VMware ESX 4 can even virtualize itself | VCritical NEW: VMware vSphere 5 makes this even easier and supports nested 64-bit guests. Running VMware ESX inside a virtual machine is a great way to experiment with different configurations and features without building out a whole lab full of hardware and storage. It is pretty common to do this on VMware Workstation nowadays — the first public documentation of this process that I know of was published by Xtravirt a couple of years ago. But what if you prefer to run ESX on ESX instead of Workstation? You may be pleased to know that the GA build of ESX 4 allows installing ESX 4 as a virtual machine as well as powering on nested virtual machines — VMs running on the virtual ESX host. VMware vSphere 4.1 UPDATE: VMware ESXi 4.1 has a keyboard issue when virtualized on an ESX 4.0 host. The extra tweaks to make it all work are minimal, and I will show you how without even opening up a text editor. Create a new VM with the following guidance (choose “Custom”): To prevent this, just one tweak is needed:
Seguridad Informática / La familia ISO 27000 Autor: Lic. Cristian F. Borghello El pasado primero de julio, ISO publicó "Technical Corrigendum", una corrección técnica para sustituir la numeración "17799" por "27002" en el documento, hasta esa fecha conocido como ISO/IEC 17799:2005. El documento es sólo eso: una corrección en un documento de apenas una hoja, para hacer oficial el nombramiento. La ISO ha reservado la serie ISO/IEC 27000 para una gama de normas de gestión de la seguridad de la información de manera similar a lo realizado con las normas de gestión de la calidad, la serie ISO 9000. La numeración actual de las Normas de la serie ISO/IEC 27000 es la siguiente: ISO/IEC 27000: Fundamentos y vocabulario.ISO/IEC 27001: Norma que especifica los requisitos para la implantación del Sistema de Gestión de Seguridad de la Información (SGSI). A continuación también dejo las "principales claves para implementar la ISO 27001" por Javier Cao Avellaneda. Más Información: Buenos Aires, 21 de julio de 2007 digg
How to Enable Support for Nested 64bit & Hyper-V VMs in vSphere 5 With the release of vSphere 5, one of the most sought out feature from VMware is the ability to run nested 64bit and Hyper-V guest virtual machines in a virtual ESXi instance. Previous to this, only 32bit virtual machines were supported as the VT-x/AMD-V Hardware Virtualization CPU instructions could not be virtualized and presented to the virtual ESX(i) guest. This feature is quite useful for home and lab setups in testing new features or studying for VMware certifications and running multiple vESX(i) instances. You will still be required to have a 64bit capable system and CPU and you will need to be running ESXi 5.0, this will not work for ESX(i) 4.x or older. The above diagram depicts the various levels of inception where pESXi is your physical ESXi 5.0 hosts. Note: You will not be able to run a 4th level nested 64bit VM (I have tried by further passing the HV instructions in the nested guest) and it will just boot up and spin your CPUs for hours. 1. 2. 3. 2. 3. Intel Hosts: AMD Hosts:
Noticias de Seguridad Informática - Segu-Info: iso A finales de este año será presentada la nueva versión ISO 27000:2013 (II y III) de esta norma internacional. Hay una gran expectativa sobre las novedades incluidas, ya que se trata de la primera actualización desde que se adoptó la original de este estándar en el 2005. Tras ocho años, ha habido cambios muy significativos, incluyendo amenazas, vulnerabilidades y riesgos. Hace más de dos años que se inició este proyecto de actualización que ha contado con la participación de especialistas de más de 60 países. Esta nueva versión incluye muchas novedades, tanto a nivel del sistema de gestión como a nivel de controles de seguridad de la información. Para empezar, la norma tiene una nueva estructura común a todas las normas ISO. Todas las definiciones que estaban en la versión de 2005 han sido eliminadas, y aquellas que aún son relevantes, han sido reubicadas en la ISO/IEC 27000. Por ejemplo, se ha incluido una nueva sección sobre la comunicación interna y externa relevante para el SGSI.
Learn How to Pass (or Beat) a Polygraph Test | AntiPolygraph.org Educate yourself. Before playing Russian roulette with your reputation, learn how to protect yourself against this invalid test. Download AntiPolygraph.org's free book (1 mb PDF): The Lie Behind the Lie Detector The dirty little secret behind the polygraph is that the "test" depends on trickery, not science. The polygraph pens don't do a special dance when a person lies. The test also includes irrelevant questions such as, "Are the lights on in this room?" The simplistic methodology used in polygraph testing has no grounding in the scientific method: it is no more scientific than astrology or tarot cards. Perversely, the "test" is inherently biased against the truthful, because the more honestly one answers the "control" questions, and as a consequence feels less stress when answering them, the more likely one is to fail. CBP Polygraph Chief John R. Quarterly Polygraphs for NSA Analysts? U.S. U.S. An Attempted EntrapmentIn May 2013, I was the target of an attempted entrapment. U.S.
ISO&Sec Four ways to disable or enable USB Ports in Windows 7 How often you have witnessed blocked Pen drive or USB drive access in your work place or college or school? I believe many times; in fact every time you try to use the USB drive, you are not allowed, simply because the administrator has disabled USB drive detection on your PC. Again, how often has your data been stolen because someone connected an unauthorized USB to your computer and copied your files? Well, you don’t need to worry because the solution to disable or enable USB Ports is pretty simple. There are three ways an administrator can prevent using of USB Drives. They are: Altering registry values for USB Mass Storage Devices.Disabling USB Ports from Device Manager.By Un-installing the USB Mass Storage Drivers. Lets us look at how we can fix these problems and enable USB on Windows 7 PC. 1. If the administrator is smart then he would definitely do this to ensure a tight blockade. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR 2. 3. 4.
El Marco de Trabajo de COBIT El pasado mes de mayo, se público la versión 4.1 de COBIT*1, Objetivos de Control para Tecnologías de la Información y Relacionadas, que es un conjunto de mejores prácticas para en la seguridad de la Información creado por la Asociación para la Auditoría y Control de Sistemas de Información. ISACA*2, y el Instituto de Administración de las Tecnologías de la Información, ITGI*3. Proporciona un estándar internacional de prácticas aprobadas mundialmente que ayudan a la alta dirección, ejecutivos y administradores a incrementar el valor de las Tecnologías de la Información, TI, y a reducir los riesgos del negocio. Facilita un conjunto de buenas prácticas a través de un marco de trabajo de dominios y procesos, y presenta las actividades en una estructura manejable y lógica. COBIT 4.1 es una actualización significativa del marco que asegura que las TI estén alineadas con los objetivos de negocio, sus recursos sean usados responsablemente y sus riesgos administrados de forma apropiada. *1.
Make Your Email Hacker Proof It's only a matter of time until your email gets hacked. Don't believe me? Just read this harrowing cautionary tale. When [my wife] came back to her desk, half an hour later, she couldn’t log into Gmail at all. Now get everyone you know to read it, too. Your email is the skeleton key to your online identity. The good news, at least if you use GMail, is that you can make your email virtually hacker-proof today, provided you own a cell phone. Go to your Google Account Settings Make sure you're logged in. On the account settings page, click "edit" next to 2-step verification and turn it on. Have Your Cell Phone Ready GMail will walk you through the next few steps. Now Log In With Your Password and a PIN Now your password alone is no longer enough to access your email. Once this is enabled, accessing your email always requires the password, and a code delivered via your cell phone. What If I Lose My Cell Phone? What About Apps That Access Email? But I Don't Use Gmail Hey, This Sounds Like a Pain!
TGSec Windows Hardening Guide - Erik's IT-Security notes Be advised that work on this guide has only just begun. Latest change: 2008-11-29 01 2009 V0.5 Erik Zalitis Security baseline for Windows server 2003 and Windows server 2008 This document describes the steps necessary to harden an already installed Windows 2003 Server installation. This is meant to help you create and maintain a minimum security baseline. Checklist Go through this checklist and document every time when you choose not to adhere to the baseline. Installation shall be done on a clean system Reason: Security Baseline for Windows 2003 Server When you upgrade a system, you will get a lot of extra files, leftover registry entries and other remaining data that could affect stability and security. Only one Operating System on the server Reason: Avoid dual boot configurations. English version must be used Reason: Localized Service Packs and software are released later than the native English one. All partitions use NTFS Reason: NTFS supports security properties and auditing.
C+Python+php Karishma Bagga's review of Philips PD9000/37 9-Inch LCD Portable DVD ... Socket API calls to create our first client program The previous sections explained how to find out the port number for a service name, and how to get the IP address for a host name. This section will utilize that information to create a simple client program. The socket() API is used to create a socket. The IBM manual page that documents the socket API is at this link: It lists the following as the prototype for the socket() API: int socket(int address_family, int type, int protocol) This tells us that the name of the procedure to call is 'socket', and that it accepts 3 parameters. D socket PR 10I 0 ExtProc('socket') D addr_family 10I 0 value D type 10I 0 value D protocol 10I 0 value It's important to realize that the socket APIs can be used for other networking protocols besides TCP/IP. For address family, the manual tells us that we need to specify a value of 'AF_INET' if we wish to do network programming in the 'Internet domain'.