A software program that is designed to appear to be a real functioning network but is actually a decoy built specifically to be probed and attacked by malicious users. In contrast to a honeypot, which is typically a hardware device that lures users into its trap, a virtual honeypot uses software to emulate a network.
- virtual host
Often abbreviated vhost, a virtual host is a provider of Web services that include server functions and Internet connection services. A virtual host is often used by companies or individuals that do not want to purchase and maintain their own Web servers and Internet connections. A virtual host will provide its customers with domain name […]
- virtual identity
In online virtual communities, such as online chat rooms or in online games, a virtual identity is one created by the human user that acts as an interface between the physical person and virtual person other users see on their computer screen.
- virtual keyboard
)A virtual keyboard is where a full-size image of a QWERTY keyboard is projected onto any surface. Touching the image of a key generates a unique electronic signal corresponding to a key’s image. Using a virtual keyboard eliminates the chance of breakage and infection transfer. Additionally virtual keyboards require no cleaning and they have no […]
- Virtual Machine
A self-contained operating environment that behaves as if it is a separate computer. For example, Java applets run in a Java virtual machine (VM) that has no access to the host operating system. This design has two advantages: System Independence: A Java application will run the same in any Java VM, regardless of the hardware […]
- virtual machine server
A virtual machine (VM) server hosts virtual machines running operating systems in one of two following modes: fully virtual: completely emulates all hardware devices paravirtual mode: does not require complete emulation of hardware devices.