Monthly Archives: June 2013

ISO Life CD on Kernel 3.9.8 to be released soon

Pre-alpha release for Download available

From 28th of June 2013, we are offering our Interactive Cloud OS as Pre-alpha release ISO CD for customers, testers and contributors.

This release is based on Linux Kernel 3.9.3.

An ISO with Kernel 3.9.8 will be released very soon. If you want to enlist for the Download of the BETA release, please enlist at:

Interactive Cloud OS Overview

General Overview

Interactive Cloud OS is a multi-functional operating system optimized and designed for virtualization and cloud computing. It is not based on any other operating system, but designed and built completely from scratch. It is based on the newest Linux Kernels.

Technical Overview

The Interactive Cloud OS is an operating system, sitting directly on top of the server hardware (confer to the black bar below).

On top of the hardware, you can find the Cloud OS. It contains several add-on modules (e.g. Firewall, Software Switch for Networking, Denial-of-Service Mitigation). It contains a Web GUI as well (red) to manage the server with a regular web browser.

Interactive Cloud OS Overview

Interactive Cloud OS Overview

It shows the hardware as fundament, the Interactive Cloud OS as the operating system and several important services and their connections integrated.

On top of the Interactive Cloud OS, there is room for plenty other Internet add-on services (blue) and Third-Party Software (purple), e.g., Monitoring Tools, Virus and Malware scan.

Abstraction Layer

Interactive Cloud OS is a Host OS, giving the ability to install other OS on the same machine (the Guest OS). Since we use the latest technology and optimize it for cloud computing only, we achieve high performance and high security.

From the administrator perspective it looks like this:

Interactive Cloud OS as Host-OS with Guest-OS installed above

Interactive Cloud OS with Guest-OS installed above

This shows many different Guest OS running on the Interactive Cloud OS (e.g. RedHat, SuSE Enterprise Linux, Microsoft Windows, Debian, Ubuntu…).

The amount of such Guest OSes is only limited by your hardware resources (CPU, RAM and HDD Space). It allows for server consolidation (many OS on one server) and centralized management and security.

In a deployment with more than one server, resources can be shared and balanced among your cloud, Virtual Machines can be shifted from one computer to another.

Main Benefits

  • Reduce costs by using less hardware
  • Enhance flexibility of your installation by moving your VMs locally or worldwide
  • Reduce the CO2 footprint
  • Balance the Load of your servers
  • Allocate more space dynamically when you need it
  • Use VMs for testing or updating procedures
  • Destroy a VM when a test fails and start a new one in seconds from your saved snapshot
  • Use snapshots to clone your installation
  • Use snapshots to backup and cold-standby your services
  • Secure your servers with central security management
  • Connect your cloud worldwide via strong VPN tunnels and act worldwide
  • […]


With the free and OpenSource Interactive Cloud OS, you can run many other operating systems on one computer in a fast, safe and reliable way.

By adding additional computers, you will be able to run your own cloud – up to hundreds of computers with virtual unlimited machines and applications.

Since Interactive Cloud OS is free and Open Source, there is no faster way to get into the cloud.

Build your cloud your own way!

Secure Public Cloud Setup? An idea…

Running a virtual machine on any public cloud has an inherent security risk: The cloud service provider.

The cloud service provider may take a snapshot of the virtual machine at any time. Thus allowing him access onto any data available at the moment of the snapshot, even onto encrypted data. Or to suspend the virtual machine to maliciously inject a root kit into the virtual machines memory, no matter if it’s running Windows or Linux or any other Operating System.

Call me paranoid. But besides those sophisticated attack scenarios there are much simpler ones, like just peeking the virtual disk. Anyhow, this allows data privacy violation as well as industrial espionage by a cloud service provider, regardless if he acts on his own or is forced by court or an intelligence service.

And do not forget, that the Washington Post has shown that the U.S. intelligence runs a program called PRISM to secretly mine data from U.S. internet companies.

So it may be of some interest for the internet community to create a secure public cloud setup (SPC — let’s call it spice) with Interactive Cloud OS –or any other Linux– which is not vulnerable to unrestricted and unnoticed access to private data.

But how could a user protect his data or virtual machines in a public cloud? Some requirements come to mind:

  • Any access on a virtual machine or its disks will be logged and shown to the user.
  • Any user should be able to check at any time that the running OS hasn’t been altered.
  • The running OS should be open source, thus allowing the community to check for back doors.

At a first glance it looks impossible to achieve the requirements.

But, on the other hand, Interactive Network already developed award winning system Intermediär with similar requirements which is used to ensure high grade data privacy for the German Haemophilia Register. Using a combination of digital signatures, cryptographic functions and organisational conditions Intermediär is protected against any unnoticed alteration or eavesdropping, including hardware based attacks, like key loggers.

After all it ought to be possible to achieve the requirements.

But even if there is a chance to fail, creating an open source process to SPiCe up the cloud would be worth the effort, wouldn’t it?

Feel free to join the discussion.