Tag: VM

  • Opengroupware install on Ubuntu 6.06 Dapper Drake

    One recent task was install opengroupware on a dapper drake 6.06 install in a virtual machine. I followed the instructions found here and ran into a slight problem. The default install from Ubuntu does not have apache in the enabled repositories. (Apache2)… following the intsructions given I first added opengroupware’s (debian sarge) repository (more…)

  • Software raid fun…. device detection order

    Anyone that’s setup software raid on a system with multiple storage adapters has probably run into this kind of issue, but I thought I’d mention it. Last weekend I built a machine to replace my server (the server was to be captured into a VM). The main system was going to be installed onto dual IDE drives, the VM partition and other data on dual 400GB SATA drives. Well, install went well after getting past some of the irq issues I mentioned in a previous writeup. md0 was /boot and so on…. (md0 residing on the dual ide drives.) When the system went to reboot though it didn’t get very far. It complained of not finding a boot image (I think that was the message – didn’t make a note.)

    (more…)

  • VMware guest unable to access USB devices

    I ran into this some time back and found the solution a few months later and was reminded today to document it here…. The situation is this… Linux host for VMWare server, the guest machine has usb support and in vmware, you can go to VM, Removable devices and in spite of the fact you have usb devices on the system, nothing is listed as available to use in the VM. Well, it seems this is not an isolated problem. First you need to be sure the usb device is not in use by the host system. But, there’s something else that you need. VMWare uses usbfs to keep track of usb devices and a few distributions ( Ubuntu Linux 6.06 SUSE Linux 10.1, SUSE Enterprise Linux Server 10, Mandriva Linux 2006, SLES9 SP3 64 bit) don’t enable it by default. ( mount -t usbfs none /proc/bus/usb ) should do the trick (as root) or you could set it in fstab usbfs /proc/bus/usb usbfs auto 0 0 (and now I’m thinking I may have already posted this once…. )

  • But it’s brand new, how could it have so many updates?

    This morning I was doing a fresh install of Windows XP SP2 into a Virtual Machine. So far, things are fine I went through windowsupdate and found 3 updates the first time, then rebooted and hit windowsupdate again to see 55 updates available. A lot of times when I set up a new pc for somebody they wonder why I want to check windows update multiple times. They’ll usually say something along the lines “but it’s brand new there shouldn’t be any updates.” Well, this install was from a SP2 disk and there have been a large number of updates since that was released. Many manufacturers use fairly sophisticated techniques to roll out the default install images they use, but it’s still very possible that your machine will have several updates waiting for it when you get it.

    (more…)

  • Windows Vista Beta notes…

    What follows are some notes that I’ve taken on the Vista beta that I installed into a VM. I’ve got a lot of toying around yet to do with it (and at least one Internet Explorer bug I want to mention.) But… I’ll go ahead and post this. [warning – rambling and long text…]

    A few days back I undertook an effort of self torture. After finally getting the Vista Beta 2 downloaded and having Vmware server up and running I thought I’d give a go at installing and see what things looked like. I did NO pre-googling for tips and so this is a pure “discover as you go” process.

    (more…)

  • WMF exploit situation summary…

    Since there’s been quite a bit of flux the last couple of days I thought I’d try to “reset” the situation and give a general overview of where we stand now with regards to the recent WMF zero-day exploit.

    1st there is a vulnerability in the way Windows renders WMF (Windows MetaFile) image files that makes possible an exploitable buffer overflow allowing remote execution. There are at least two exploits for this vulnerability and it is not necessary for the wmf to have a name ending in .wmf (it could masquerade as jpg for instance.) The specially crafted WMF could be in a web page, email (html email), or other document. There are many possible vectors of entry for this.

    (more…)