Monthly Archives: December 2013
VMware Tools for ESXi
http://labs.vmware.com/flings/vmware-tools-for-nested-esxi
Finally, VMware tools are available for VMware ESXi 5.0 onwards. This is great for those running nested ESXi.
This solves one of the big problems regarding automatic guest shutdown requires VMware Tools since it did not exist for ESXi, lack of VMware tools turned this basic task into a very painful, multi-step process. But not anymore! This new VMware fling brings what many of us have been waiting for so long > VMware Tools for Nested ESXi (requires ESXi 5.0 or later).
This VIB package provides a VMware Tools service (vmtoolsd) for running inside a nested ESXi virtual machine. The following capabilities are exposed through VMware Tools:
- Provides guest OS information of the nested ESXi Hypervisor (eg. IP address, configured hostname, etc.).
- Allows the nested ESXi VM to be cleanly shut down or restarted when performing power operations with the vSphere Web/C# Client or vSphere APIs.
- Executes scripts that help automate ESXi guest OS operations when the guest’s power state changes.
- Supports the Guest Operations API (formally known as the VIX API).
Pay to recover your data – CryptoLocker
A new trojan called CryptoLocker is making the rounds which silently encrypts files on your computers, along with files on any connected network storage or USB devices, rendering them unreadable. Once the encryption process finishes, it tells users to pay a ransom, which so far has been $100, $300 or two bitcoins, currently worth about $2400.
Currently, there is no way to recover your data other then from an “offline” backup, if the backup was online or attached at the time of the encryption then more then likely the backup is now encrypted as well.