The difference between the shadow system, a sandbox, a virtual machine

Learn from Baidu to answer ---- memo.

 

New company, things are more standardized, people have more administrative rights for more stringent, learned this concept in the sandbox contacts and learn and become familiar with the stage,

Before university study, I used the VM virtual machine software, due later in your spare time playing the game, I learned by chance

Shadow system (due to the need to play the game fuzhu, lock the machine is directly detected this kind of thing is quite painful, ha ha ha ha), before germination also had a virtual machine VM

The idea to replace the shadow system, but for some reason (mainly because the machine with fixed), there is no engage in, and now work uses the sandbox, the sandbox feel the search mechanism shadow system and virtual machine almost on Baidu,

I am a bit curious to know this stuff.

 

Simple point, all operating in the shadow system which made to the system, restart the system will be restored to their original form. Before the operation made will be lost, in writing, which means that the shadow system, does not affect the operation of the shadow of the machine.

To the application sandbox is a virtual environment, to separate out a sandbox area in the system, all operating in a sandbox which does not affect the system outside the sandbox, but sandbox inside the operation or reservations.

Virtual machines can be operated as you understand the true independence of a machine, the machine has its own IP like something, you have made the operation of the machine is operating, the operation made will be retained, but the unit does not influences.

 

Specifically, for example, you install an application. This program will set a system modified from A to B:

Shadow system: After the restart, the program does not, the system settings or A.

Sandbox: this program is still in the program seems, system settings is B, but the program outside the sandbox to see the system settings or A

Virtual Machine: Virtual machines inside, have this program, the system is set up for all program B, the virtual machine to see inside the system settings are B. Physical machine, without this procedure, the system is set A.

 

Only problem for learning and recording invasion deleted!

Guess you like

Origin www.cnblogs.com/lh1481733989/p/11940714.html