Kali Linux is one of most popular Linux distributions and many security experts are using this distribution as penetration testing system. Kali Linux is a Debian based distribution and most Kali’s packages are imported from Debian repositories.
Kali has more than 300 preinstalled tools for penetration testing such as Armitage (a graphical cyber attack management tool), nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper password cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners.
Kali development team has released new version and it’s available for download.
Kali Linux is available for both 32-bit and 64-bit platforms and also the team focus on ARM devices and also there is an image for ARM architecture.
Also Kali Linux NetHunter is also available for smartphones such as the Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, OnePlus One, and some Samsung Galaxy models.
Kali Linux hardware requirements:
- A minimum of 20 GB disk space for the Kali Linux install.
- RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more.
- CD-DVD Drive / USB boot support
Kali Linux will be installed on some Apple devices such as Apple MacBook Air, Pro, and Retina models.
Also it will be installed on virtual platforms such as VMware Workstation and Oracle VirtualBox
Read more information on Kali Linux documentation.
1,619 total views, 10 views today
What’s Vembu BDR Suite?
Today, data protection and service protection are two important concepts in IT environments. Any company needs tools to protect its data and its business. Also in addition of data protection, companies need to tools to keep their services up always with near zero down time or zero down time. Vembu BDR Suite provides complete, hassle-free, universal Backup and Disaster Recovery (DR) solution for all physical and virtual environments. It features host level backups of VMware and Hyper-V. Vembu BDR Suite also allows granular recovery of files, folders and applications.
Vembu BDR Suite – Editions
Vembu offers two editions of Vembu BDR Suite:
- Paid Edition
- Free Edition
The Free Edition of Vembu BDR suite of products contains the mandate features which ensures data protection for both the physical and virtual data center environments. If the organisation is not having any specific backup policy requirement for business continuity and data management environment features like, near continuous data protection with CBT (changed block tracking) incremental backup, VM replication with automated Failover and Failback process, stand-by virtual DR (Quick VM recovery) and Offsite DR, then they can opt for the free edition of Vembu BDR Suite.
It doesn’t matter that you want to install and use Vembu BDR Suite as paid edition or free edition. There is single installer and if you want to use advanced features, you can buy and install license otherwise you can use free edition after evaluation period.
1,957 total views, 3 views today
Nakivo Backup & Replication 7
Today, Nakivo has announced latest release of Nakivo Backup & Replication with lot of new features and improvements.
Nakivo Backup & Replication 7 key features are as follows:
- Hyper-V Backup And Replication
- Supporting VMware vSphere 6.5
- Skip Swap Files
- Active Directory Integration
- Bulk Delete
Read the below posts and Nakivo Backup & Replication 7 home page to find detailed information about the features and improvements:
Nakivo Backup & Replication 7 Beta! Hyper-V Supported Now!
Nakivo Backup & Replication 7 – vSphere 6.5 Support!
Nakivo Backup & Replication 7 – Skip Swap File!
Nakivo Backup & Replication 7 is available for download now and you can use it free for 30 days!
1,864 total views, 12 views today
Actually, Ransomware is a computer malware and Ransomware will be installed on wide range of devices such as computers, smartphones and wearable devices. Ransomware can attack to data and encrypt data then ask user to pay for decrypt data.
Users may encounter Ransomware in a number of ways. The most common method used by attackers to spread Ransomware is via e-mail as an attached file.
Protecting VM Against Ransomware
Most companies are using VDI solutions to deliver desktop experience to the users and virtual desktops acting same as physical desktop. Even all protection steps are provided for protecting users data such as strong anti-virus, firewall, email malware detection and other ways, attackers will try new way to infect user data and keep data as hostage and ask to pay money.
When users data is encrypted by a Ransomware, administrators can help them by restoring their data from a valid backup, so one of solutions to protecting data is taking backup from them.
2,310 total views, 8 views today
Datacenters are going smaller compare to datacenters in past few years because of virtualization revolution. Organizations are deploying their services on virtual servers instead of physical servers and most companies over the world have large virtual farms. But some traditional challenges are still exists such as backup and disaster recovery.
Virtual machine deployment and maintenance is easier than physical servers but administrators have to take backup from machines, files or any important data same as before, nothing changed! Also organizations still needs to recovery site for disaster recovery in other geographical location, all machines should be replicate between the primary and recovery site. Backup solutions are little different in virtual infrastructures with physical infrastructures but backup solution has also backward compatibility in virtualization platforms, means that the backup solutions covers both virtual and physical machines now.
The new backup and recovery solutions still needs to storage space for storing backup files, bandwidth for transfer and computing resources for processing backup jobs. Any backup solution has some best practices and administrators should consider the best practices to achieve best results. Know VM backup best practices are important topics for planning and implementing backup solutions.
Join me to review some of best practices for backup solutions in virtual infrastructures.
Define Backup Strategy
Defining good strategy is first and important step of backup and recovery solutions. Administrators should know:
- Should take backup from all virtual machines?
- No. All virtual machines are not critical for us. Virtual machines should divided to groups and define backup plans according to those groups and their priorities.
- On-Site or Off-Site?
- On-Site backup is a usual backup solution but about mission critical services, but about natural disaster. Off-Site backup and replication solution helps you too keep your services safe and running always.
- RTO and RPO: Organizations should define their RTO and RPO on their business continuity planning.
1,204 total views, 17 views today