Security--Virtualization--Inter(R) Virtualization Technolog 设置为enable 本机安装的是WIN 7 ,详细版本是:Windows 7 Ultimate, 32-bit 6.1.7601, Service Pack 1 .虚拟机版本:7.1.2 build-301548.在虚拟机上安装RED HAT ENTERPRISE LINUX 6 64版本时,报如下错误: You have configured this virtual mac…
BACKGROUND A Virtual Machine (VM) is an efficient, isolated duplicate of a real computer system. More than one VM may be provided concurrently by a single real system. A real system may have a number of resources that it provides to an operating syst…
A processor including a virtualization system of the processor with a memory virtualization support system to map a reference to guest-physical memory made by guest software executable on a virtual machine which in turn is executable on a host machin…
BACKGROUND The present disclosure relates generally to microprocessor systems, and more specifically to microprocessor systems that may operate in a trusted or secured environment. Processors may operate in several processor operating modes depending…
A processor including a virtualization system of the processor with a memory virtualization support system to map a reference to guest-physical memory made by guest software executable on a virtual machine which in turn is executable on a host machin…
BACKGROUND This invention relates to virtual machines. In particular, the invention relates to translation lookaside buffers that support a virtual-machine system. A virtual-machine system is a computer system that includes a virtual machine monitor…
BACKGROUND OF THE INVENTION The present invention relates to virtual machine implementations, and in particular to a safe general purpose virtual machine that generates optimized virtual machine computer programs that are executable in a general purp…
BACKGROUND INFORMATION An embodiment of the present invention relates generally to virtualization platforms and, more specifically, to a system and method to run components of a virtual machine monitor at a reduced privilege level. Various mechanisms…
BACKGROUND Computer viruses are a common problem for computer users. One typical mode of attack is to send an electronic mail message (e-mail) containing a file attachment to an unsuspecting user's computer. The file attachment contains malicious att…
vm虚拟机 问题:You have configured this virtual machine to use a 64-bit guest operating system.  However, 64-bit operation is not possible. This host is VT-capable, but VT is disabled. http://blog.csdn.net/johnstrive/article/details/26468781…