1 00:00:00,900 --> 00:00:07,160 Now in this lecture I want to show you how to use cubes to carry out two important tasks that you're 2 00:00:07,170 --> 00:00:09,800 used to use on other operating systems. 3 00:00:09,840 --> 00:00:16,410 And as I do this again the idea of the separation and the different domains and virtual machines will 4 00:00:16,410 --> 00:00:18,450 become even clearer. 5 00:00:18,450 --> 00:00:25,350 So right now I have an instance of a file manager in my personal domain and on the left here I have 6 00:00:25,350 --> 00:00:28,930 an instance of the file manager in my work domain. 7 00:00:28,950 --> 00:00:32,090 In my work virtual machine again as you can see it's in blue. 8 00:00:32,100 --> 00:00:34,590 And it says work at the start. 9 00:00:34,590 --> 00:00:40,190 So as I showed you in the previous lecture when we downloaded something in my personal virtual machine 10 00:00:40,200 --> 00:00:41,790 here the image. 11 00:00:41,790 --> 00:00:47,610 It doesn't exist in my downloads directory in here because like we said these are two separate virtual 12 00:00:47,610 --> 00:00:50,320 machines using two separate file systems. 13 00:00:50,370 --> 00:00:54,780 Therefore they're completely separate and they do not share anything. 14 00:00:54,780 --> 00:00:56,940 Now what I want to show you is copy pasting. 15 00:00:57,300 --> 00:00:59,430 So let's say I wanted to copy this file. 16 00:00:59,610 --> 00:01:04,650 I can right click copy or you can do control see just like any other operating system. 17 00:01:04,770 --> 00:01:10,530 And then because this is a picture we can go to my pictures in here and just do control V. 18 00:01:10,620 --> 00:01:13,410 All right click paste and we will have the picture. 19 00:01:13,410 --> 00:01:14,880 So this is perfectly fine. 20 00:01:14,880 --> 00:01:16,740 It's perfectly normal. 21 00:01:16,740 --> 00:01:18,390 But if I do this again. 22 00:01:18,390 --> 00:01:26,190 So let's do right click copy and let's say I want to put it in my downloads in my work file system in 23 00:01:26,190 --> 00:01:27,960 my work domain. 24 00:01:28,080 --> 00:01:32,370 If I do right click in here you'll see that the paste is great out. 25 00:01:32,430 --> 00:01:37,470 I cannot paste and if I do control v you'll see that nothing will happen. 26 00:01:37,920 --> 00:01:45,150 And the reason for this is again it goes back to the whole idea of the separation of the different domains 27 00:01:45,300 --> 00:01:48,150 which are completely separate virtual machines. 28 00:01:48,240 --> 00:01:52,210 So you can think of them as if they are two different computers. 29 00:01:52,290 --> 00:01:58,500 Therefore what we did right now it's as if you go to a computer you right click and a copy image and 30 00:01:58,500 --> 00:02:04,080 then you go to a completely different computer to another laptop and then you're trying to piece that 31 00:02:04,110 --> 00:02:05,800 image in that laptop. 32 00:02:05,880 --> 00:02:09,750 Obviously that's not going to work because these are two separate computers. 33 00:02:09,810 --> 00:02:12,190 They used two different storage devices. 34 00:02:12,200 --> 00:02:20,490 Therefore the second computer is not even aware that you actually copied something now because these 35 00:02:20,520 --> 00:02:27,540 two computers or two these two domains are running within cubes within one hypervisor. 36 00:02:27,540 --> 00:02:29,850 We can't actually copy and paste between them. 37 00:02:29,880 --> 00:02:32,220 It's just slightly different. 38 00:02:32,250 --> 00:02:37,380 So if you want to copy something within the same virtual machine or within the same domain it's fine 39 00:02:37,390 --> 00:02:43,560 you can right click and copy but if you wanted to copy between two different domains or virtual machines 40 00:02:44,010 --> 00:02:50,340 you'll have to right click this and instead of clicking on copy we're going to click to copy to other 41 00:02:50,340 --> 00:02:59,060 up the M clicking on this will show us a window that'll ask us which VM or which domain we want to copy 42 00:02:59,060 --> 00:03:00,540 this file to. 43 00:03:00,710 --> 00:03:04,580 Now we want to copy this to our work VM to our work domain. 44 00:03:04,580 --> 00:03:07,580 So I'm going to type work and I'm going to click on. 45 00:03:07,610 --> 00:03:09,030 OK. 46 00:03:09,260 --> 00:03:12,050 Now you'll see that this will not appear in here. 47 00:03:12,230 --> 00:03:19,450 But if we go to the home directory you'll see we have a new directory in here called cubes in common. 48 00:03:19,880 --> 00:03:26,570 And this is where you will see all the files that you copy from other domains or other virtual machines. 49 00:03:27,050 --> 00:03:32,750 So if we double click this you'll see we have a directory called personal if you copied stuff from another 50 00:03:32,750 --> 00:03:33,290 domain. 51 00:03:33,290 --> 00:03:39,290 For example if you copied it from the untrusted you'll have a directory called untrusted so inside the 52 00:03:39,290 --> 00:03:42,610 personal directory you'll see we have the image that we wanted. 53 00:03:42,740 --> 00:03:45,470 If we double click it you'll see that the image is fine. 54 00:03:45,470 --> 00:03:46,720 This is the actual image. 55 00:03:46,720 --> 00:03:54,350 It did not get corrupted and you can now right click it and copied and pasted to any where you want 56 00:03:54,500 --> 00:04:02,380 within this operating system within the work domain so this is how to copy files within a domain or 57 00:04:02,440 --> 00:04:05,080 between two different domains. 58 00:04:05,080 --> 00:04:07,160 Now what about copying text. 59 00:04:07,840 --> 00:04:09,970 So let's just type something simple. 60 00:04:09,970 --> 00:04:15,580 I'm just going to click on the search in here just so that I have a text box that I can type in and 61 00:04:15,580 --> 00:04:23,750 I'm just gonna type this is some text to copy now if you want to copy this text within the same operating 62 00:04:23,750 --> 00:04:29,750 system again it's exactly the same as any other operating system you select all the text that you want 63 00:04:29,750 --> 00:04:30,590 to copy. 64 00:04:30,590 --> 00:04:37,700 You can do right click copy or control C from your keyboard and then if we remove this and then open 65 00:04:37,700 --> 00:04:40,660 the search bar again and do control V. 66 00:04:40,820 --> 00:04:42,820 This will paste it in here for me. 67 00:04:43,310 --> 00:04:49,190 So identical behavior to any other operating system that you're used to. 68 00:04:49,190 --> 00:04:55,940 Again the tricky part is trying to copy this text from one domain from one virtual machine to another 69 00:04:55,940 --> 00:05:00,470 domain because this domain right here is a completely separate computer. 70 00:05:00,470 --> 00:05:04,100 It doesn't even know that you copied this text. 71 00:05:04,370 --> 00:05:08,840 So to get around this you'll have to first select the whole text. 72 00:05:08,840 --> 00:05:16,010 You'll have to do control C or right click copy to copy it and then we're going to do control shift 73 00:05:16,190 --> 00:05:22,840 see doing this will copy the text into the global clipboard. 74 00:05:23,630 --> 00:05:31,620 So right now the text that I just copied is available for all operating systems for all domains to capture. 75 00:05:32,300 --> 00:05:39,650 And if you go here to our clipboard you can see that we have 25 bytes of data are copied from the personal 76 00:05:39,650 --> 00:05:41,110 domain. 77 00:05:41,120 --> 00:05:48,170 Now if we want to piece this in here in my work domain before we can do control V which is the shortcut 78 00:05:48,170 --> 00:05:55,310 for pasting you have to first of all get the global clipboard get the text that we copied to the global 79 00:05:55,310 --> 00:06:02,240 clipboard to do that you have to do controls shift v first and as you can see and I was telling us that 80 00:06:02,270 --> 00:06:07,390 the global clipboard has been wiped and it's in my work domain clipboard now. 81 00:06:07,430 --> 00:06:13,760 So now I can paste it exactly the same way that I paste anything else I can just do control V. 82 00:06:13,760 --> 00:06:17,160 And as you can see we have the text pasted in here. 83 00:06:17,810 --> 00:06:21,530 So this should show you how separated these virtual machines are. 84 00:06:21,890 --> 00:06:27,740 And this is what make cubes so cool because they are so separated but they can also communicate with 85 00:06:27,740 --> 00:06:28,280 each other. 86 00:06:28,400 --> 00:06:34,670 If the user wants to but if a hacker gained access to one of these machines he doesn't have access to 87 00:06:34,670 --> 00:06:40,130 the global domain and therefore they can't move from one domain to the other. 88 00:06:40,130 --> 00:06:47,910 So if one machine gets hacked it's very difficult for a hacker to go and compromised the other machines. 89 00:06:47,980 --> 00:06:54,790 Now another task that you will probably be performing a lot is connecting a USB device to your computer 90 00:06:54,970 --> 00:06:57,910 whether it's a mouse a camera or a storage device. 91 00:06:57,910 --> 00:07:04,720 When you connect to us be device to cubes it doesn't get connected to any domain or to any virtual machine 92 00:07:04,990 --> 00:07:09,440 which is great because it is very hard to trust us devices. 93 00:07:09,550 --> 00:07:12,700 I actually cover this in my conference in Orlando. 94 00:07:12,700 --> 00:07:19,780 You can weaponize pretty much any US device even a USB B lamp or a mouse to execute commands on the 95 00:07:19,780 --> 00:07:22,030 computer that it gets connected to. 96 00:07:22,030 --> 00:07:27,120 And this way it'll allow a hacker to gain full control over that computer. 97 00:07:27,130 --> 00:07:29,870 I will include a link to that talk if you're interested. 98 00:07:30,100 --> 00:07:37,120 But the cool thing here and cubes when you connect a USP device it will not allow that device to register 99 00:07:37,120 --> 00:07:39,060 itself as a keyboard first. 100 00:07:39,260 --> 00:07:42,310 And it wasn't connected to a virtual machine. 101 00:07:42,400 --> 00:07:49,360 It will detect the device what it will wait for you for the user to select which domain or which virtual 102 00:07:49,360 --> 00:07:51,640 machine you can connect this to. 103 00:07:51,790 --> 00:07:58,800 And then even if that code get executed it will only hack into the machine that you connected to and 104 00:07:58,800 --> 00:08:04,400 it will be very difficult to move from that machine and compromised the other machines. 105 00:08:04,540 --> 00:08:12,430 You can even connected to a disposable virtual machine to do untrusted tasks and we'll talk about untrusted 106 00:08:12,430 --> 00:08:14,530 virtual machines in the next lecture. 107 00:08:14,530 --> 00:08:22,160 So stay tuned for that now first of all before I connect my US b device if you go in here to the top 108 00:08:22,160 --> 00:08:28,240 right you will see all of the devices connected to the cubes operating system right now. 109 00:08:28,370 --> 00:08:32,750 And a lot of these right now are built in devices in my computer. 110 00:08:32,750 --> 00:08:35,560 I haven't really connected much with us. 111 00:08:36,050 --> 00:08:38,670 So we're going to remember what's in here now. 112 00:08:38,690 --> 00:08:44,950 I'm going to close this window and I'm going to connect my storage device. 113 00:08:45,400 --> 00:08:49,450 And as you can see we get a notification that the device is ready to be used. 114 00:08:49,970 --> 00:08:59,260 But if we look in any of these machines you'll see that we don't have access to this device to connect 115 00:08:59,260 --> 00:09:02,970 this device to a virtual machine or to a domain. 116 00:09:03,040 --> 00:09:08,700 We're going to go to the devices in here again and you'll see we have the device in here. 117 00:09:08,700 --> 00:09:12,370 This is the name of the device that came up in the notifications. 118 00:09:12,370 --> 00:09:17,410 It's also the extra device that didn't exist before when we opened the list. 119 00:09:17,410 --> 00:09:23,260 And if we hover over it you'll see that it's going to list all of the running domains all of the running 120 00:09:23,260 --> 00:09:27,010 virtual machines that we can connect the device to. 121 00:09:27,010 --> 00:09:31,840 So right now we only have the personal and the work running the ones that we can actually use. 122 00:09:32,000 --> 00:09:36,640 And let's say I want to connect this to my work virtual machine or to my work domain. 123 00:09:36,640 --> 00:09:42,220 All you have to do is literally just click on this and you'll get a notification telling you that it's 124 00:09:42,220 --> 00:09:48,070 going to connect it to the work domain and give it just a little bit of time and then we're gonna go 125 00:09:48,070 --> 00:09:55,360 to our other locations and as you can see we have it right here my 8 gigabyte volume we can double click 126 00:09:55,360 --> 00:10:02,650 it to access it and then interact with its files exactly the same way that you would and most other 127 00:10:02,650 --> 00:10:07,540 operating systems again that will collect to open right click to get the options copy and paste like 128 00:10:07,540 --> 00:10:08,490 I showed you. 129 00:10:08,490 --> 00:10:12,210 And so one so that's it for this lecture. 130 00:10:12,240 --> 00:10:16,520 I just wanted to show you some of the tasks that you're going to be using a lot. 131 00:10:16,590 --> 00:10:23,520 And through that I also wanted to help you understand how these domains are completely separated from 132 00:10:23,550 --> 00:10:29,430 each other and how this separation can make the whole operating system more secure. 133 00:10:29,520 --> 00:10:31,770 Or help us improve our security.