SSH Singapore Premium Gratis 1 2 3 4 5 November 2014
Server SSH ini saya memilih di Singapore karena Singapore adalah server terdekat dengan Indonesia tentunya. Gunakan Port
443 atau 143 atau 22
Langsung saja, ini dia SSH Singapore Premium Gratis 1 2 3 4 5 November 2014.
Sekian SSH Singapore Premium Gratis 1 2 3 4 5 November 2014 pertama dari saya ini, semoga berkah :D
Hackeando Android: Ingeniería Social y una linda camiseta
- Número de participantes: 20 personas aprox.
- Edad de los participantes: Entre 20 y 30 años
- Grado académico: Estudiantes y egresados de ingeniería de sistemas y computación
- Lugar: Tacna – Perú (Universidad Nacional Jorge Basadre)
- Nivel de seguridad informática: media (o quizás baja después del experimento)
- Impulso para ganar: una camiseta del Blog de Omar
- Ingeniería Social El truco para el éxito de este ataque consiste en ganar la confianza de la(s) otra(s) persona(s) para que se instalen la aplicación con toda la confianza del mundo, alguna de las ideas más utilizadas son las siguientes:
- Google Play: El truco de los atacantes es engañarte mostrándote aplicaciones milagrosas en el store de Google, hasta la fecha se han detectado muchas – muchísimas – aplicaciones maliciosas en Google Play y es que basta subir aplicaciones con permisos “READ_EXTERNAL_STORAGE” y eso es todo, aquí pueden ver claros ejemplo de los que les cuento:
* Aplicación maliciosa para hacer Dieta: [AQUÍ]
* La estafa de la linterna milagrosa en Android: [AQUÍ]
* 10 millones e aplicaciones maliciosas en Android: [AQUÍ]
Basta con buscar “WhatsApp” en GooglePlay para obtener varios cientos de resultados, cada aplicación relacionada a WhatsApp que se muestra realiza alguna “maravilla”, ¿ustedes creen que realmente hacen esas maravillas?
- Instalar aplicaciones de terceros: El engaño de los atacantes consiste en lograr convencerte que puedas instalar una aplicación que no se encuentra en Google Play por cualquier motivo, por ejemplo yo le pedí a las participantes de mi experimento que lo instalaran porque el que contestaba todas las preguntas correctamente se llevaba una camiseta del blog .
- “Me prestas tu celular”: Es muy común que te pidan prestado tu celular, no? ya saben….. sólo quiero ver tus fotos, quiero entrar a una página de Google o quizás quiero instalarte algo sin que te des cuenta. La instalación de un APK malicioso demora menos de 60 segundos, así que nunca presten su celular, jamás!!
- Instalando la Aplicación Una vez que hemos logrado ganar la confianza de nuestra víctima mediante alguna de las técnicas arriba descritas, tenemos que instalar la aplicación maliciosa. Aquí también tenemos algunas opciones para poder instalar la aplicación maliciosa, voy a colocar 02 ejemplos:
* ANDRORAT: Una RAT (Remote Administration Tool) es una herramienta que nos permite administrar remotamente un dispositivo y en este caso específico un celular con el sistema operativo Android, de hecho, ANDRORAT es un proyecto escrito hace 02 años, por el 2012 para ser más exacto y que contiene algunas librerías que no están actualizadas para las últimas versiones del sistema operativo. La mejor manera de instalar ANDRORAT es “bind-eandola”, es decir, ocultándola dentro de otra aplicación y que cuente con un funcionamiento básico.
Para nuestro experimento lo escondimos en una aplicación que se llama “Trivia El Palomo” que contenía un pequeño cuestionario sobre preguntas de seguridad, el que respondía correctamente se hacía acreedor a una camiseta del blog.
Enlaces de ayuda:
- AndroRat: El proyecto lo pueden encontrar [AQUÍ]
- Versión “Trivia El Palomo”: La versión de AndroRat que hemos utilizado tiene una trivia y se han reemplazado algunas referencias para eliminar errores que aparecían en las nuevas versiones de Android (sobre los errores pueden leer aquí: LINK-1 y LINK-2). Les dejo el código para que lo puedan compilar por ustedes mismos si es que así lo requieren. Los créditos de esta versión se los lleva mi amigo Billy Grados, le pueden escribir a: billy.grados@gmail.com. Esta versión la pueden encontrar [AQUÍ]. (Cuidado que algunos Antivirus los reconocen como virus)
* METASPLOIT: Todos ya conocen Metasploit, es seguramente la herramienta de hacking rápido más usado en la actualidad y no podía estar ajeno al hacking de Android. Lo que hace básicamente es generar un APK malicioso que ejecuta una sesión Meterpreter en el celular, es bastante sencillo el generarla.
- Extrayendo la información * ANDRORAT: En el caso de haber logrado el acceso al celular mediante Androrat, digamos que tenemos 02 opciones para poder obtener acceso:
Opción I: Haber configurado una dirección IP pública en la aplicación Android instalada: Si hicieron esto es porque desean tener acceso al celular desde cualquier lugar, entonces necesitan un servidor con una dirección accesible desde Internet. Esto lo pueden hacer a través de una configuración en sus routers caseros (NO-IP + NAT) o lo pueden hacer si es que alquilan un servidor VPS (Virtual Private Server) por unos meses, de hecho está se pueden conseguir por precios que no pasan los US$ 8 dólares mensuales.
Opción II: Configurar una dirección IP no pública, es decir, que pueda ser utilizada en una red LAN, por ejemplo: 192.168.X.X, 172.16.XX. Si deciden colocar una dirección IP no ruteable tocará esperar a que el atacante y la víctima se encuentren en la misma red LAN. ¿Ya se les ocurren situaciones donde esto podría servir? Por ejemplo, en el caso de un(a) esposo(a) celoso(a), en el caso de una señora madre de familia preocupada por lo que sus pubertos hijos o hijas calenturientas hacen por internet, etc.; se requiere como base que el atacante y la víctima estén en la misma red LAN en algún momento del día (o cuando se conecten a la red wireless de la casa).
Para nuestro experimento, hemos utilizado un servidor Ubuntu VPS que se encuentra en Internet con una dirección IP pública. Aquí las imágenes donde se muestra:
- La conexión realizada entre el AndroRat y el dispositivo Android
- Acceso a los mensajes SMS recibidos y enviados en el celular
- Acceso a las imágenes recibidos a través de WhatsApp (en general acceso a todos los archivos del SDCARD)
- Acceso a las bases de datos CRYPT7 que contienen las conversaciones de WhatsApp
* METASPLOIT: A diferencia del AndroRat, en el caso de utilizar Metasploit necesitamos que la aplicación instalada sea abierta, es decir, no sólo que sea instalada sino que este en uso para establecer la conexión. La conexión se realiza según la imagen inferior y la sesión Meterpreter ya es bastante conocida, podríamos descargar los archivos que necesitemos como las imágenes y la base de datos de conversación de WhatsApp.
- Bonus Track
* Obtener los archivos “CRYPT7” que contienen las conversaciones cifradas de WhatsApp, estos archivos están en: /sdcard/whatsApp/Databases/
* Para descifrar los archivos “CRYPT7” utilizaremos la aplicación “WhatsApp-Viewer”, el proyecto lo pueden descargar de [AQUÍ]
Consideraciones Importantes:
- No se puede obtener el archivo “KEY” remotamente si es que el dispositivo no esta rooteado. No se puede y no insistan con esta pregunta. OJO: Sí se puede de manera local pero para nuestro caso que es hackear remotamente un Android no hay manera.
- El archivo “KEY” sólo puede ser obtenido en dispositivos Android 4.0 o versiones anteriores, esto ocurre porque extrañamente en estas versiones el archivo “KEY” tiene los permisos para poder ser descargados, en las nuevas versiones sólo tienen permisos de lectura y escritura para ROOT.
Finalmente…. ¿ Cómo evito que esto me pase?
- No instales aplicaciones “milagrosas” en tu celular, ni siquiera desde el GooglePlay
- No instales aplicaciones de un origen desconocido, es decir, aquellas que no estén en el GooglePlay
- ¿Tener un antivirus instalado en el celular ayuda? Sí ayuda pero no es la solución, por ejemplo, en los casos mostrados en este post el antivirus McAfee no ha reconocido la aplicación creada por MetaSploit como una aplicación maliciosa, el AndroRat si fue reconocido como aplicación maliciosa. En otro post escribiré como funcionan los antivirus en Android.
- Revisa los permisos aceptados al instalar aplicaciones en tu celular, olvídate del “Next, Next, Next” al estilo Windows.
- Finalmente, “nunca confíes en mi” cuando te diga que te instales una aplicación.
Fotoxx 14.11 released, Install in Linux Mint and Ubuntu Based Distro
Fotoxx 14.11 released, Install in Linux Mint and Ubuntu Based Distro
Fotoxx is an all-in-one complex image editor and collection manage open source graphical software. It provides users with powerful tools for manipulating image files made with a digital camera.- A world map and several larger-scale continental maps are provided in a separate package: fotoxx-maps. These maps show locations of photos having geotags. Clicking a map location shows a gallery of thumbnail images that can be selected in turn for viewing full size or editing. A user may add more maps, and these will work the same way.
- Gallery thumbnail popup: expanded speed and functionality for zooming thumbnails and comparing images side by side.
- Gallery scrolling is smoother and easier to control with the mouse: scrolls faster as mouse is dragged closer to top or bottom of window.
- Sync Gallery can now have a KB shortcut (default 'S' for new installs).
Features at a glance of Fotoxx 14.11
It can also create panorama images, allowing users to stitch multiple images together, as well as the usual crop, rotate, flip, resize, red-eye removal, sharpen fuzzy edges, reduce noise in low-light photos, stretch, and distort functionality.
Another interesting feature is the ability to use 24 bits per color in internal edit calculations. It removes color castes, reduces sharpen and blur, expands or flattens brightness distribution, fixes brightness uniformity issues, and removes dark spots on scanned slides.
Supports viewing of RAW camera images
Create photos with a greater focus depth
Bottom line
wget http://goo.gl/sQXaxO \ http://goo.gl/Tlinbysudo dpkg -i --force-depends *.deb
I hope that we make with article "Fotoxx 14.11 released, Install in Linux Mint and Ubuntu Based Distro" titles helpful to readerswget http://goo.gl/rZ2Zy1 \ http://goo.gl/Tlinbysudo dpkg -i --force-depends *.deb
GNOME 3.15.1 is a very interesting release
GNOME 3.15.1 is a very interesting release
GNOME 3 is an easy and elegant way to use your computer. It is designed to put you in control and bring freedom to everybody. GNOME 3 is developed by the GNOME community, a diverse, international group of contributors that is supported by an independent, non-profit foundation.As usual, the first few versions in a new GNOME iteration are full of fun stuff and new features. Developers add all sorts of functionalities and the same has happened now, with 3.15.1. For example, the GNOME Shell package now has summarized queued up notifications and uses GResources for theme loading, GNOME Online Accounts features support for locked accounts, and GTK+ has initial support for the Mir display server that's being built by Canonical.
"This release is a snapshot of early development code. Although it is buildable and usable, it is primarily intended for testing and hacking purposes. GNOME uses odd minor version numbers to indicate development status," says Matthias Clasen in the official announcement.
GNOME 3.15.4 updates the following core apps: adwaita-icon-theme, at-spi2-core, atk, glib, GNOME Calculator, GNOME Desktop, GNOME Online Accounts, GNOME Shell, GNOME System Monitor, GTK+, gtksourceview, gvfs, libmediaart, Mutter, and Tracker.
Some of the integrated applications have also been updated, such as bijiben, Cheese, File Roller, Four in a Row, GNOME Boxes, GNOME Documents, GNOME Logs, GNOME Mines, GNOME Sudoku, Hotori, Iagnom, and swell-foop.
The release notes that describe the changes between 3.14.1 and 3.15.1
are available. Go read them to learn what's new in this release:
core - http://download.gnome.org/core/3.15/3.15.1/NEWS
apps - http://download.gnome.org/apps/3.15/3.15.1/NEWS
The GNOME 3.15.1 release is available here:
core sources - http://download.gnome.org/core/3.15/3.15.1
apps sources - http://download.gnome.org/apps/3.15/3.15.1
Yandex Browser "Russia" Beta Released, Available for Linux Mint, Ubuntu and Redhat Based Distro
Yandex Browser "Russia" Beta Released, Available for Linux Mint, Ubuntu and Redhat Based Distro
But not quite as big a share as it once did. The reason? Google Chrome, which is Russia’s most popular web browser and defaults (naturally) to Google’s own search engine rather than Yandex’s.
Their solution is canny: take the open-source foundations that make Chrome so popular, add a big ol’ smattering of Yandex flavour on top, and release.
And it’s paying off.
The Chromium-based ‘Yandex Browser‘ has risen to snatch a healthy 6% of the overall browser market in Russia in the 2 years since its debut, and has since expanded to offer builds for iOS and Android.
Now, with the first beta release of their flagship browser for Linux, that figure could be about to rise even faster.
Download Yandex Browser Beta (64 bit):
LibreOffice 4.3.3 Released, Install in Linux Mint and Ubuntu Based Distro
LibreOffice 4.3.3 Released, Install in Linux Mint and Ubuntu Based Distro
Other Notable Change :
- Local image file URLs can now be embedded in documents
- Support for pasting text into input fields
- Crash fix when exporting file to PDF with footnotes in tables
- Crash fix when adding new macro library
LibreOffice 4.3 is available for the following operating systems/architectures:
- Linux x64 (deb)
- Linux x64 (rpm)
- Linux x86 (deb)
- Linux x86 (rpm)
- Mac OS X (Intel)
- Mac OS X (x86_64 10.8 or newer required)
- Windows
I hope that we make with article "LibreOffice 4.3.3 Released, Install in Linux Mint and Ubuntu Based Distro" titles helpful to readers
IBM Security Bulletin: Vulnerability in SSLv3 affects IBM Rational Connector for SAP Solution Manager (CVE-2014-3566)
from IBM Product Security Incident Response Team http://ibm.co/1tIlFMX
Case Study: Thomas-Krenn AG – VMware Horizon View überzeugt Mitarbeiter und Kunden
„Die Einführung von VMware hat bei unseren Mitarbeitern zur Performance-Steigerung …
Read More
from VMware Blogs http://bit.ly/1q9fjBj
IBM Security Bulletin: Vulnerability in SSLv3 affects WebSphere Partner Gateway Express (CVE-2014-3566)
from IBM Product Security Incident Response Team http://ibm.co/108ns2i
Understanding Organizational Maturity
Wayne Greene
from VMware Blogs http://bit.ly/1q9fhtg
IBM Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors (CVE-2014-3513, CVE-2014-3567)
from IBM Product Security Incident Response Team http://ibm.co/1tIlG3y
High Performance Computing (HPC) Update
InfiniBand Performance
This spring we installed a four-node InfiniBand HPC cluster in our lab in Cambridge, MA. The system includes four HP DL380p Gen8 servers, each with 128 GB memory and two Intel 3.0GHz E5-2667 eight-core processors and Mellanox ConnectX3 cards that support both FDR (56 Gb/s) InfiniBand and 40 Gb/s RoCE. The nodes are connected with a Mellanox MSX6012F-1BFS 12-port switch.
Na Zhang, PhD student at Stony Brook University, did an internship with us this summer. She accomplished a prodigious amount of performance tuning and benchmarking, looking at a range of benchmarks and full applications. We have lots of performance data to share, including IB, RoCE, and SR-IOV results over a range of configurations.
FDR IB latencies: native, ESX 5.5u1, ESX prototype
In addition to testing on ESX 5.5u1, we have been working closely with our R&D teams and evaluating performance on experimental builds of ESX. The graphs above show InfiniBand latencies using VM Direct Path I/O using ESX 5.5u1 and an engineering build of ESX. As you can see, the 15-20% latency overhead for very small messages measured in ESX 5.5u1 has been eliminated in the engineering build — this is an important advance for VMware’s HPC efforts!
Na continues to work with us part time during this school year and will rejoin us for another internship next summer. We expect to continue to publish a wide variety of performance results over the coming months. We are also in the process of doubling the size of our cluster, and so will be able to test at higher scale as well.
Single Root IO Virtualization (SR-IOV)
In addition to testing InfiniBand and RoCE with VM Direct Path I/O (passthrough) we have been working closely with our partner Mellanox to evaluate anearly version of InfiniBand SR-IOV support for ESX 5.5. Unlike passthrough mode, which makes an entire device directly visible within a virtual machine, SR-IOV (Single Root I/O Virtualization) allows single hardware devices to appear as multiple, virtual devices — each of which can be shared with a different VM, as illustrated in the diagram below. The PF (physical function) driver is an early version provided to us by Mellanox and the VF (virtual function) driver is included in the latest releases of the Mellanox OFED distribution.
SR-IOV allows sharing of a single device among multiple VMs
One of the primary HPC use-cases for SR-IOV is to allow multiple VMs on a host to access high-performance cluster file systems like Lustre and GPFS by sharing the single, physical InfiniBand connection between the host and storage system. We will be demonstrating this capability in the EMC booth at SC’14 in New Orleans. Stop by and say hello.
Application Performance
Beyond micro-benchmarks and several well-known higher level benchmarks (HPCC, LINPACK, NPB), we have tested a few full applications used in Life Sciences and elsewhere. In particular, we’ve evaluated NAMD, LAMMPS, and NWCHEM, and seen generally good results. As a teaser, here are a some NAMD test results that illustrate how well this molecular dynamics code runs on our test cluster:
NAMD performance using 1 to 16 MPI processes per VM and one VM per host on ESX 5.5u1
Intel Xeon Phi
Using a test system supplied by Intel, we’ve run Intel Xeon Phi performance tests with an engineering build of ESX and VM Direct Path I/O. We’ve seen almost identical performance relative to baremetal, as seen in the graph below which shows virtual and baremetal performance using two different Intel programming models (pragma and native). While we will cover Xeon Phi in more detail in a subsequent post, it should be noted that we are using an engineering build of ESX because Xeon Phi is not usable with the shipping versions of ESX 5.5 due to PCI limitations. So, as they say, don’t try this test at home (yet).
Double and single precision GEMM results using Intel Xeon Phi in passthrough mode with a prototype ESX build. Virtual and baremetal performance is close to identical for both native and program programming models
HPC People
I’m very pleased to announce that Andrew Nelson joined our HPC effort recently. Andy has broad and deep expertise with VMware’s products from his previous role as an SE in our field organization. For the past four years he has worked on initiatives related to distributed systems, networking, security, compliance, and HPC. Andy is now focused on prototyping the ability to self-provision virtual HPC clusters within a private cloud environment, much the way Big Data Extensions (BDE) and Serengeti now support provisioning of Hadoop clusters. Andy will join me in blogging about HPC, so expect to learn a lot more about this project and other HPC initiatives from him.
Matt Herreras, who in his day job is a Senior Systems Engineering Manager, is another key member of the VMware HPC team. Matt plays a critical role in bringing our field organization and Office of the CTO together to allow us to team effectively to address the rapidly growing interest we are seeing in HPC from our customers. Matt pioneered the ideas of Scientific Agility and Science as a Service at VMware and has been invaluable in helping to move our overall HPC effort forward.
Bhavesh Davda, my long-time collaborator and colleague in the Office of the CTO, leads our Telco effort and also continues to lend his technical expertise to the HPC program in a number of important areas– most notably RDMA, InfiniBand, RoCE, low latency, and jitter reduction. His deep platform experience and mentoring have been and continue to be crucial to the success of our HPC effort.
Conferences
Matt and I spoke at both VMworld USA and VMworld Europe this year, giving a talk titled How to Engage with your Engineering, Science, and Research Groups about Virtualization and Cloud Computing. As the title suggests, the presentation was aimed at helping our primary constituency — IT management and staff — talk with their colleagues who are responsible for running HPC workloads within their organization about the benefits of virtualization and cloud computing for those environments. For those with access to VMworld content, this link should take you directly to the audio recording of our presentation.
This year Andy, Matt, and I will all be at SC’14 in New Orleans. We will have a demo station in the EMC booth where we will be showing a prototype of our approach to self-provisioning of virtual HPC clusters in a vRA private cloud as well as demonstrating use of SR-IOV to connect multiple VMs to a remote file system via InfiniBand. If you will be attending SC and want to meet, please stop by the booth or send me a note at simons at vmware.com.
from VMware Blogs http://bit.ly/1q9fjRG
AirWatch wins NetworkWorld Asia Readers’ Choice Award
Lanier Norville
from VMware Blogs http://bit.ly/1q9fj4a
Understanding Organizational Maturity
AirWatch wins NetworkWorld Asia Readers’ Choice Award
High Performance Computing (HPC) Update
InfiniBand Performance
This spring we installed a four-node InfiniBand HPC cluster in our lab in Cambridge, MA. The system includes four HP DL380p Gen8 servers, each with 128 GB memory and two Intel 3.0GHz E5-2667 eight-core processors and Mellanox ConnectX3 cards that support both FDR (56 Gb/s) InfiniBand and 40 Gb/s RoCE. The nodes are connected with a Mellanox MSX6012F-1BFS 12-port switch.
Na Zhang, PhD student at Stony Brook University, did an internship with us this summer. She accomplished a prodigious amount of performance tuning and benchmarking, looking at a range of benchmarks and full applications. We have lots of performance data to share, including IB, RoCE, and SR-IOV results over a range of configurations.
In addition to testing on ESX 5.5u1, we have been working closely with our R&D teams and evaluating performance on experimental builds of ESX. The graphs above show InfiniBand latencies using VM Direct Path I/O using ESX 5.5u1 and an engineering build of ESX. As you can see, the 15-20% latency overhead for very small messages measured in ESX 5.5u1 has been eliminated in the engineering build — this is an important advance for VMware’s HPC efforts!
Na continues to work with us part time during this school year and will rejoin us for another internship next summer. We expect to continue to publish a wide variety of performance results over the coming months. We are also in the process of doubling the size of our cluster, and so will be able to test at higher scale as well.
Single Root IO Virtualization (SR-IOV)
In addition to testing InfiniBand and RoCE with VM Direct Path I/O (passthrough) we have been working closely with our partner Mellanox to evaluate anearly version of InfiniBand SR-IOV support for ESX 5.5. Unlike passthrough mode, which makes an entire device directly visible within a virtual machine, SR-IOV (Single Root I/O Virtualization) allows single hardware devices to appear as multiple, virtual devices — each of which can be shared with a different VM, as illustrated in the diagram below. The PF (physical function) driver is an early version provided to us by Mellanox and the VF (virtual function) driver is included in the latest releases of the Mellanox OFED distribution.
One of the primary HPC use-cases for SR-IOV is to allow multiple VMs on a host to access high-performance cluster file systems like Lustre and GPFS by sharing the single, physical InfiniBand connection between the host and storage system. We will be demonstrating this capability in the EMC booth at SC’14 in New Orleans. Stop by and say hello.
Application Performance
Beyond micro-benchmarks and several well-known higher level benchmarks (HPCC, LINPACK, NPB), we have tested a few full applications used in Life Sciences and elsewhere. In particular, we’ve evaluated NAMD, LAMMPS, and NWCHEM, and seen generally good results. As a teaser, here are a some NAMD test results that illustrate how well this molecular dynamics code runs on our test cluster:
Intel Xeon Phi
Using a test system supplied by Intel, we’ve run Intel Xeon Phi performance tests with an engineering build of ESX and VM Direct Path I/O. We’ve seen almost identical performance relative to baremetal, as seen in the graph below which shows virtual and baremetal performance using two different Intel programming models (pragma and native). While we will cover Xeon Phi in more detail in a subsequent post, it should be noted that we are using an engineering build of ESX because Xeon Phi is not usable with the shipping versions of ESX 5.5 due to PCI limitations. So, as they say, don’t try this test at home (yet).
HPC People
I’m very pleased to announce that Andrew Nelson joined our HPC effort recently. Andy has broad and deep expertise with VMware’s products from his previous role as an SE in our field organization. For the past four years he has worked on initiatives related to distributed systems, networking, security, compliance, and HPC. Andy is now focused on prototyping the ability to self-provision virtual HPC clusters within a private cloud environment, much the way Big Data Extensions (BDE) and Serengeti now support provisioning of Hadoop clusters. Andy will join me in blogging about HPC, so expect to learn a lot more about this project and other HPC initiatives from him.
Matt Herreras, who in his day job is a Senior Systems Engineering Manager, is another key member of the VMware HPC team. Matt plays a critical role in bringing our field organization and Office of the CTO together to allow us to team effectively to address the rapidly growing interest we are seeing in HPC from our customers. Matt pioneered the ideas of Scientific Agility and Science as a Service at VMware and has been invaluable in helping to move our overall HPC effort forward.
Bhavesh Davda, my long-time collaborator and colleague in the Office of the CTO, leads our Telco effort and also continues to lend his technical expertise to the HPC program in a number of important areas– most notably RDMA, InfiniBand, RoCE, low latency, and jitter reduction. His deep platform experience and mentoring have been and continue to be crucial to the success of our HPC effort.
Conferences
Matt and I spoke at both VMworld USA and VMworld Europe this year, giving a talk titled How to Engage with your Engineering, Science, and Research Groups about Virtualization and Cloud Computing. As the title suggests, the presentation was aimed at helping our primary constituency — IT management and staff — talk with their colleagues who are responsible for running HPC workloads within their organization about the benefits of virtualization and cloud computing for those environments. For those with access to VMworld content, this link should take you directly to the audio recording of our presentation.
This year Andy, Matt, and I will all be at SC’14 in New Orleans. We will have a demo station in the EMC booth where we will be showing a prototype of our approach to self-provisioning of virtual HPC clusters in a vRA private cloud as well as demonstrating use of SR-IOV to connect multiple VMs to a remote file system via InfiniBand. If you will be attending SC and want to meet, please stop by the booth or send me a note at simons at vmware.com.
via VMware Blogs http://bit.ly/1q9fjRG
Why Facebook Just Launched Its Own ‘Dark Web’ Site
Now the world's least anonymous website (Facebook) has just joined the Web's most anonymous network (Tor).
The post Why Facebook Just Launched Its Own ‘Dark Web’ Site appeared first on WIRED.
from WIRED » Threat Level http://wrd.cm/1rGMCLG
IBM Security Bulletin: Multiple vulnerabilities in cURL libcURL affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors (CVE-2014-3613 CVE-2014-3620)
from IBM Product Security Incident Response Team http://ibm.co/1tIlFfW
IBM Security Bulletin: Rational Test Control Panel component in Rational Test Workbench and Rational Test Virtualization Server affected by Apache Tomcat vulnerablity (CVE-2013-4444)
from IBM Product Security Incident Response Team http://ibm.co/1tIlFwj
IBM Security Bulletin: Vulnerability in SSLv3 affects IBM Tivoli Netcool System Service Monitors/Application Service Monitors (CVE-2014-3566)
from IBM Product Security Incident Response Team http://ibm.co/108nrLA
The New Concierge Services Program for Americas Partners is Here!
|
via EMC Feeds http://bit.ly/1wNiX7Y
Hybrid Cloud Launch: 60 Second Recap
|
via EMC Feeds http://bit.ly/1wNiYsk
The New Concierge Services Program for Americas Partners is Here!
|
via EMC Feeds http://bit.ly/1wNiX7Y