Oracle VM VirtualBox 3.2.4 User Manual
. 10 1.2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.4 Supported host operating user interface. Subsequent chapters will go into much more detail covering more powerful tools and features, but fortunately, it is not necessary to read the entire User Manual before you can use VirtualBox VirtualBox. 9 1 First steps You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview, page 12. For existing VirtualBox users who just want to see what’s new in this release, there0 码力 | 306 页 | 3.85 MB | 1 年前3Oracle VM VirtualBox 4.0.4 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.4 Supported tools and features, but fortunately, it is not necessary to read the entire User Manual before you can use VirtualBox. You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview Change log, page 183. 9 1 First steps 1.1 Why is virtualization useful? The techniques and features that VirtualBox provides are useful for several scenarios: • Running multiple operating systems0 码力 | 269 页 | 4.65 MB | 1 年前3Oracle VM VirtualBox 4.0.0 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.4 Supported tools and features, but fortunately, it is not necessary to read the entire User Manual before you can use VirtualBox. You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview Change log, page 180. 9 1 First steps 1.1 Why is virtualization useful? The techniques and features that VirtualBox provides are useful for several scenarios: • Running multiple operating systems0 码力 | 263 页 | 4.63 MB | 1 年前3Oracle VM VirtualBox 4.0.6 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.4 Supported tools and features, but fortunately, it is not necessary to read the entire User Manual before you can use VirtualBox. You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview Change log, page 182. 9 1 First steps 1.1 Why is virtualization useful? The techniques and features that VirtualBox provides are useful for several scenarios: • Running multiple operating systems0 码力 | 270 页 | 4.65 MB | 1 年前3Oracle VM VirtualBox 4.0.0_BETA1 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.4 Supported tools and features, but fortunately, it is not necessary to read the entire User Manual before you can use VirtualBox. You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview list in chapter 14, Change log, page 175. 1.1 Why is virtualization useful? The techniques and features that VirtualBox provides are useful for several scenarios: • Running multiple operating systems0 码力 | 257 页 | 3.85 MB | 1 年前3Oracle VM VirtualBox 4.1.14 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.4 Supported Post Installation Configuration . . . . . . . . . . . . . . . . . . . . . . . 193 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . . . . . 195 14 Known limitations 196 14.1 Experimental Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 14.2 Known Issues . . . .0 码力 | 299 页 | 4.84 MB | 1 年前3Oracle VM VirtualBox 4.1.0 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.4 Supported tools and features, but fortunately, it is not necessary to read the entire User Manual before you can use VirtualBox. You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview Change log, page 191. 9 1 First steps 1.1 Why is virtualization useful? The techniques and features that VirtualBox provides are useful for several scenarios: • Running multiple operating systems0 码力 | 284 页 | 4.76 MB | 1 年前3Oracle VM VirtualBox 4.0.30 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.4 Supported tools and features, but fortunately, it is not necessary to read the entire User Manual before you can use VirtualBox. You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview Change log, page 184. 9 1 First steps 1.1 Why is virtualization useful? The techniques and features that VirtualBox provides are useful for several scenarios: • Running multiple operating systems0 码力 | 280 页 | 4.70 MB | 1 年前3Oracle VM VirtualBox 4.0.36 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.4 Supported tools and features, but fortunately, it is not necessary to read the entire User Manual before you can use VirtualBox. You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview Change log, page 184. 9 1 First steps 1.1 Why is virtualization useful? The techniques and features that VirtualBox provides are useful for several scenarios: • Running multiple operating systems0 码力 | 281 页 | 4.70 MB | 1 年前3Oracle VM VirtualBox 4.2.6 User Manual
2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.4 Supported Post Installation Configuration . . . . . . . . . . . . . . . . . . . . . . . 207 13.3 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 13.3.1 The Security Model . . . . . . . . . . . . . . . . . . . . . . . 209 14 Known limitations 210 14.1 Experimental Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 14.2 Known Issues . . . .0 码力 | 322 页 | 5.84 MB | 1 年前3
共 297 条
- 1
- 2
- 3
- 4
- 5
- 6
- 30