Why Virtual Machine Checkpoints and Snapshots can be Dangerous