VIX API allows a malicious script on the host machine to execute programs, open URLs, and perform other privileged operations on any guest operating system open at the console. The script can execute programs even if you lock the desktop of the guest OS. Virtual machines have become a more integral part of the computing world and are playing an increasing role in IT infrastructures. There is a need to establish best practices for virtual machine guest and host isolation, and that there is a best practice for virtual server host isolation.”]

