Tags » Virtualisation

How Splitting A Computer Into Multiple Realities Can Protect You From Hackers

Virtualisation, Sandboxes, Containers. All terms and technologies used for various reasons. Security is not always the main reason, but considering the details in this article, it is a valid point.  170 more words

News

ESXi Upgrade - Virtual Machines Drop From Network

Introduction

Was in the process of upgrading ESXi servers, 5.0 to 5.5 and noticed a number of virtual machines were disconnected from network randomly.

Throughout this blog post, I will be going through: 555 more words

Virtualisation

Mitigation techniques for management interfaces

In VMware’s hardening guide, they offer a number of mitigation techniques that can be used to further secure vCenter from exploitation. The majority of the recommended measures around securing vCenter are of an operational nature rather than reconfiguring settings within VMware. 449 more words

Security

VM Migration Scenario #2

Introduction

A few weeks ago, I was involved in decommissioning old ESXi servers due to out of warranty and for this work, I had to come up with a migration plan to evacuate virtual machines to a new cluster. 603 more words

Virtualisation

Notes from SophosLabs: On the trail of rootkits and other malware

This is the first in an occasional series looking at some of the techniques we use in SophosLabs to help us take malware apart.

We hope you enjoy this article – if there are any topics you’d like us to cover in future articles, please let us know! 1,588 more words

Featured

Microsoft Virtualization

This week I’m playing with Windows Server 2012 R2 Hyper-V.

To start I thought I’d list the different type of Microsoft Virtualization

Microsoft’s basic definitions of the different types of Virtualization… 164 more words

Microsoft

Post exploitation on management interfaces

Once an attacker successfully gains admin access to a particular element of the management infrastructure, what is possible? In traditional networks, the compromise of an ‘Enterprise admin’ or ‘root’ would be a worst case scenario. 544 more words

Security