Posts

Showing posts from March, 2017

VMware Threat Exploit Found During Pwn2Own Event

The threat was first discovered on Workstation during Pwn2Own hacking event.  With further investigation, it is now found possible on ESXi 6.0U1 and above. Do check out the VMware Security Advisories here .  The patches are all available currently. Read about the how this was found during Pwn2Own event on the blog post here .

VMware Certification Exam Price Increase

If you have been following the exam news that has been release, starting from 1st April, the price of the exams for all level starting from Foundation, Associate, Professional, Advanced Professional and Expert have all increased.  You can read up the official post here . I will skip the Foundation and Associate exam since these are just entry level exams. Looking at Professional (VCP), Advanced Professional (VCAP) and Expert (VCDX), each has increased from $225 to $250, $400 to $450 and $300 + $900 to $995 + $3,000 respectively.  If you look at it its a gradually increase in tier except for the Expert level which one would think twice attempting with an increase over 130%.  With this increased, this exam will be a company sponsored exam moving forward and not meant for one to self sponsor himself at close to $5,000.  Though these prices are affecting the developed countries. Not sure why the move but it seems like VMware it controlling the number of people attaining VCDX and keep

VMware vSphere 6.5 Security Questions

Been to many customers and have many questions on how our vSphere 6.5 Security enhancement does and how different is it from others. So to clear some of the questions and also the articles that are available below will provide more details. A good place to start is read up this VMware blog post by Mike Foley.  This post detail the new UEFI for ESXi and for VMs and on VM Encryption.  Let us break down some questions that are asked often or unclear: 1) Does all OSes support UEFI? Modern versions of OS like Microsoft Windows 2012, RedHat 5 and Suse Linux Enterprise 11 SP2 and above .  Unless we are talking about older OS that are dependent on BIOS. 2) Who provide the UEFI firmware? The hardware server vendors that allows OS or hypervisor to be installed on to be boot from.  Hypervisor or virtualization software vendor that allows running of virtual machine to boot from. 3) How can we prevent BIOs, hypervisor and OS been compromise? The use of UEFI is to ensure digital signat