SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
SCENARIO
                                                                                                                                        RAPID RECOVERY SYSTEM                                                                                                                                                    Virtual Machine Appliances (VMAs) are one or more 
                                                                                                                                                                                                                                                                                                                 applications logically grouped into Virtual Machines. 
 John is a typical desktop computer user that uses his computer to 
 communicate with friends on IM and email, and surf the web.
                                                                                                                                                                               Todd Deshane                                                                                                                      VMAs specify the network resources and files that 
                                                                                                                                                                                                                                                                                                                 they need to access, the permissions on them, and 
                                                                                                                                                                             Clarkson University                                                                                                                 the rate at which they expect to use them. 
                                Ooooh! I got some pics from my buddy 
                                                Joe :)
                                                                                                                                                                                         SYSTEM ARCHITECTURE
                                                                                                                                                                                                                                                                                                        The File System Virtual Machine (FS­VM) stores and 
                                                                                                                                       Domain 0 (dom0) is the 
                                                                                                                                                                                                                                                                                                        protects the user's data. Access to the files is limited 
                                                                                                                                       privileged VM in Xen. It 
                                                                                                                                                                                                                                                                                                        to only those specific VMAs that need it. Backing up 
                                                                                                                                       manages VM resources and 
                                                                                                                                                                                                                                                                                                        the FS­VM backs up all of the user's important data at 
                                                                                                                                       also the starting, stopping, 
                                                                                                                                                                                                                                                                                                        one time.
 Without the Rapid Recovery System
                                                                                                                                       and restarting of VMs.


John didn't know that the pics were actually a trojan, and now his 
computer is part of a botnet that is sharing all of his personal information                                                                                                                                                                                                                                     The Network Virtual Machine (NET­VM) is given 
to the world.                                                                                                                                                                                                                                                                                                    direct and exclusive access to the network interface 
                                                                                                                                                                                                                                                                                                                 card (NIC). The NET­VM has a built­in firewall and 
                010010000100000101000011010010110100010101000100                                                                                                                                                                                                                                                 intrusion detection system. It monitors and enforces 
                   Credit Card Numbers, Email Contacts,                                                                                                                                                                                                                                                          the network resources that the VMAs use.  
                   Passwords




                                                                                Not only is John's information being                THE MINEFIELD OF PERSONAL COMPUTER USE                                                                                                                                            SYSTEM PERFORMANCE
                                                                                taken, but his computer resources are 
                                                                                being used to spread this trojan and 
                                                                                                                                     The seemingly innocent things you can do to render your PC unusable
                                                                                other viruses to other vulnerable 
                                                                                computers on the Internet.
                                                                                                                                    Scenario: Open an attachment containing a mass emailing virus
                                                                                                                                                           Without the Rapid Recovery System                                                      With the Rapid Recovery System
                                                                                                                                    Notice a slow down of the machine, unsure of cause.                                   The attachment is written into the email log. 
                                                                                                                                    Reboot machine, still slow.                                                           The NET­VM flags a violation of the network contract and pauses the VM.
                                                                                          A few hours later, John has re­
                                                                                                                                    Look in process list, attempt to kill suspicious process, regenerates itself.         The system asks the user if they want to rollback to the last known good image.
                                                                                          installed his operating system and all 
    John notices that his computer is                                                                                               Call tech support, make an appointment to take the computer into the shop.            Rollback and remount personal data store.
                                                                                          of his applications that he uses. He 
    running slower than usual. He is told that                                                                                      3 weeks later get the machine back with the OS re­installed.                          Some system data (logs, etc.) in VM appliance is lost, but no personal data is lost.
                                                                                          forgot to back up some digital photos 
    he should wipe his computer and re­                                                                                             Newest backup is 1 month old, some recent reports and pictures lost.                  The machine is back in working order in less than 1 hour.
                                                                                          that he took of his daughter's play. 
    install. He will need to find his operating                                           Ooops! But at least his computer is 
    system and application install CDs.                                                   working again, right?


                                                                                                                                    Scenario: Surf to the wrong web site
      With the Rapid Recovery System                                                                                                                        Without the Rapid Recovery System
                                                                                                                                    A malicious program begins to read over the hard drive for credit card numbers.
                                                                                                                                                                                                                                                  With the Rapid Recovery System
                                                                                                                                                                                                                          A malicious program begins to read over the hard drive for credit card numbers.
                                                                                                                                    The user does not notice any signs of trouble.                                        The FS­VM triggers a violation of the data access contract and pauses the VM.
                                                                                                                                    The program sends out a small amout of data containing the information discovered.    The system asks the user if they want to rollback to the last known good image.
                                                                                                                                    The program installs a backdoor for later use by the attacker.                        Rollback and remount personal data store.
                                                                                                                                                                                                                          The scan is not completed, the information is not sent, the backdoor is prevented.


                                                   John really wants to see the 
                                                   pics, so he ignores the error 
                                                                                                  Either of these actions cause 
                                                   and copies the “pics” to his 
                                                                                                  the Internet VM to be reset.      Scenario: Install a required software update
 John tries to load the pictures in his photo      Internet VM and clicks on them. 
                                                                                                  The built­in firewall of the                            Without the Rapid Recovery System                                                      With the Rapid Recovery System
 VM, but the action is denied, since the           The executable runs and it 
                                                                                                  Rapid Recovery System             After the update, several applications cannot find some required components.          After the update, several applications cannot find some required components.
 “pics” are actually executables. An error         instantly tries to run its built­in 
                                                                                                  disallows the Internet VM to      The user calls tech support and they confirm the problems with this patch.            The user calls tech support and they confirm the problems with this patch.
 message is displayed to John.                     IRC server and starts scanning 
                                                                                                  create a server. An error         The best recommendation is to completely uninstall and re­install the applications.   The user decides to rollback to the last known good image.
                                                   for personal data.
                                                                                                  message appears when the          It takes a few hours to assemble the installation media, to find the product keys,    The machine is back up and running in minutes.
                                                                                                  Internet restarts. John finds     and to follow the instructions.
                                                                                                  out that these were not pics. 

Mais conteúdo relacionado

Mais de Todd Deshane

Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)Todd Deshane
 
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)Todd Deshane
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane
 
Computer Security for Mission Assurance
Computer Security for Mission AssuranceComputer Security for Mission Assurance
Computer Security for Mission AssuranceTodd Deshane
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622Todd Deshane
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622Todd Deshane
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809Todd Deshane
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809Todd Deshane
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207Todd Deshane
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207Todd Deshane
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426Todd Deshane
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426Todd Deshane
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207Todd Deshane
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207Todd Deshane
 
Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Todd Deshane
 
Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Todd Deshane
 

Mais de Todd Deshane (20)

Usenix04 20040702
Usenix04 20040702Usenix04 20040702
Usenix04 20040702
 
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
 
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
Computer Security for Mission Assurance
Computer Security for Mission AssuranceComputer Security for Mission Assurance
Computer Security for Mission Assurance
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207
 
Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808
 
Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Atc ny friday-talk_20080808
Atc ny friday-talk_20080808
 
2010 xen-lisa
2010 xen-lisa2010 xen-lisa
2010 xen-lisa
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Csaw research poster_20071204

  • 1. SCENARIO RAPID RECOVERY SYSTEM Virtual Machine Appliances (VMAs) are one or more  applications logically grouped into Virtual Machines.  John is a typical desktop computer user that uses his computer to  communicate with friends on IM and email, and surf the web. Todd Deshane VMAs specify the network resources and files that  they need to access, the permissions on them, and  Clarkson University the rate at which they expect to use them.  Ooooh! I got some pics from my buddy  Joe :) SYSTEM ARCHITECTURE The File System Virtual Machine (FS­VM) stores and  Domain 0 (dom0) is the  protects the user's data. Access to the files is limited  privileged VM in Xen. It  to only those specific VMAs that need it. Backing up  manages VM resources and  the FS­VM backs up all of the user's important data at  also the starting, stopping,  one time. Without the Rapid Recovery System and restarting of VMs. John didn't know that the pics were actually a trojan, and now his  computer is part of a botnet that is sharing all of his personal information  The Network Virtual Machine (NET­VM) is given  to the world. direct and exclusive access to the network interface  card (NIC). The NET­VM has a built­in firewall and  010010000100000101000011010010110100010101000100 intrusion detection system. It monitors and enforces  Credit Card Numbers, Email Contacts,  the network resources that the VMAs use.   Passwords Not only is John's information being  THE MINEFIELD OF PERSONAL COMPUTER USE SYSTEM PERFORMANCE taken, but his computer resources are  being used to spread this trojan and   The seemingly innocent things you can do to render your PC unusable other viruses to other vulnerable  computers on the Internet. Scenario: Open an attachment containing a mass emailing virus Without the Rapid Recovery System With the Rapid Recovery System Notice a slow down of the machine, unsure of cause. The attachment is written into the email log.  Reboot machine, still slow. The NET­VM flags a violation of the network contract and pauses the VM. A few hours later, John has re­ Look in process list, attempt to kill suspicious process, regenerates itself. The system asks the user if they want to rollback to the last known good image. installed his operating system and all  John notices that his computer is  Call tech support, make an appointment to take the computer into the shop. Rollback and remount personal data store. of his applications that he uses. He  running slower than usual. He is told that  3 weeks later get the machine back with the OS re­installed. Some system data (logs, etc.) in VM appliance is lost, but no personal data is lost. forgot to back up some digital photos  he should wipe his computer and re­ Newest backup is 1 month old, some recent reports and pictures lost.   The machine is back in working order in less than 1 hour. that he took of his daughter's play.  install. He will need to find his operating  Ooops! But at least his computer is  system and application install CDs.  working again, right? Scenario: Surf to the wrong web site With the Rapid Recovery System Without the Rapid Recovery System A malicious program begins to read over the hard drive for credit card numbers. With the Rapid Recovery System A malicious program begins to read over the hard drive for credit card numbers. The user does not notice any signs of trouble. The FS­VM triggers a violation of the data access contract and pauses the VM. The program sends out a small amout of data containing the information discovered. The system asks the user if they want to rollback to the last known good image. The program installs a backdoor for later use by the attacker. Rollback and remount personal data store. The scan is not completed, the information is not sent, the backdoor is prevented. John really wants to see the  pics, so he ignores the error  Either of these actions cause  and copies the “pics” to his  the Internet VM to be reset.  Scenario: Install a required software update John tries to load the pictures in his photo  Internet VM and clicks on them.  The built­in firewall of the  Without the Rapid Recovery System With the Rapid Recovery System VM, but the action is denied, since the  The executable runs and it  Rapid Recovery System  After the update, several applications cannot find some required components. After the update, several applications cannot find some required components. “pics” are actually executables. An error  instantly tries to run its built­in  disallows the Internet VM to  The user calls tech support and they confirm the problems with this patch. The user calls tech support and they confirm the problems with this patch. message is displayed to John. IRC server and starts scanning  create a server. An error  The best recommendation is to completely uninstall and re­install the applications. The user decides to rollback to the last known good image. for personal data. message appears when the  It takes a few hours to assemble the installation media, to find the product keys,  The machine is back up and running in minutes. Internet restarts. John finds  and to follow the instructions. out that these were not pics.