• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

QUBES OS: A Reasonably Secure Operating System

October 4, 2016 by Scott Radaszkiewicz 1 Comment

Weblink:  Qubes OS

So, the Hacker news reported that Qubes OS 3.2 has been released.  So, I have never heard of Qubes OS, so I figure I better take a peek and see.  Basically Qubes OS is an operating system that attempts to provide security through isolation.

In essence, the Qubes OS is a virtual machine manager and applications are run within their own virtual machine.   Qubes makes a common desktop environment that manages all of these virtual settings.

I find this idea enticing.   In a way, many of us do this already.  I know I do.  With the ease and availability of Virtualization, many tech savvy users work to segregate their work.  I for instance, have several different VM machines that I employ.   I ahve a VM that I use specifically for personal email and web browsing.  This way, if I get some virus, etc, it won’t effect my work system.

Some good info can be found on Wikipedia:  Click

Who knows, maybe isolationism is the best defense for the future.  We can’t stop it, we can only hope to contain it and limit it’s impact!

And I downloaded the ISO and plan to give this a test.   FYI – can’t install on a virtual machine, so it’s designed for bare metal install.   I’ll let you all know what I find when I get around to tinkering with it!

 

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Ahmed A. Alkaysi says

    October 4, 2016 at 3:32 pm

    This is pretty interesting and really cool Instead of having to manage multiple VM machines, I guess this OS manages it for you. I will definitely check this OS out. Regarding isolation, what you said make sense. It will always be a cat-and-mouse game when it comes to cyber security. Maybe the best thing to do is just isolate and mitigate as much damage as possible.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in