Skip to content

The Cyber Security, Compliance & Cloud

Cyber Security | Digital Transformation | Cloud Computing

  • Home
  • About Me
  • Contact Me:
The Cyber Security, Compliance & Cloud

Author: Baz

Installation of ESXI Server 5.5 and its components (vCenter SSO, vSphere Web Client, vCenter Inventory Service and vCenter Server Part5-6

December 31, 2014 Baz tech, VMWare Leave a comment

Part5. vSphere Web Client Installation and Configuration vmWare introduces vSphere webclient in version 5.0 with limited features. In version 5.1

Continue reading

Installation of ESXI Server 5.5 and its components (vCenter SSO, vSphere Web Client, vCenter Inventory Service and vCenter Server Part 4

December 31, 2014 Baz tech, VMWare Leave a comment

Part4. VMware vCenter Server Installation VMware vCenter Server is the management system for your VMware vSphere private cloud. It’s used to

Continue reading

Installation of ESXI Server 5.5 and its components (vCenter SSO, vSphere Web Client, vCenter Inventory Service and vCenter Server Part1-3

December 31, 2014 Baz tech, VMWare Leave a comment

  Part1.  Installation of ESXI Server 5.5 This is the baremetal hypervisor that will run our VMs and may be

Continue reading

Cloning a virtual machine disk via ESXi host

December 24, 2014 Baz VMWare Leave a comment

Cloning a virtual machine disk without delta files or snapshots To clone a virtual machine disk using the ESX/ESXi host

Continue reading

Unable to delete the virtual machine snapshot due to locked files

December 24, 2014 Baz VMWare Leave a comment

To work around this issue: Power down the backup server, or remove the .vmdk from the backup virtual appliance or

Continue reading

Virtual disk format for VM’s virtual disk

December 24, 2014 Baz VMWare Leave a comment

One of the first decisions in SAN storage provisioning is making the LUN decision: determining what RAID level for the

Continue reading

Upgrade vCenter 5.0 to 5.1

December 24, 2014 Baz VMWare Leave a comment

There are a lot of changes introduced with vCenter 5.1, including the somewhat negatively infamous SSO service. This post contains

Continue reading

Memory limits for VMware products

December 24, 2014 Baz tech, tips, VMWare Leave a comment

Memory limits for VMware products ESXi/ESX ESXi/ESX virtual machines Hardware version Memory limit 5.1 9 32-bit and 64-bit virtual machines:

Continue reading

The top 10 VMware tutorials, issues, tools and resources of 2014

December 24, 2014 Baz VMWare Leave a comment

   The top 10 VMware tutorials and tips of 2014   Top 20 ESXi 5.x issues Top 10 VMware support

Continue reading

Reclaim VMFS deleted blocks on thin-provisioned LUNs

December 16, 2014 Baz Netapp, Storage, VMWare Leave a comment

If you use thin provisioned VMFS datastores you will maybe face the problem that unused space on the storage is

Continue reading

Posts pagination

«Previous Posts 1 … 4 5 6 7 8 … 14 Next Posts»

Categories

ADADFSAmazonAppleAppsArticlesAWSAzureAzure PolicyAzure PurviewbackupCertificatesCiscoCloudComplianceCyberSecuritydamwaredataData GovernanceDigital ForensicexcelExchangeflashflexGPOHadoopHPInformation ProtectionIntelligent securityJSON

Recent Posts

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types

Top Cyber Security Posts

Datbricks vs SQL Server

April 14, 2023

Designing SQL Database in Azure

February 21, 2023

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022

FIDO – FIDO2: an open authentication standard

June 20, 2022

Build next-generation security operations with Azure Sentinel

December 16, 2020

How to Apply Microsoft Information Protection’s (MIP) sensitivity labels to Azure assets in Azure Purview

December 4, 2020

The Cyber Security, Compliance & Cloud

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types
  • FIDO – FIDO2: an open authentication standard
WordPress Theme: Tortuga by ThemeZee.