Different people use different settings, I do not think there is one correct answer.
I am currently using VirtualBox as a Hypervisor with a file system created using Buildroot.
In addition to other virtual machines (kvm, qemu, vmware, etc.), you can also use User Linux mode for the same effect if your hacker is in the more βlogicalβ layers of the kernel.
source share