Scott's Weblog The weblog of an IT pro specializing in virtualization, networking, open source, and cloud computing

GSX Upgrade Much Smoother This Time

Earlier today I completed another GSX Server upgrade (from version 2.5 to version 3.2.1) for a customer, and fortunately this upgrade was much smoother than the last GSX Server upgrade.

(Read more...)

Again I Ask: Isn't There a Better Way?

Last summer, I wrote about my concerns with regards to fourth-generation rootkits and their supposed beneficial intentions. Now that the same approach is being applied to Oracle databases, I ask again: isn’t there a better way?

(Read more...)

Bypassing Root's Password

I had a situation today where a customer forgot the root password to a Debian GNU/Linux 3.1 system in their office. That left it up to me to try to find a way to get into the system. Here’s how I managed to gain access.

(Read more...)

Cisco NAT Issue Resolved

A short while back I mentioned that I was having a bit of a problem with network address translation (NAT) on a Cisco router. I’ve managed to get the issue resolved, so here’s the solution in case someone runs across this problem in the future.

(Read more...)

What's This All About, Anyway?

Is it just me, or is anyone else bothered by the recent stories of MSN and Yahoo turning over customers’ search terms to the Federal government? Apparently, the same request was made to Google as well, and Google is battling the request.

(Read more...)

A Flurry of Security Patches

Over this past week, a wide collection of vendors have released patches for various vulnerabilities and flaws in their applications. Here’s a quick recap of some of the security patches released this past week.

(Read more...)

Tagging Tactics

I wouldn’t dare to describe myself an expert on the use of such sites or services as del.icio.us, Technorati, or other sites that promote the use of “tags” as a means of organizing links or other content. I do use these sites (you’ll note the “Technorati Tags” added to each post), and I do find them very useful. However, I’m beginning to shift tactics in my use of tags, and hoping that this change will make these services even more useful.

(Read more...)

Novell Open Sources AppArmor

Last week, Novell open sourced the AppArmor software under the GPL, hoping to promote adoption and development of the security framework for Linux. I was alerted to the move by a number of articles on the subject, such as this article from ComputerWorld and this article from eWeek.

(Read more...)

Symantec, Kaspersky Using Cloaking Too

I guess Symantec (makers of the popular Norton line of products, like Norton AntiVirus and Norton Internet Security) and Kaspersky (an anti-virus vendor) have decided to employ rootkit cloaking techniques with their products as well, following the lead of Sony and signaling a dangerous trend in the software industry.

(Read more...)

Cisco NAT Issue

I’ve been helping a customer try to resolve a network address translation (NAT) problem on a Cisco router for the last week or so, and the solution to the problem is escaping me. What’s worse, all the documentation I can find from Cisco says the current configuration is correct.

(Read more...)