microsoft virtual server virtual machine p2v live esx citrix identity authentication encryption land attack man-in-the-middle attack authentication vmware microsoft .net authentication vmware gsx server logic bombs security internet security server identity 2.0