is an industry standard tool that can support multiple Operating System
Virtual Machine - Overview, Use, and Installation_3
3VIRTUAL MACHINE
running in the Virtualisation environment on a singular Windows or Linux based OS (Zain
2018). The information technology professionals, business and developers who work on cross-
platform environments, for testing the developed system in different OS or cloud can depend on
the Workstation Virtualisation Tool. The desktop Virtualisation VMware workstation provides is
designed for every potential user. The professional experts of IT receive a high-end productivity
tool. The developers also receive a rich and secure environment for development. The
workstation also supports BYO initiatives. The VMware workstation is also highly beneficial for
the home users and student, depending upon which is their desired use of the tool.
Key Advantages: The VMWare workstation can be used for connecting to ESXi, vSphere
or several other workstation servers. The workstation also allows driving the remote Windows or
Linux virtual machines, transferring the virtual machines to and from the Virtualisation servers
and command power operations. The user can create the exact same virtual machine setup every
time. This results into the time and effort saving. The ‘Linked Clones’ can be utilised for quickly
duplicating a virtual machine when lessening the physical disk space. The user can also create
fully isolated OS duplicate which can be distributed among other environments. The VMware
workstation also supports the tools and software that can replicate the real-world scenarios. The
VMware can be used for creating the complex IPv6 and IPv4 virtual networks (Naik, Kamath
and Patil 2017). The user can also install third party software application to implement complete
data centre topologies. Latency, packet loss and bandwidth restrictions can be introduced by
using the new features, related to network simulation, of VMware.
Main Features: The key features of the VMware are as following.
i. Restricted Access to VMware: The corporate contents can be protected through
the restriction of access to VMware Workstation. This feature can be used as
Virtual Machine - Overview, Use, and Installation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Deploy Kali Linux and PFSense on Virtual Machine
|18
|667
|469

Implementation of Virtualization in Software
|2
|926
|92

Computer Security-System Investigation
|12
|1368
|37

IT Network Security
|68
|3007
|50

Computer Security Project
|16
|3465
|79

Computer Security System Investigation
|17
|3418
|329