Virtual machine and virtual operating system
Creating a virtual machine
Snapshots and virtual machine cloning
Why you shouldn’t use shared folders, shared clipboard and Drag’n’Drop
Encryption of virtual data on virtual machine VirtualBox
The information VirtualBox stores about users
Virtual machines’ vulnerabilities. How hackers go beyond the virtual environment.