Jump to content

Search the Community

Showing results for tags 'vmware'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 11 results

  1. Another dumb block: MS induced “VMware Workstation Pro can’t run on Windows” I just heard about this from Office Watch, but checking around, it’s also described on Tenforums and on the VMWare blog. When you install any of the recent cumulative updates for Win10 1903 (the third cumulative update for September, or any of the three cumulative updates in October, including the most recent one), Windows starts blocking older versions of VMWare. The reason? MS removed VMWare from the Windows Application Compatibility database. Apparently VMWare version 15.5 — the latest version — gets around the block. But if you aren’t willing to pay for the latest version, you’re up the ol’ creek. The solution is so utterly trivial it boggles even my pre-boggled mind. You rename the program that runs VMWare, C:\Program Files (x86)\VMware\VMware Workstation\vmware.exe. The renamed file passes the Application Compatibility block, and you’re free to use the old version. Stupid. Does anybody know if there’s a reason why VMWare versions prior to 15.5 are prohibited from running on post-September-updated versions of Win10 1903? Source: Another dumb block: MS induced “VMware Workstation Pro can’t run on Windows” (AskWoody - Woody Leonhard)
  2. Yesterday VMware demonstrated a pre-release version of VMware Workstation with early support for the Windows Hypervisor Platform in the What's New in VMware Fusion and VMware Workstation session at VMworld. In Windows 10 we have introduced many security features that utilize the Windows Hypervisor. Credential Guard, Windows Defender Application Guard, and Virtualization Based Security all utilize the Windows Hypervisor. At the same time, new Developer features like Windows Server Containers and the WSL 2 both utilize the Windows Hypervisor. This has made it challenging for our customers who need to use VMware Workstation. Historically, it has not be possible to run VMware Workstation when Hyper-V was enabled. In the future – users will be able to run all of these applications together. This means that users of VMware workstation will be able to take advantage of all the security enhancements and developer features that are available in Windows 10. Microsoft and VMware have been collaborating on this effort, and I am really excited to be a part of this moment! Source
  3. Pwn2Own 2019 – Apple Safari, VirtualBox, VMware Hacked – Ethical Hackers Earned $240,000 by Submitting Zero-day’s Trend Micro’s Zero Day Initiative (ZDI) vulnerability research contest Pwn2Own 2019 Successfully started its first-day contest and the team of researchers earned $240,000 in the first day alone for the successful zero-day Submissions. Trend Micro announced $1 million in cash and prizes through the contest for the researchers who submit the zero days the specific platform including virtualization platforms, enterprise applications, web browsers, and more. List of Targets in Pwn2Own 2019 Automotive Category Tesla Model 3 Virtualization Category Oracle VirtualBox VMware Workstation VMware ESXi Microsoft Hyper-V Client Browser Category Google Chrome Microsoft Edge Apple Safari Mozilla Firefox Enterprise Applications Category Adobe Reader Microsoft Office 365 Microsoft Outlook Server-side Category Microsoft Windows RDP Last year, Overall ZDI awarded $325,000 USD total over the two-day contest and they purchasing 18 0-day exploits. This year’s contest, ZDI also introduced an automotive category, through a partnership with Tesla, as well as a continued partnership with Microsoft and sponsorship from VMware same as last year. Unlike last year, this year Pwn2Own 2019 contest conducted for 3 days (20,21,22 March 2019) in which first and the second day opens for software vendors and all automotive entries will be on Day Three (March 22) Pwn2Own 2019 – Day 1 On the very First day, a team called Fluoroacetate alone earned $160, 000 USD for the successful submission of 3 zero days. Initially, they used a bug in JIT with a heap overflow to escape the sandbox in Safari browser and earned $55, 000 along with 5 Master of Pwn points. The second target was Oracle VirtualBox in the virtualization category, in which they exploit integer underflow and a race condition to escape Virtual machine and they earned another $35,000 with 3 Master of Pwn points “Third target was VMware and they leveraging a race condition leading to an out-of-bounds write in the VMware client to execute their code on the host OS” In this case, Fluoroacetate rewarded another $70,000 and 7 more Master of Pwn points and they closed their day was closed. Another Researcher anhdaden targeting Oracle VirtualBox in the virtualization category and he submitted integer underflow zero day exploit in Oracle VirtualBox. In his first Pwn2Own, he earns himself $35,000 USD and 3 Master of Pwn point. Next team Phoenhex & qwerty (@_niklasb @qwertyoruiopz @bkth_) targeting Apple Safari and day 1 ends with a partial win $45,000 and 4 points towards Master of Pwn. So totally $240, 000 USD rewarded in the first day alone. Stay Tuned, we keep updates the remaining 2 days results with the complete details. Source
  4. VMware aims for security market, launches service defined firewall VMware is taking its visibility into infrastructure, applications and cloud and applying it to the firewall market. VMware is wading more into the IT security market with a software defined strategy that rhymes with how the company approached the data center and network markets. Pat Gelsinger, VMware's CEO, will deliver a keynote at the RSA Conference Thursday. RSA and VMware are both owned by Dell Technologies. Under the strategy, VMware is focusing on securing and defending applications more than infrastructure and aims to shrink attack surfaces. VMware is also launching a "service-defined firewall" that will secure services and software instead of focusing on infrastructure. The broader theme for IT security is that managing a bevy of services is complex with various vendors as well as agents running inside a company. Toss in virtual machines, public clouds, on-premise infrastructure and apps and security gets complicated in a hurry. Palo Alto Networks already has begun using its services, data and products as a platform that third parties can build on. There's also a wide market for security automation and orchestration. The move toward more security orchestration and automation fits well with what VMware already does with infrastructure. VMware has visibility into applications, networks and the infrastructure stack similar to the way Cisco does. VMware's big volley into this security landscape is a new VMware Service-defined Firewall. Using VMware NSX and AppDefense, the Service-defined Firewall aims to model application behavior and automate protection with what it calls "intrinsic security." Intrinsic security uses VMware's virtualization platform to validate good application behavior without the use of installed agents. VMware's Service-defined Firewall focuses on applications within an enterprise. VMware added that it'll extend its firewall tools to hybrid clouds and AWS Outposts in the future. This Service-defined Firewall has the following: Application verification based on microservice variations over time. VMware will use machine learning from its deployed virtual machines to build a map of how an app should run. Inspections of guest operating systems and applications and stop malicious behavior. A distributed approach to track applications across infrastructure and the cloud. Source
  5. How to install VMware Tools on guest operating system VMware is among the well-known virtual machine software. It allows you to install a package of utilities called VMware Tools. By installing this package, you will get quite better performance related to graphics, sound, and management. If you want to install VMware Tools on a guest operating system, you can follow this article to learn the steps. Sometimes some features of VMware may not work without the VMware Tools package. Therefore, it is quite important to install that in case you are using Windows, Linux, FreeBSD, and NetWare guest OS. Install VMware Tools on guest operating system As this VMware Tools package is OS-based, you need to create the virtual machine first. Once you have done that, close the VMware app completely and run VM as administrator and select the installation on your left-hand side. Log into your virtual machine. If you have multiple virtual machines, you need to choose the one where you want to install it. Next, go to VM > Install VMware Tools. It should open a prompt where you can find the installation wizard. If you do not see such a window, you need to press Win+R and type this- D:\setup.exe Here D is your virtual CD-ROM drive. In one window, you will get an option to choose an option among Typical, Complete, Custom. It is suggested to use Typical when you want to install the tools for current VMware product only – but you can choose Complete if you’re going to run the virtual machine on more than one VMware products. After finishing the installation, you need to restart your virtual machine to get the effect. Source
  6. StarWind V2V Converter makes migration between different hardware sets easier, supporting Windows Repair Mode during conversion to VHDX. This way the VM automatically adapts to the given hardware environment, negating any compatibility problems. StarWind V2V Converter works with all the most commonly used VM formats: VMDK, VHD/VHDX, StarWind native IMG, QCOW. It works both ways, converting from and to any selected format, thus having better functionality than similar converters. StarWind V2V Converter allows easily converting VM formats directly from one hypervisor to another. You don’t need to create the copies of the source and destination VM files on your local machine, making the conversion process extra simple. StarWind V2V Converter supports all industry-standard hypervisors including Microsoft Hyper-V, VMware ESXi, Citrix XenServer, and KVM (coming soon). By converting VMs from and to any selected format, it allows easily migrating between different hypervisors. StarWind V2V Converter is a tool that allows the conversion and cloning of VMs from one format to another and is utilized when migration or hypervisor switch is required. Compared to typical converters built into hypervisors, StarWind V2V Converter performs bi-directional conversion between multiple VM formats. The software supports the most widely used formats: VMDK, VHD/VHDX (Windows Repair Mode aware), StarWind native IMG and QCOW. The interface of the application is represented by a wizard-like layout where you can follow a few simple steps to get a task done. Loading a source file into the working environment can be done by using only the file browser, since “drag and drop” is not supported; you can check out the format and size for the respective item. In the next step, you can establish the image format for the output files, between VMWare growable, pre-allocated or ESX server image, MS Virtual PC growable or pre-allocated image, and Raw image. In case of any of the first two options, you can select the virtual disk type between IDE and SCSI. After specifying the output directory and filename, you can proceed with the conversion procedure and, during this time, you can view log details. StarWind Software V2V Image Converter uses a pretty low quantity of system memory and CPU, has a good response time and takes a reasonable amount of time to complete a job. No error dialogs have been shown in our testing and the program did not hang or crash. All in all, StarWind Software V2V Image Converter provides a simple solution when it comes to disk image conversion, regardless of the user’s skill level. Features: Converts from VMDK to VHD and vice versa Sector by sector copy Does not modify source image Easy to install and use ----- Home: https://www.starwindsoftware.com/converter Download: https://www.upload.ee/files/8416947/starwindconverter.exe.html http://www.softpedia.com/get/System/File-Management/StarWind-Software-V2V-Image-Converter.shtml Portable by FileCatchers a.k.a. FC Portables https://www.upload.ee/files/8416952/C-80167SWV2VC.rar.html
  7. VMware has addressed a denial-of-service (DoS) vulnerability, tracked as CVE-2018-6957, in its Workstation 12.x and 14.x and Fusion 10.1.1. and 10.x on OS X products. The affected VMware solutions can be attacked by opening a large number of VNC sessions. The DoS vulnerability was discovered by Lilith Wyatt of Cisco Talos, the flaw could be exploited on Workstation and Fusion only if the VNC has been manually enabled. VNC implementation in VMware solutions is used for remote management purposes. “VMware Workstation and Fusion contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions.” reads the security advisory published by VMware. The company issued the security patches in Workstation 14.1.1 and Fusion 10.1.1., VMware also shared details about a workaround for Workstation 12.x and Fusion 8.x releases that involves setting a password for the VNC connection. While VMware has classified the vulnerability as “important,” Cisco Talos has ranked it as a “high severity” flaw and assigned it a CVSS score of 7.5. Experts at Cisco Talos confirmed that an attacker can trigger the flaw on a targeted server and cause the virtual machine to shut down by opening a large number of VNC sessions. “Since the VMware VNC server is naturally multi-threaded, there are locks and semaphores and mutexes to deal with shared variables.” reads the advisory published by Talos. “The VNC server also maintains a global variable that indicates the amount of locks that are currently used, that is incremented by certain events.” Talos published the Proof-of-Concept exploit code: # There are obviously better ways to do this for x in `seq 0 $(( 0xffffff/2 ))`; do echo “doop” | ncat <targetIP> <VNCPort>; done Regardless, the important thing to note here is that the incrementing instruction (lock xadd cs:MxLockCounter, eax is the only cross-reference to the MxLockCounter global variable, meaning it never gets decremented.” continues Talos. “Thus, as long as and attacker can initiate a bunch of TCP connection to the VNC server (each successful connection increments it twice), without even sending any other datagrams, an attacker can eventually shutdown the connected virtual machine.” Below the timeline for the flaw: 2017-07-13 – Vendor Disclosure 2018-03-15 – Public Release Source
  8. Harry DS Alsyundawy

    HPE VM Explorer 6.7.1

    VM Explorer Virtual Machine Backup Simple, affordable, and reliable VM backup and replication for VMware vSphere and Microsoft Hyper-V . All-in-one VM data protection Backup and replicate ESX and ESXi standalone servers, vCenter virtual datacenter, Microsoft Hyper-V server as well as a Hyper-V Cluster on all operating systems supported by VMware ESX/ESXi and Microsoft Hyper-V server. High value at a low price Simple licensing, low pricing, and self-service features enable easy maintenance and eliminate the need for special training – making the overall solution very cost-effective. Single-click restore Perform data recovery of VMs in a matter of seconds directly from data backups, reducing unplanned downtime and improving service availability. Granular file-level and Microsoft Exchange recovery enables rapid restore of single files and folders directly from any backup. Fast and Reliable Automatically backup data verification, encryption, and active directory integration without disrupting the production environment. Backup to Disk, Tape, and Cloud Securely back up and replicate VMs directly to cloud targets including Amazon S3, Microsoft Azure, Rackspace, and OpenStack without any intermediary gateway. Automated storage tiering enables seamless movement of backup sets between disk, tape, and cloud. Easy to Install and Operate Be up and running in minutes. The configuration requires a few simple clicks to start running data backups and replications of your virtual machines. You can manage the health and status of all scheduled data backup tasks through a single dashboard. https://software.microfocus.com/en-us/products/vm-server-backup/overview Download : (No Medicine) https://software.microfocus.com/en-us/products/vm-server-backup/download Mirror http://mir.cr/1IUP1LPL
  9. SAN FRANCISCO---Kaspersky Lab has introduced a new light agent approach for shoring up security on VMware, Citrix and Microsoft virtualization platforms. Introduced amid the internet security firm's enterprise IT summit in San Francisco on Tuesday, the Kaspersky Security for Virtualization Light Agent is characterized as a "best of both worlds" model, redirecting heavy processing workloads to a virtual appliance while promising to keep all endpoints secure. Essentially, the Kaspersky plan installs a small software agent on each virtual machine, which can be deployed without rebooting, for the purpose of guarding the virtual network. Along with an assortment of application and device controls available for IT admins, the light agent solution also includes all of the same security capabilities that come with Kaspersky Lab’s agentless method, which is directed toward datacenters and server environments that don’t access the Internet. This light agent is Kaspersky Lab’s first security solution optimized specifically for Microsoft Hyper-V and Citrix XenServer customers. For VMware customers, the light agent is designed to complement Kaspersky Lab's existing virtualization security portfolio for VMware's flagship cloud and virtualization operating system, vSphere. Thus, VMware users will now have a choice between agentless or light-agent protection. For the time being, the light agent technology is only available upon request in the United States until April 22, when it is slated to roll out for purchase across the U.S., Russia, United Kingdom, Germany, Australia and the Middle East. Full commercial availability for all global regions is scheduled to follow in the next several weeks. Source
  10. VMware has released an update to its vSphere Client which addresses a potential – but hard to target – man-in-the-middle vulnerability for the virtualization tool. The company said that users running vSphere Client 4.0, 4.1, 5.0, and 5.1 for Windows were vulnerable to a flaw that allows the client to download and install untrusted updates. Were an attacker to exploit the flaw, VMware said that users could be subject to remote code execution attacks via a malicious link or redirect. Systems running vSphere Client 5.5 are not vulnerable to the flaw. Steve Pate, chief architect at virtualization security firm HyTrust, told The Reg said that while administrators should always make sure users are running fully patched software, the risk of attacks targeting this vulnerability in the wild are likely to be low. Pate told us that in the case of the vSphere Client vulnerability, an attacker would have to get in the middle of an update chain that runs when the vCenter Server platform is updated and no longer matches the end user's version of the vSphere client, at which point the vulnerable component is launched. "For most companies and datacenters, the chance of actually having an attack is extremely slim," Pate explained. "If it could be exploited, it would be an extremely sophisticated attack and not very easy to do." The update comes just two days after VMware told users that 28 of its products contain versions of OpenSSL subject to the infamous Heartbleed security flaw. The company has yet to roll out a fix for that flaw as it releases the patch for the vSphere Client vulnerability. Still, administrators need not fret much over their VMware products, Pate said. He noted that as few VMware implementations directly face the public web, the risk posed by Heartbleed will be lower than that of platforms and applications that are more readily accessible to potential attackers. Source
  11. Why Choose VMware Workstation? Winner of more than 50 industry awards, VMware Workstation is recognized for its broad operating system support, rich user experience, comprehensive feature set and high performance. It's the perfect companion for any technical professional that values applications built by engineers, for engineers. What’s New in Workstation? VMware Workstation 9 continues VMware’s tradition of delivering the virtual hardware that technical professionals deserve and rely on every day. With support for Windows 8, restricted VMs, Open GL support for Linux and a new web interface to access virtual machines, it’s the perfect tool for getting work done. Homepage http://www.vmware.com/ Direct Download: http://download3.vmware.com/software/wkst/file/VMware-workstation-full-10.0.1-1379776.exeTablet: http://www.mirrorcreator.com/files/0RJ7JJAT/VM_TabletbyRok.rar_links
×
×
  • Create New...