افزایش ظرفیت دیسک مجازی در VMware

اگر نیاز به افزایش هارددیسک یک نسخه مجازی در vmware دارید، چنین راه حلی در اختیار شماست:

root@Mira:/media/disk-1/vm/xp-sp3# vmware-vdiskmanager -x 10GB xp-sp3.vmdk
Grow: 100% done.
Disk expansion completed successfully.

WARNING: If the virtual disk is partitioned, you must use a third-party
utility in the virtual machine to expand the size of the
partitions. For more information, see:
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1647
root@Mira:/media/disk-1/vm/xp-sp3#

همینطور مشاهده کنید Using VMware Virtual Disk Manager و محصولات VMXBuilder.

کنترل ورم Conficker با استفاده از محصولات استارو

بعد از مدت تقریبا زیادی کار با محصولات شرکت استارو اطمینان خوبی به این محصولات پیدا کرده ام.
یکی از دلایل این اطمینان پیاده سازی این محصولات بر پایه خانواده لینوکس با یک ساختار قابل اطمینان و همراه با پشتیبانی ویژه تیم و جامعه کاربران حرفه ای استارو است.
با شیوع گسترده ویروس (ورم) Conficker و تبعات آن هر یک از محصولات امنیتی راه حلی برای مقابله با این ورم آماده کرده اند.

در مورد محصولات Astaro این ورم با افزودن Astaro Global Pattern Up2Date #9422 به موتور IPS محصولات استارو از اوایل ژانویه ۲۰۰۹ توانایی مقابله به Conficker ایجاد شده است.

برای اطلاعات بیشتر مراجعه کنید به : Astaro Patterns: Controlling Conficker Worm

Argus

Argus : A generic IP network transaction auditing tool
Argus is a fixed-model Real Time Flow Monitor designed to track and report on the status and performance of all network transactions seen in a data network traffic stream. Argus provides a common data format for reporting flow metrics such as connectivity, capacity, demand, loss, delay, and jitter on a per transaction basis. The record format that Argus uses is flexible and extensible, supporting generic flow identifiers and metrics, as well as application/protocol

MBSA

MBSA : Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Built on the Windows Update Agent and Microsoft Update infrastructure, MBSA ensures consistency with other Microsoft management products including Microsoft Update (MU), Windows Server Update Services (WSUS), Systems Management Server (SMS) and Microsoft Operations Manager (MOM). Apparently MBSA on average scans over 3 million computers each week.

N-Stealth

N-Stealth : Web server scanner
N-Stealth is a commercial web server security scanner. It is generally updated more frequently than free web scanners such as Whisker/libwhisker and Nikto, but do take their web site with a grain of salt. The claims of “30,000 vulnerabilities and exploits” and “Dozens of vulnerability checks are added every day” are highly questionable. Also note that essentially all general VA tools such as Nessus, ISS Internet Scanner, Retina, SAINT, and Sara include web scanning components. They may not all be as up-to-date or flexible though. N-Stealth is Windows only and no source code is provided.

Watchfire AppScan

Watchfire AppScan : Commercial Web Vulnerability Scanner
AppScan provides security testing throughout the application development lifecycle, easing unit testing and security assurance early in the development phase. Appscan scans for many common vulnerabilities, such as cross site scripting, HTTP response splitting, parameter tampering, hidden field manipulation, backdoors/debug options, buffer overflows and more.

TrueCrypt

TrueCrypt : Open-Source Disk Encryption Software for Windows and Linux
TrueCrypt is an excellent open source disk encryption system. Users can encrypt entire filesystems, which are then on-the-fly encrypted/decrypted as needed without user intervention beyond entering their passphrase intially. A clever hidden volume feature allows you to hide a 2nd layer of particularly sensitive content with plausible deniability about whether it exists. Then if you are forced to give up your passphrase, you give them the first-level secret. Even with that, attackers cannot prove that a second level key even exists.