esx vmware live citrix man-in-the-middle attack storage encryption authentication identity 2.0 identity authentication linux microsoft .net authentication virtualization land attack security internet security microsoft logic bombs