Using Linux in the business world to provide solutions to real-world commercial requirements.
1 post - 1 participant
Read full topic
Tag - Linux Solutions
Thank you for your input.If I figure a way to make it work (with some compromises) I will tell.
Ok, so here are the problem scenario's;users inserts cd into running system and mounts ISO on a dummy mount point - entire ISO contents visible.. I count go...
The final user will never have access to the terminal (he will never have the root password).The applications will run on boot and then just reboot the machine...
Ok, so if you prevent access via encryption, how do you propose people gain access? .. in order for the system to load, it will need to read the CD, i.e...
Thank you for you answer.I use a lot of things that are "secret" bash scripts, C/C++ aplications, python, configurations files, user data files.The...
Ok, so encrypting the ISO sounds like overkill if you just want to protect the application code. Historically applications would be compiled and only the...
Hello I have a question that might not be easy to understand or to answer.I am trying to build a live OS to run a custom aplication.For that I am using: 1)...
Mm, so now I'm intrigued. Most Linux distro's come with virtualisation "out of the box", Ubuntu for example comes with KVM/Libvirt/libvirtmanager which allows...
It won't be running on MS (that's the last platform I would use) it will be VMware for Linux then playing around with it.