Protecting a Laptop from Simple and Sophisticated Attacks

Some people might say that many of these precautions are over the top and paranoid. I don’t consider myself an “elite hacker”, but I know that I could pull off most of the attacks that I’ve discussed above without much trouble. Cold boot and Evil maid are practical, easy to pull off, attacks. Why wouldn’t I defend against them?

via Protecting a Laptop from Simple and Sophisticated Attacks | Mike Cardwell, Online.

Scientists Claim New Map of Spiralling Light to Boost Fibre Optic Broadband Speed

Scientists working at the Institute of Ultrafast Spectroscopy and Lasers (IUSL), which is part of the City College of New York (CUNY), have discovered a new way of mapping spiralling light that could allow telecommunications operators the ability to harness “untapped data channels” within fibre optic broadband ISP cables.

Scientists Claim New Map of Spiralling Light to Boost Fibre Optic Broadband Speed − ISPreview UK News.

Device eth0 does not seem to be present error after cloning a linux machine

After some searching, i found out that there is a device manager for the Linux kernel named “udev” which remembers the settings from the NIC of the virtual machine before it was cloned. To fix the issue simply delete the the following file and it will be regenerated properly on reboot.

/etc/udev/rules.d/70-persistent-net.rules

via Random IT Stuff » ‘Device eth0 does not seem to be present’ error after cloning a linux machine.

This worked for me with a VirtualBox clone that was giving me problems.  Google is simply an amazing resource!  And kudos to the linked site for coming up first with a no nonsense answer.

Data Center Fabric Architectures

This article describes five classes of fabric architectures based on how they use management, control and data (forwarding) plane. Throughout the article we’ll use the generic term switch to describe a forwarding device that can forward either Ethernet frames (layer 2 switch) or IP datagrams (layer 3 switch).

via Data Center Fabric Architectures – Internetworking Expert Hints.

How to Convert a KVM to a VDI

KVM is a bare metal virtualization software use to run several operating system on the same hardware. VDI is the file type used in VirtualBox, Sun Microsystems’ desktop virtualization product. A desktop virtualization product allows you to run an operating system in a window independent from your main operating system. VirtualBox and KVM use different file formats to store the virtual machine and transferring a KVM virtual machine to VirtualBox requires an indirect approach.

Via How to Convert a KVM to a VDI | eHow.com.

How To Mount a Linux LVM Partition in a XenServer Host

This article describes how to mount a Linux Logical Volume Manager (LVM) partition located inside a virtual disk (VDI) in a XenServer Host.

via CTX117791 – How To Mount a Linux LVM Partition in a XenServer Host – Citrix Knowledge Center.

Finally!!!!

I have never been a fan of logical volume management which seems to be a Red Hat thing.  It completely complicates matters when mounting drives.  XenServer, which is based off centos (I think) is littered with LVMs as the result of performing the above procedure will attest.  I hope Citrix had a good reason for doing this.

Welcome to xen.org, home of the Xen® hypervisor

The Xen® hypervisor, the powerful open source industry standard for virtualization, offers a powerful, efficient, and secure feature set for virtualization of x86, x86_64, IA64, ARM, and other CPU architectures. It supports a wide range of guest operating systems including Windows®, Linux®, Solaris®, and various versions of the BSD operating systems

via Welcome to xen.org, home of the Xen® hypervisor, the powerful open source industry standard for virtualization..

Virtual Machine Manager

The “Virtual Machine Manager” application (virt-manager for short package name) is a desktop user interface for managing virtual machines. It presents a summary view of running domains, their live performance & resource utilization statistics. The detailed view graphs performance & utilization over time. Wizards enable the creation of new domains, and configuration & adjustment of a domain’s resource allocation & virtual hardware. An embedded VNC client viewer presents a full graphical console to the guest domain

Via Virtual Machine Manager.