1 00:00:00,000 --> 00:00:07,000 Now in this lecture, I want to show you how to use cubes to carry out two important tasks that you're 2 00:00:07,000 --> 00:00:09,000 used to use on other operating systems. 3 00:00:09,000 --> 00:00:16,000 And as I do this again, the idea of the separation and the different domains and virtual machines will 4 00:00:16,000 --> 00:00:17,000 become even clearer. 5 00:00:18,000 --> 00:00:23,000 So right now I have an instance of a file manager in my personal domain. 6 00:00:23,000 --> 00:00:30,000 And on the left here I have an instance of the file manager in my work domain, in my work virtual machine. 7 00:00:30,000 --> 00:00:33,000 Again, as you can see, it's in blue and it says work at the start. 8 00:00:34,000 --> 00:00:40,000 So as I showed you in the previous lecture, when we download something in my personal virtual machine 9 00:00:40,000 --> 00:00:46,000 here, the image, it doesn't exist in my downloads directory in here because like we said, these are 10 00:00:46,000 --> 00:00:50,000 two separate virtual machines using two separate file systems. 11 00:00:50,000 --> 00:00:53,000 Therefore they're completely separate and they do not share anything. 12 00:00:54,000 --> 00:00:57,000 Now what I want to show you is copy pasting. 13 00:00:57,000 --> 00:01:03,000 So let's say I wanted to copy this file, I can right click copy or you can do control, see just like 14 00:01:03,000 --> 00:01:04,000 any other operating system. 15 00:01:04,000 --> 00:01:10,000 And then because this is a picture, we can go to my pictures in here and just do control V or right 16 00:01:10,000 --> 00:01:13,000 click paste and we will have the picture. 17 00:01:13,000 --> 00:01:16,000 So this is perfectly fine, it's perfectly normal. 18 00:01:16,000 --> 00:01:24,000 But if I do this again, so let's do right click copy and let's say I want to put it in my downloads, 19 00:01:24,000 --> 00:01:27,000 in my work file system, in my work domain. 20 00:01:28,000 --> 00:01:32,000 If I do right click in here, you'll see that the paste is grayed out. 21 00:01:32,000 --> 00:01:37,000 I cannot paste and if I do control V, you'll see that nothing will happen. 22 00:01:37,000 --> 00:01:44,000 And the reason for this is, again, it goes back to the whole idea of the separation of the different 23 00:01:44,000 --> 00:01:48,000 domains, which are completely separate virtual machines. 24 00:01:48,000 --> 00:01:52,000 So you can think of them as if they are two different computers. 25 00:01:52,000 --> 00:01:58,000 Therefore, what we did right now, it's as if you go to a computer, you right click and a copy image, 26 00:01:58,000 --> 00:02:03,000 and then you go to a completely different computer to another laptop, and then you're trying to paste 27 00:02:03,000 --> 00:02:05,000 that image in that laptop. 28 00:02:05,000 --> 00:02:09,000 Obviously that's not going to work because these are two separate computers. 29 00:02:09,000 --> 00:02:12,000 They use two different storage devices. 30 00:02:12,000 --> 00:02:18,000 Therefore, the the second computer is not even aware that you actually copied something. 31 00:02:19,000 --> 00:02:27,000 Now because these two computers or to these two domains are running within cubes within one hypervisor, 32 00:02:27,000 --> 00:02:29,000 we can actually copy and paste between them. 33 00:02:29,000 --> 00:02:31,000 It's just slightly different. 34 00:02:32,000 --> 00:02:37,000 So if you want to copy something within the same virtual machine or within the same domain, it's fine. 35 00:02:37,000 --> 00:02:43,000 You can right click and copy, but if you want it to copy between two different domains or virtual machines, 36 00:02:43,000 --> 00:02:45,000 you'll have to right click this. 37 00:02:45,000 --> 00:02:51,000 And instead of clicking on copy, we're going to click to copy to other AB VM. 38 00:02:52,000 --> 00:02:59,000 Clicking on this will show us a window that will ask us which VM or which domain we want to copy this 39 00:02:59,000 --> 00:03:00,000 file to. 40 00:03:00,000 --> 00:03:04,000 Now we want to copy this to our work VM to our work domain. 41 00:03:04,000 --> 00:03:11,000 So I'm going to type work and I'm going to click on OCH now you'll see that this will not appear in 42 00:03:11,000 --> 00:03:12,000 here. 43 00:03:12,000 --> 00:03:19,000 But if we go to the home directory, you'll see we have a new directory in here called Cubes in Common. 44 00:03:19,000 --> 00:03:26,000 And this is where you will see all the files that you copy from other domains or other virtual machines. 45 00:03:26,000 --> 00:03:30,000 So if we double click this, you'll see we have a directory called personal. 46 00:03:30,000 --> 00:03:35,000 If you copied stuff from another domain, for example, if you copied it from the untrusted, you'll 47 00:03:35,000 --> 00:03:37,000 have a directory called untrusted. 48 00:03:38,000 --> 00:03:42,000 So inside the personal directory you'll see we have the image that we wanted. 49 00:03:42,000 --> 00:03:45,000 If we double click it, you'll see that the image is fine. 50 00:03:45,000 --> 00:03:46,000 This is the actual image. 51 00:03:46,000 --> 00:03:54,000 It did not get corrupted and you can now right click it and copy it and paste it to anywhere you want 52 00:03:54,000 --> 00:03:58,000 within this operating system, within the work domain. 53 00:03:59,000 --> 00:04:04,000 So this is how to copy files within a domain or between two different domains. 54 00:04:04,000 --> 00:04:07,000 Now, what about copying text? 55 00:04:07,000 --> 00:04:09,000 So let's just type something simple. 56 00:04:09,000 --> 00:04:15,000 I'm just going to click on the search in here, just so that I have a text box that I can type in and 57 00:04:15,000 --> 00:04:16,000 I'm just going to type. 58 00:04:16,000 --> 00:04:19,000 This is some text to copy. 59 00:04:20,000 --> 00:04:26,000 Now, if you want to copy this text within the same operating system, again, it's exactly the same 60 00:04:26,000 --> 00:04:27,000 as any other operating system. 61 00:04:27,000 --> 00:04:30,000 You select all the text that you want to copy. 62 00:04:30,000 --> 00:04:34,000 You can do right click copy or control C from your keyboard. 63 00:04:35,000 --> 00:04:41,000 And then if we remove this and then open the search bar again and do control v, this will paste it 64 00:04:41,000 --> 00:04:42,000 in here for me. 65 00:04:43,000 --> 00:04:48,000 So identical behavior to any other operating system that you're used to. 66 00:04:49,000 --> 00:04:55,000 Again, the tricky part is trying to copy this text from one domain, from one virtual machine to another 67 00:04:55,000 --> 00:05:00,000 domain, because this domain right here is a completely separate computer. 68 00:05:00,000 --> 00:05:03,000 It doesn't even know that you copied this text. 69 00:05:04,000 --> 00:05:08,000 So to get around this, you'll have to first select the whole text. 70 00:05:08,000 --> 00:05:12,000 You'll have to do control C or right click copy to copy it. 71 00:05:12,000 --> 00:05:18,000 And then we're going to do Control Shift C doing this. 72 00:05:18,000 --> 00:05:22,000 We'll copy the text into the global clipboard. 73 00:05:23,000 --> 00:05:31,000 So right now the text that I just copied is available for all operating systems, for all domains to 74 00:05:31,000 --> 00:05:31,000 capture. 75 00:05:32,000 --> 00:05:39,000 And if you go here to our clipboard, you can see that we have 25 bytes of data are copied from the 76 00:05:39,000 --> 00:05:40,000 personal domain. 77 00:05:40,000 --> 00:05:48,000 Now, if we want to paste this in here in my work domain before we can do control V, which is the shortcut 78 00:05:48,000 --> 00:05:54,000 for pasting, you have to first of all, get the global clipboard, get the text that we copied to the 79 00:05:54,000 --> 00:05:56,000 global clipboard. 80 00:05:56,000 --> 00:06:02,000 To do that you have to do control shift V first and as you can see now is telling us that the global 81 00:06:02,000 --> 00:06:09,000 clipboard has been wiped and it's in my work domain clipboard now, so now I can paste it exactly the 82 00:06:09,000 --> 00:06:12,000 same way that I paste anything else I can just do control. 83 00:06:12,000 --> 00:06:17,000 V And as you can see, we have the text pasted in here. 84 00:06:17,000 --> 00:06:21,000 So this should show you how separated these virtual machines are. 85 00:06:21,000 --> 00:06:27,000 And this is what makes cubes so cool because they are so separated, but they can also communicate with 86 00:06:27,000 --> 00:06:29,000 each other if the user wants to. 87 00:06:29,000 --> 00:06:35,000 But if a hacker gains access to one of these machines, he doesn't have access to the global domain 88 00:06:35,000 --> 00:06:40,000 and therefore they can't move from one domain to the other. 89 00:06:40,000 --> 00:06:46,000 So if one machine gets hacked, it's very difficult for a hacker to go and compromise the other machines. 90 00:06:47,000 --> 00:06:54,000 Now, another task that you will probably be performing a lot is connecting a USB device to your computer, 91 00:06:54,000 --> 00:06:57,000 whether it's a mouse, a camera or a storage device. 92 00:06:57,000 --> 00:07:04,000 When you connect a USB device to cubes, it doesn't get connected to any domain or to any virtual machine, 93 00:07:04,000 --> 00:07:09,000 which is great because it is very hard to trust USB devices. 94 00:07:09,000 --> 00:07:12,000 I actually cover this in my conference in Orlando. 95 00:07:12,000 --> 00:07:19,000 You can weaponize pretty much any USB device, even a USB lamp or a mouse to execute commands on the 96 00:07:19,000 --> 00:07:21,000 computer that it gets connected to. 97 00:07:21,000 --> 00:07:26,000 And this way it will allow a hacker to gain full control over that computer. 98 00:07:27,000 --> 00:07:32,000 I will include a link to that talk if you're interested, but the cool thing here in cubes, when you 99 00:07:32,000 --> 00:07:40,000 connect a USB device, it will not allow that device to register itself as a keyboard first and it won't 100 00:07:40,000 --> 00:07:42,000 connected to a virtual machine. 101 00:07:42,000 --> 00:07:48,000 It will detect the device, but it will wait for you, for the user to select which domain or which 102 00:07:48,000 --> 00:07:51,000 virtual machine you want to connect this to. 103 00:07:51,000 --> 00:07:58,000 And then even if that code get executed, it will only hack into the machine that you connect it to. 104 00:07:58,000 --> 00:08:04,000 And it will be very difficult to move from that machine and compromise the other machines. 105 00:08:04,000 --> 00:08:10,000 You can even connect it to a disposable virtual machine to do untrusted tasks. 106 00:08:10,000 --> 00:08:14,000 And we'll talk about untrusted virtual machines in the next lecture. 107 00:08:14,000 --> 00:08:16,000 So stay tuned for that. 108 00:08:17,000 --> 00:08:23,000 Now, first of all, before I connect my USB device, if you go in here to the top right, you will 109 00:08:23,000 --> 00:08:28,000 see all of the devices connected to the Cube's operating system right now. 110 00:08:28,000 --> 00:08:31,000 And a lot of these right now are built in devices. 111 00:08:31,000 --> 00:08:35,000 In my computer, I haven't really connected much via USB. 112 00:08:35,000 --> 00:08:37,000 So we're going to remember what's in here. 113 00:08:37,000 --> 00:08:44,000 Now, I'm going to close this window and I'm going to connect my storage device. 114 00:08:45,000 --> 00:08:49,000 And as you can see, we get a notification that the device is ready to be used. 115 00:08:49,000 --> 00:08:56,000 But if we look in any of these machines, you'll see that we don't have access to this device. 116 00:08:58,000 --> 00:09:02,000 To connect this device to a virtual machine or to a domain. 117 00:09:02,000 --> 00:09:08,000 We're going to go to the devices in here again and you'll see we have the device in here. 118 00:09:08,000 --> 00:09:12,000 This is the name of the device that came up in the notifications. 119 00:09:12,000 --> 00:09:17,000 It's also the extra device that didn't exist before when we opened the list. 120 00:09:17,000 --> 00:09:22,000 And if we hover over it, you'll see that it's going to list all of the running domains, all of the 121 00:09:22,000 --> 00:09:26,000 running virtual machines that we can connect the device to. 122 00:09:26,000 --> 00:09:31,000 So right now, we only have the personal and the work running the ones that we can actually use. 123 00:09:31,000 --> 00:09:36,000 And let's say I want to connect this to my work virtual machine or to my work domain. 124 00:09:36,000 --> 00:09:42,000 All you have to do is literally just click on this and you'll get a notification telling you that it's 125 00:09:42,000 --> 00:09:46,000 going to connect it to the work domain and give it just a little bit of time. 126 00:09:46,000 --> 00:09:50,000 And then we're going to go to our other locations. 127 00:09:50,000 --> 00:09:56,000 And as you can see, we have it right here, my eight gigabyte volume, we can double click it to access 128 00:09:56,000 --> 00:10:03,000 it and then interact with its files exactly the same way that you would in most other operating systems. 129 00:10:03,000 --> 00:10:08,000 Again, double click to open, right click to get the options, copy and paste like I showed you and 130 00:10:08,000 --> 00:10:09,000 so on. 131 00:10:10,000 --> 00:10:12,000 So that's it for this lecture. 132 00:10:12,000 --> 00:10:16,000 I just wanted to show you some of the tasks that you're going to be using a lot. 133 00:10:16,000 --> 00:10:23,000 And through that, I also wanted to help you understand how these domains are completely separated from 134 00:10:23,000 --> 00:10:30,000 each other and how this separation can make the whole operating system more secure or help us improve 135 00:10:30,000 --> 00:10:31,000 our security.