Monday, September 21. 2009
Another VCDX Study Guide - Part 2 Networking
Hi Guys, My VCDX study guide part 2 networking. Again uploaded as a word doc so you can hack away at it as you see fit. comments are of course welcome, and just as with the storage version, it is v0.1 and needs some love for formatting etc. so will prob tune it. anyway - enjoy!
http://communities.vmware.com/docs/DOC-10800
He already published Part 1:Storage at this address :
http://communities.vmware.com/docs/DOC-10705
Thursday, September 17. 2009
My Tweet Up with Stu Radnidge
This evening I had my first Tweet Up ever; it’s not actually a real Tweet Up, because I’ve met fellow vExpert Stuart (vinternals.com) before at the VMworld 2009 in Cannes where we attended the most secret “Virtualization PowerShell community Night” ever. But first let me explain the term Tweet Up; it’s a real world meeting between two or more people who know each other through the online Twitter service. While Stu and his wife are traveling trough Germany, I’m delivering a VMware Fast-Track training course in Munich, our tweets crossed and we had a meeting at Stu’s hotel - Le Méridien. I didn’t go unprepared, because I wanted to know everything about the “vSphere 4.0 Quick Start Guide”, since Stu is one of the authors he finally agreed to do a little interview.
Searching for Ready to Run Linux VMs?
Monday, September 14. 2009
The VMware Hacking Course will become available in Europe
The title was a little long so we shortened it to Hacking Uncovered:VMware.
Let me give you a little history of why I did this.
First off let me say that VMware is probably one of the most secure environments I have ever worked with, given that it is installed in a secure manner. It is NOT secure out of the box taking the defaults in my opinion. Of course I could post quite a few of my exploits I have uncovered in developing the course on a You Tube video and how to steal credentials from your virtual environment, even the complex password protected vpxuser that connects the Host to the VC by simply rebooting the Host and waiting for it to drop this in your lap. But this is not about providing Hackers ammuntion, it is about securing our DataCenters. Now in VMware' defense the right conditions would have to be met, and you would have to have access to the network segment that the VC and Host are on, but it is alarming none the less. A sample of an actual intercept is posted below.
xmlns="urn:vpxa3"><_this type="VpxapiVpxaService">vpxa</_this><userName>vpxuser</userName><password>*{color:#ff0000}BkGiD3-b6:F8]d28\lBk=b{2993H[rag*{color}</password><soapPort>443</soapPort><hostIp>172.16.4.40</hostIp></LoginVpxa>
Texiwill and I showed this to VMware at VMWorld since then we have been exchanging emails with the security department so they can recreate and address this. We show you those exploits in the class so that you can more easily protect yourself in your environment
Continue reading "The VMware Hacking Course will become available..." »Saturday, September 12. 2009
Mendel Rosenblum and the Virtual Appliance Management
On September 10th, 2008, Mendel Rosenblum, VMware's chief scientist, resigned, but just before he left the company, there was an interesting patent application filed which is still not issued. It has to do with Virtual Appliance Management.
US Patent Application No. 2008/0215,796
Title : Virtual Appliance Management
Publication Date : Sep 04, 2008
Application Filed : Mar 06, 2008
Abstract Text
Various approaches for virtual appliance management are described. In one approach a virtual appliance repository stores one or more virtual appliances and is coupled to the host computer via a network. A storage device stores a transceiver program capable when executed on said host computer of requesting and receiving the virtual appliances, and generating for each received virtual appliance a respective local copy on the host computer of each received virtual appliance. The local copy is private to the host computer. The transceiver program further binds the virtual appliances to the host computer and obtains user data relevant to the virtual appliances. The transceiver program runs each of the virtual appliances from the respective private local copies on the host computer.
Sounds like Cloud Control......
Thursday, September 10. 2009
VMware Announces New Dates for VMware Partner Exchange 2010!
VMware Partner Exchange is an annual partner conference dedicated to educating and enabling partners for success with VMware. We understand your need for a conference that allows you to make your voice heard and we will deliver! By attending, not only will you get the inside scoop on new partner programs, you will understand the training roadmap, and be the first to hear on VMware’s plans for the coming year.
Join VMware on February 8 - 11, 2010 at the Mandalay Bay Convention Center in Las Vegas for VMware Partner Exchange
The hottest virtualization partner conference designed just for VMware Partners. http://www.vmware.com/go/partnerexchange