White Paper
The Threats and Challenges of Virtual Machines
A virtual machine is hardware simulated on a( host or master) computer. This virtual hardware runs a complete( guest or child) operating system, while severely restricting its ability to interact with the real environment around it. All guest systems and the host share the same real-life hardware, but without immediate access being given to the guest systems. They see a simulated – virtual – machine.
Image 2: Architecture of a virtual machine
Application |
Application |
Application |
Application |
Guest operating system |
Guest |
|
|
Guest operating system |
Guest |
Virtual hardware
Virtualization software
Virtual hardware
Host
Host operating system
Real hardware
Virtual machines can be saved and recovered( returned to an earlier state) with considerable ease.
From a licensing point of view, virtual machines imply several new threats:
For dongle users:
< < Illicit multiple use of a single license by using one dongle for several guest systems.
For pure soft licenses:
< < Resetting time-limited or pay-per-use licenses by using a copy or snapshot.
< < Duplicating machine-bound licenses by cloning the allocated machine in its entirety.
There are also unique challenges for the licit users of your software:
< < The ability to connect dongles and virtual machines.
< < High-availability license servers running on virtual machines.
4