|

|
User Controls
|
New User
|
Login
|
Edit/View My Profile
|

|

|

|
ActiveMac
|
Articles
|
Forums
|
Links
|
News
|
News Search
|
Reviews
|

|

|

|
News Centers
|
Windows/Microsoft
|
DVD
|
ActiveHardware
|
Xbox
|
MaINTosh
|
News Search
|

|

|

|
ANet Chats
|
The Lobby
|
Special Events Room
|
Developer's Lounge
|
XBox Chat
|

|

|

|
FAQ's
|
Windows 98/98 SE
|
Windows 2000
|
Windows Me
|
Windows "Whistler" XP
|
Windows CE
|
Internet Explorer 6
|
Internet Explorer 5
|
Xbox
|
DirectX
|
DVD's
|

|

|

|
TopTechTips
|
Registry Tips
|
Windows 95/98
|
Windows 2000
|
Internet Explorer 4
|
Internet Explorer 5
|
Windows NT Tips
|
Program Tips
|
Easter Eggs
|
Hardware
|
DVD
|

|

|

|
Latest Reviews
|
Applications
|
Microsoft Windows XP Professional
|
Norton SystemWorks 2002
|

|
Hardware
|
Intel Personal Audio Player
3000
|
Microsoft Wireless IntelliMouse
Explorer
|

|

|

|
Site News/Info
|
About This Site
|
Affiliates
|
ANet Forums
|
Contact Us
|
Default Home Page
|
Link To Us
|
Links
|
Member Pages
|
Site Search
|
Awards
|

|

|

|
Credits
©1997/2004, Active Network. All
Rights Reserved.
Layout & Design by
Designer Dream. Content
written by the Active Network team. Please click
here for full terms of
use and restrictions or read our
Privacy Statement.
|
|
|
 |
|
 |
|
 |
Time:
00:47 EST/05:47 GMT | News Source:
Microsoft |
Posted By: Kenneth van Surksum |
A number of people have been asking me how snapshots actually work "under the covers". So here we go: When you take a snapshot of a running virtual machine: - We pause the virtual machine.
- We create a new differencing disk for each virtual hard disk and hook it up to the virtual machine.
- We make a copy of the virtual machine's configuration file.
- We resume the virtual machine (note that this happens so quickly that you do not know that the virtual machine was paused at all.
- Once the virtual machine is running again we start saving the contents of the virtual machine's memory to disk.
- While this is happening we monitor memory activity inside the virtual machine and if the the guest operating system attempts to modify memory that we have not copied, we intercept the write attempt and copy the original memory contents then allow the write to go through.
|
|
|
|
 |
|