Virtualization software and operating systems

Assignment Help Computer Network Security
Reference no: EM13316748

To load an OS into the Virtual Machine (VM), you'll need anoperating system. When you create your virtual machine, you'll either need an operating system .iso file, or a CD with the loaded operating system. For this exercise, you'll be using a separate Windows operating system (Windows Vista, Windows 7, or Windows Server) as a Virtual system. You will be downloading and installing an .iso file from the same MSDNAA site as Virtual PC.

1. Log into the site, and click on the Operating Systems under Categories on the left. Select one of the Operating Systems on that page. Make sure it's one you're comfortable with. Follow the process to download the Operating System image (it's similar to Virtual PC).This time,there is a license number, so copy and save that number!The downloaded .iso will be in its own folder with the name "Windows ..."

2. Start the Virtual PC. You should see a window pop up with a title of ‘New Virtual Machine Wizard'. If you don't see the wizard, click on New...

3. Read the text and click Next.

4. You'll see three options. For this exercise, select ‘Create a virtual machine'. Click Next.

5. Name your new machine Windows7 (or whichever OS you are using) and click Next.

6. A window will appear that shows the default values for memory, virtual disk size, and sound card for the Windows OS. You might look through the different operating systems just to see what would be recommended for them. Before you move on, make sure that Windows XP is selected, then click Next.

7. You can now adjust the RAM for your virtual machine. By default Windows image has 128 MB of RAM. Adjust the RAM to 512 MB, then click Next.

8. You now have the option to either use an existing virtual hard disk, or creating a new one. Select ‘A new virtual hard disk', then click Next.

9. The new window will show you where the hard disk will be saved. Use the defaults, and click Next.

10. The wizard will be complete. Click Finish.
You should now see your Virtual PC Console window that shows your new virtual machine. At this point, it hasn't been started, and there is no operating system installed.

1. Click on Start.

2. You'll see your new machine start with some loading information appearing in a new window.Wait for the virtual machine to complete loading itself.

a. Note: If it appears stuck on DHCP...., then hit the Esc key.

b. Next, you'll either get a message about a disk image or the need to "Reboot and Select proper Boot device. When you get the message, click on the CD drop-down menu and select "Capture ISO Image...". Browse through your directory to your saved Windows Image or .iso file and select it.

c. After selecting the boot image, you may need to restart the virtual image, so it knows what iso file to use. This is done by selecting Action drop-down menu and "Ctrl+Alt+Del."

3. In a little while, you should see your new virtual operating system starting to load. Follow the default options for the install. Here's where you'll need that license number.

4. When you are installing, you are free to use your host machine and move back and forth between the two operating systems. To do this, you need to use the ‘hostkey'. With Virtual PC, it's the right (not the left) ALT key. To practice, click your cursor in the virtual machine, now try and move to your host machine... nothing happens!

5. To get to your host machine, hold down the right ALT key and move the mouse.

6. If you need information on loading other operating systems, you might go to: https://www.essjae.com/virtualization/.

7. You'll need to load two operating systems into your virtual machine. You can go back out to the MSNDAA site and download Windows Server 2003, or if you feel comfortable, try a Linux operating system.

a. Ubuntu Linux images are available here: https://www.ubuntu.com/download

b. Other distributions are available here: https://iso.linuxquestions.org/

8. To complete the exercise, supply each of the following:

a. Write a one page synopsis of your experience in loading the virtualization software and operating systems. Include what you learned in the process.

b. Take a snapshot of your Virtual PC Console with two machines running and include it in your written synopsis. To give you an example, here's a picture with one running.

Reference no: EM13316748

Questions Cloud

What annual volume savings will plant have achieve : The Pomdeterra wastewater treatment plant produces a thick sludge that has a suspended solids concentration of 3.8%. They are investigating a filter press that will yield a solids concentration of 24%.
Polygon traverse are measured : Five interior angles of a six-sided closed polygon traverse are measured as: A=117°20’33”, B=119°47’50”, C=66°36’29”, D=171°52’14”, E=92°55’18”. The angle at F was not measured. If all measurements are assumed to be correct what is the value of angle..
What is the weight of the displaced air : On a perfect fall day, you are hovering at low altitude in a hot-air balloon, accelerated neither upward nor downward. What is the weight of the displaced air
Virtualization software and operating systems : Write a one page synopsis of your experience in loading the virtualization software and operating systems. Include what you learned in the process.
Can the new device be justified at a toll gate : Cars arrive at a toll gate on a freeway according to a Poisson distribution with mean 90 per hour. Average time for passing through the gate is 38 seconds. Drivers complain of the longwaiting time.
Determine how many candy bars needs to take with woman : A 68 kg woman is planning to bicycle for an hour. If she is to meet her entire energy needs while bicycling by eating 30 g chocolate candy bars, determine how many candy bars she needs to take with her.
How deep hole in yards would be formed as result of excavatn : The Metrodome's inflatable roof covers 10.0 acres and its interior volume is 60.0x10^3 cubic feet. During construction, 40.0x10^3 cubic yards of concrete, 11.9x10^3 tons of reinforcing steel, and 5.00x10^2 tons of structural steel were utilized.
Compare and evaluate proprietary project management software : You need to select a tool for project planning and scheduling from various tools available in the market. What factors would you consider in selecting the most appropriate software tool for your company?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  How will ad organizational units be organized

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized

  Network security

SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protect network, creating a DMZ during firewall implementation, use of SSL to se..

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Write application-layer protocols use to move message

Explain how message gets from Alice's host to Bob's host. Make sure to list series of application-layer protocols which are used to move message between the two hosts.

  Experiences with the social networking sites

Your experiences with the social networking sites like Craig list etc etc and Why do you think social networking sites are so popular? In other words, what is their stickiness?

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Explain main targets seem to be larger or smaller companies

Research three recent information security breaches. Do the main targets seem to be larger or smaller companies? Is there a particular industry that seems predominately targeted?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd