The micro-course describes creation of the chroot environment. Moreover, it describes the procedure of strengthening the chroot environment by means of additional tools such as grsecurity. At the end of the course there is information about how to install applications or whole systems in such environment.
Keywords: chroot, emulation, restricting disk resources
Mechanisms emulating virtualization - chroot
The chroot command
System call
Strengthening the chroot environment
An example of creating the chroot environment
OpenSSH server closing script in the chroot environment
System installation in the chroot environment