<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Vm on WhiteMatterTech</title>
    <link>/categories/vm/</link>
    <description>Recent content in Vm on WhiteMatterTech</description>
    <image>
      <title>WhiteMatterTech</title>
      <url>/brain.jpg</url>
      <link>/brain.jpg</link>
    </image>
    <generator>Hugo -- 0.142.0</generator>
    <language>en</language>
    <copyright>2026 WhiteMatterTech</copyright>
    <lastBuildDate>Mon, 24 Jan 2022 00:00:00 +0000</lastBuildDate>
    <atom:link href="/categories/vm/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Tails OS with Encrypted Persistence on Unraid as a VM</title>
      <link>/posts/tails-os-with-encrypted-persistence-on-unraid-as-a-vm/</link>
      <pubDate>Mon, 24 Jan 2022 00:00:00 +0000</pubDate>
      <guid>/posts/tails-os-with-encrypted-persistence-on-unraid-as-a-vm/</guid>
      <description>&lt;p&gt;This post will show you how to run Tails OS as a VM with the Persistence feature enabled.&lt;/p&gt;
&lt;p&gt;Running Tails as a VM is not recommended generally as it defeats many of the security features in Tails. For example, virtualization requires that you trust the hypervisor host, as the hypervisor has extra privileges over a VM that can reduce security and privacy of the VM.&lt;/p&gt;
&lt;p&gt;I recommend reading Tails&amp;rsquo;s official documentation about virtualization considerations before continuing: &lt;a href=&#34;https://tails.boum.org/doc/advanced_topics/virtualization/&#34;&gt;&lt;/a&gt;&lt;a href=&#34;https://tails.boum.org/doc/advanced_topics/virtualization/&#34;&gt;https://tails.boum.org/doc/advanced_topics/virtualization/&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Run AlienVault OSSIM as a VM on Unraid</title>
      <link>/posts/how-to-run-alienvault-ossim-as-a-vm-on-unraid/</link>
      <pubDate>Fri, 01 Oct 2021 00:00:00 +0000</pubDate>
      <guid>/posts/how-to-run-alienvault-ossim-as-a-vm-on-unraid/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;For this post, I will show you how to setup &lt;a href=&#34;https://www.unraid.net/&#34;&gt;Unraid&lt;/a&gt; to run &lt;a href=&#34;https://cybersecurity.att.com/products/ossim&#34;&gt;AlienVault OSSIM&lt;/a&gt; as a VM. OSSIM is a powerful open-source SIEM that you can leverage on your network for free. I use OSSIM for network-wide vulnerability scanning and endpoint host intrusion detection.&lt;/p&gt;
&lt;p&gt;OSSIM&amp;rsquo;s integrated HIDS is a fork from OSSEC. Additionally, OSSIM integrates with &lt;a href=&#34;https://otx.alienvault.com/&#34;&gt;Open Threat Exchange (OTX)&lt;/a&gt;, which can be installed on Windows, Mac, and Linux endpoints and servers for an up-to-date, open-source vulnerability scanning tool. I deploy the OTX installer via my free &lt;a href=&#34;https://mybusiness.mosyle.com/&#34;&gt;Mosyle&lt;/a&gt; account &lt;em&gt;(MDM for MacOS)&lt;/em&gt; and &lt;a href=&#34;https://endpoint.microsoft.com/&#34;&gt;Intune&lt;/a&gt; (&lt;em&gt;MDM for Windows&lt;/em&gt;).&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
