VirtualBox

Changeset 55484 in vbox


Ignore:
Timestamp:
Apr 28, 2015 1:49:36 PM (9 years ago)
Author:
vboxsync
Message:

doc/manual: typos.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/doc/manual/en_US/user_AdvancedTopics.xml

    r55479 r55484  
    37323732
    37333733    <para>
    3734       Starting with VirtualBox 5.0 it is possible to encrypt the data stored in
     3734      Starting with VirtualBox 5.0, it is possible to encrypt the data stored in
    37353735      hard disk images transparently for the guest. It does not depend on a specific
    37363736      image format to be used. Images which have the data encrypted are not portable
     
    37563756
    37573757        <listitem>
    3758           <para>This feature is currently closed source and requires the Oracle extension
     3758          <para>This feature is currently closed source and requires the VirtualBox extension
    37593759            pack to be installed to work.</para>
    37603760        </listitem>
    37613761
    37623762        <listitem>
    3763           <para>Because encryption works only on the stored user data
    3764             it is not possible to check for metadata integrity of the disk image currently.
    3765             Attackers might take advantage of this to remove or insert blocks of database
     3763          <para>Since encryption works only on the stored user data,
     3764            it is currently not possible to check for metadata integrity of the disk image.
     3765            Attackers might take advantage of this to remove or insert blocks of data
    37663766            into the image or change certain metadata items such as the disk size.</para>
    37673767        </listitem>
     
    37753775        <listitem>
    37763776          <para>The DEK is kept in memory while the VM is running to be able to
    3777             decrpt data read and encrypt data written by the guest. While this should
     3777            decrypt data read and encrypt data written by the guest. While this should
    37783778            be obvious the user needs to be aware of this because an attacker might be able
    37793779            to extract the key on a compromised host and get access to the data later.</para>
     
    37813781
    37823782        <listitem>
    3783           <para>When encrypting or decrypting the images the password is passed unencrypted
    3784             via the Main API from the frontend to VBoxSVC. This needs to be kept in mind
     3783          <para>When encrypting or decrypting the images, the password is passed unencrypted
     3784            via the Main API from the frontend to VBoxSVC. This needs to be kept in mind,
    37853785            especially when using third party frontends which make use of the webservice
    37863786            where the password might be transmitted unencrypted over the network.</para>
     
    37893789        <listitem>
    37903790          <para>Encrypting images with differencing images is only possible if there
    3791             are no branches exisiting. This limitation will be lifted in the future.</para>
     3791            are no branches. This limitation may be addressed in a future
     3792            VirtualBox version.</para>
    37923793        </listitem>
    37933794
     
    38013802      <para>
    38023803        Encrypting disk images can be done either using the GUI or VBoxManage.
    3803         While the GUI is easier to use it works on a per VM basis and encrypts
     3804        While the GUI is easier to use, it works on a per VM basis and encrypts
    38043805        all disk images attached to the specific VM.
    38053806        With VBoxManage one can encrypt individual images (including all differencing
    3806         images). To encrypt an unencrypted medium with VBoxManage use:
     3807        images). To encrypt an unencrypted medium with VBoxManage, use:
    38073808      </para>
    38083809
     
    38323833
    38333834      <para>
    3834         When a VM is started using the GUI a dialog will open where the user
     3835        When a VM is started using the GUI, a dialog will open where the user
    38353836        needs to enter all passwords for all encrypted images attached to the VM.
    3836         If another frontend like VBoxHeadless is used the VM will be paused as soon
     3837        If another frontend like VBoxHeadless is used, the VM will be paused as soon
    38373838        as the guest tries to access an encrypted disk.
    38383839        The user needs to provide the passwords through VBoxManage using the following
     
    38483849        <computeroutput>--removeonsuspend "yes|no"</computeroutput> to specify whether
    38493850        to remove the password from VM memory when the VM is suspended. Before the VM can be
    3850         resumed the user needs to supply the passwords again. This is useful when
     3851        resumed, the user needs to supply the passwords again. This is useful when
    38513852        a VM is suspended by a host suspend event and the user doesn't want
    3852         that the password remains in memory.
     3853        the password to remain in memory.
    38533854      </para>
    38543855    </sect2>
     
    38583859
    38593860      <para>
    3860         In some circumstanes it might be required to decrypt previously encrypted
     3861        In some circumstances it might be required to decrypt previously encrypted
    38613862        images. This can be done in the GUI for a complete VM or using VBoxManage
    38623863        with the following command:
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette