·
Announcement: VMware Response to Speculative Execution security issues CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 (aka Spectre and Meltdown)
On January 3, 2018, it became public that CPU data cache timing can be abused by software to efficiently leak information out of mis-speculated CPU execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.
Three variants have been recently discovered by Google Project Zero and other security researchers; these can affect many modern processors, including certain processors by Intel, AMD and ARM.
For more information see KB52245
Latest posts
-
What is Virtualization-Based Security for Windows Guest Operating Systems
Virtualization-Based Security (VBS) for Windows guest operating systems is a security feature that uses hardware virtualization to create and isolate a secure region of memory from the normal operating system.…
·
-
Export DRS (Distributed Resource Scheduler) rules from a vCenter server using PowerCLI-How to?
To export DRS (Distributed Resource Scheduler) rules from a vCenter server using PowerCLI, you can use the following script. This script will connect to your vCenter server, retrieve the DRS…
·
-
vSphere virtual disk transport modes (VADP) for VM backup
Virtual Disk Transport Methods (VADP) offers interfaces for integration of storage-aware applications, including backup, with efficient access to storage clusters. Backup vendors may use different transport methods, which provide efficient…
·
Get updates
Spam-free subscription, we guarantee. This is just a friendly ping when new content is out.

Leave a comment