Category: Reviews

Virtualization Software Reviews, Backup & Replication Software Reviews, Monitoring Software Reviews.

EMC Unity 1

Manage Dell EMC Unity via PowerShell

Let’s be wise, PowerShell is one of most popular and easiest scripting languages for automation. Why!? Because other guys have made PowerShell module for you. EMC Unity command-line tool (UEMCLI) actually is on my...

2

What’s FreeDOS?

FreeDOS is an open source DOS-compatible operating system that you can use to play classic DOS games, run legacy business software, or develop embedded systems. Any program that works on MS-DOS should also run...

2

VMware vSphere 6.7 Update 2

VMware vSphere 6.7 Update 2 has been announced by VMware today. Many fixes and improvements is coming with the new release. There is improvements for vSphere Platinum and also VMware announced vSphere ROBO edition (vSphere Remote Office Branch Office). vSphere 6.7 Update 2 will deliver simplified operations, enhanced security, and support for new applications. It will include updates to the vCenter Server Converge Tool, new vCenter Server audit events and new VM maximums.

Advanced Threat Analytics (ATA) 0

What’s Microsoft Advanced Threat Analytics?

Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats. Advanced Threat Analytics (ATA) leverages a proprietary network parsing engine to capture and parse network traffic of multiple protocols (such as Kerberos, DNS, RPC, NTLM, and others) for authentication, authorization, and information gathering.

Java Mission Control 0

What’s Java Mission Control?

Java programming language is most popular programming languages (Tiobe Index)but Java applications are monster and eating computing resources easily if codes are not optimized and application not profiled. Monitoring Java applications has overhead on a system and in most of scenarios, test environments are different than production environments.

VMware’s Automated Virtual Assistant 0

I’m Ava, VMware’s Virtual Assistant

I’m feeling old when I met Ava. Not too long, I had to use Google to find information about articles in VMware Knowledge Base. No one cared about us. But now, Ava will help guys to find anything faster. The name is like an Iranian name for girls (ōĘŔąōß). She’s so beautiful, so respectful but very young because it’s the beta version.

Nakivo Universal Object Recovery 0

NAKIVO Backup & Replication v8.1

There is no need to introduce Nakivo for my reader at begin of each post. Nakivo is one of leaders in backup & replication market now. I writing reviews about Nakivo Backup & Replication since version 6.x. All new version had new amazing and useful features. Nakivo Backup & Replication v8.1 comes with two new features as well. In addition of new features, Nakivo Backup & Replication v8.1 has come with lot of improvement and fixes. Let’s review new features, improvements and fixes.

OpenSCAP Tools 0

What is OpenSCAP?

OpenSCAP is an auditing tool that utilizes the Extensible Configuration Checklist Description Format (XCCDF). XCCDF is a standard way of expressing checklist content and defines security checklists. It also combines with other specifications such as CPE, CCE, and OVAL, to create a SCAP-expressed checklist that can be processed by SCAP-validated products.

OWASP Zed Attack Proxy (ZAP) 0

Overview of OWASP Zed Attack Proxy (ZAP)

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

GSM Community Edition - Report Comparison 0

Virtual Environments Vulnerability Assessment By GSM (OpenVAS) ‚Äď Part 3

At the first part, we’ve reviewed GSM (Greenbone Security Manager – Formerly OpenVAS) as a security manager or assessment tool for discovering vulnerabilities on virtual environments, the second part was more functional and we talked more about GSM. You leaned that how can you create a target on Greenboone Security Manager and scan it to discover¬†vulnerabilities.

As I said at the end of second part of the blog post, the third part is related to resolving security issues. Any software and specially operating systems have¬†“Hardening Guide”. You must follow steps of hardening guide to reduce security¬†vulnerabilities effect on production environments.

Virtual Environments Vulnerability Assessment By GSM (OpenVAS) - Part 2 0

Virtual Environments Vulnerability Assessment By GSM (OpenVAS) ‚Äď Part 2

We have reviewed reasons of have Vulnerability Assessment or Vulnerability Manager in virtual environments and how these software help us to find vulnerabilities on any component of virtual infrastructure. We have reviewed OpenVAS or Greenbone Security Manager and talked about features and abilities.

Now, it’s time to use the GSM server that we had prepared on the previous part. In this part of blog post, we’ll configure a target (ESXi Server) on OpenVAS server, create a task for scan and find the result of scan.

I’ve installed ESXi 6U1 (3029758) on a virtual machine and there is no customized configuration, all configurations are default.

iptables vs nftables 0

NFTables, The Next Generation of Packet Classification Framework

Over the years, XTables (IPTables, IP6Tables, ARPTables and EBTables) were using as user-space utility programs for packet filtering in Linux distributions such as Red Hat Enterprise Linux or Ubuntu. Now, Linux vendors are replacing XTables with next generation packet classification framework which called NFTables.

nftables replaces the popular {ip,ip6,arp,eb}tables. This software provides a new in-kernel packet classification framework that is based on a network-specific Virtual Machine (VM) and a new nft user-space command line tool. nftables reuses the existing Netfilter subsystems such as the existing hook infrastructure, the connection tracking system, NAT, user-space queuing and logging subsystem.

Vulnerability Assessment 0

Virtual Environments Vulnerability Assessment By GSM (OpenVAS) – Part 1

In virtual environments, any vulnerability has affect on virtual infrastructure and those who get the service including internal and external services. So at least, any organization should have process to identifying vulnerabilities. Identifying vulnerabilities needs tools in IT infrastructure to scan devices, operating systems and applications and find vulnerabilities (Especially security vulnerabilities).

Linux Container 0

Operating System Level Virtualization (Part 2) – Implementations Comparison

These days, everyone knows what’s Cloud Computing and cloud based services are using for speedup deployment of organizations services. Operating System Level Virtualization or Containers helping system architectures and administrators to achieve the goals. There are many implementations for containers that today, those methods are compatible with different hardware architectures and operating system.

You may know that Unix has OS Level Virtualization from past years and this technology is very older than other virtualization such as Full Virtualization or Paravirtulization.

Full Virtualization (VMware ESXi, Hyper-V) and Paravirtualization (Xen, UML) provides different guest OS but there is no way to use different guest OS when you are using containers. Of curse, some solutions are under development.

HPE 0

HPE Management Component Pack (MCP)

HPE Management Component Pack or HPE MCP provides agent software for use on community-supported distributions. The MCP (unlike the SPP) does not provide drivers and firmware (firmware is provided via HPSUM, and drivers are provided by the distribution vendors). The Linux Service Pack for ProLiant provides updated drivers and agent software for use on RedHat Linux and SUSE Linux Enterprise Server.

Subscribe to our newsletter and join other subscribers

Holler Box