Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security Fundamentals
    • Security Principles
    • Information Security
  • Hacking
    • Reconnaissance
      • Footprinting
      • Scanning
      • Enumeration
      • Vulnerability Analysis
    • Privilege Escalation
    • Ethical Hacking
  • Governance, Risk And Compliance (GRC)
    • Risk Management
  • Security Architecture And Engineering
    • Cryptography
    • Identity Access Management
  • Security Operations
    • Security Assessment
      • Vulnerability Management
        • Threat Intelligence
    • Intrusion Detection And Prevention
  • Cyber Security Attacks and Threats
    • DoS
    • Password Hacking
    • Web Attacks
    • Web Applications Attacks
    • WI-FI Wireless Attacks
    • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Hypervisor

Posted on by

Hypervisor is software that runs on physical server that enables multiple Virtual Machines (VMs) with it’s own Operating System. Hypervisor creates a pool of virtual computing resources like CPU, Memory, Storage, Networking from the underlying physical server’s computing resources. This virtual pool of computing resources is allocated to different VMs. The physical server is known as the Host Server.

Types of Hypervisor

Type 1 hypervisor also known as bare-metal hypervisors or native hypervisors that directly run on the underlying physical server hardware and has the access to the CPU, Memory and storage.

Type 2 hypervisor also known as embedded or hosted hypervisor doesn’t run directly on the underlying physical server hardware rather run on the operating system as an application.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme