News

Singer George Michael Has Died at 53

It was with a careless whisper I learned of your passing. It was persond such as you who taught me to be myself and that love is truly love.  You truly gave us your heart.  Rest in Peace #georgemichael

❤💙💚💛💜

http://abcnews.go.com/Entertainment/singer-george-michael-died-53/story?id=44394863

Google ‘Android Things’ — An Operating System for the Internet of Things

“If you can build an app, you can build a device.”

Google announced a Developers Preview of “Android Things” — an Android-based operating system platform for smart devices and Internet of Things (IoT) products headed our way.  Best of all, its designed to make it easier for developers to build a smart appliance since they will be able to work with Android APIs and Google Services they’re already familiar with.

So if you want to jump right in, come join us.  Just following this link: https://developer.android.com/things/index.html

 

Announcement: New OneDrive Admin Center Preview

Over the past year, OneDrive has evolved at a rapid pace introducing new features for end users and IT, across sync, web, and mobile. As the number of users and usage continues to grow. 

We tge customers have asked for an easier way to administer their company OneDrive settings and policies.  We’ve got our questions answered.

Once deployed to your tenant, all tenant and SharePoint admins will have permissions to access the OneDrive admin center preview at https://admin.onedrive.com.

 

Key features by section include:

  1. Home: This is the dashboard for the admin center and will soon show recent Office 365 Message Center posts and usage reporting related to OneDrive for Business.
  2. Sharing: This section helps admins gain control over how and with whom your users are sharing information. This includes controlling the use of external sharing and anonymous links, as well as limiting which external domains users can share with.
  3. Sync: Admins can block syncing of specific file types and deny syncing to non-domain joined PCs.
  4. Storage: This section allows admins to easily set default storage limits and document retention durations.
  5. Device Access: This gives admins control over how and from where a user can access their files. This includes allow/deny access from personal devices or specific networks as well as rich Mobile Application Management Intune policies for iOS and Android.
  6. Compliance: Admins can find quick links to the Office 365 Security and Compliance Center for key scenarios like auditing, data loss prevention, retention,and eDiscovery

Source

Getting Started with Datacenter CLI – VMware vSphere Blog

http://blogs.vmware.com/vsphere/2016/12/getting-started-datacenter-cli.html

Virtualize Everything

The PolygraphTest

10 Tips To Help You Become A Better Leader

– Because Sharing is Caring –

When a business hits some turbulence, an executive’s instinct is sometimes to focus on greater efficiency and productivity by tightening control. But the truth is that giving up authority and giving employees independence can improve innovation and success, even during crises. With that in mind, we have put together a number of tips to help you or someone you know become a better leader in the coming months.

10 Tips To Help You Maximize Your Leadership Skills:

 

  1.  Build Better Relationships – Great leaders know the value of relationships.  They know who people are, what is important to them, and what motivates them.  Knowing this will help you understand their goals and how you can support them.  When you help people, they will care about you and your goals in return.

 

  1.  Get To Know People On A Personal Level – If you take the time to get to know people you like, they will no doubt come to like you, too.  Furthermore, it is always nice to ask people about their families and interests.  You will also find that, if people like you, they will be more open to helping you and taking the extra time to get things done.

 

  1.  Develop A Mentoring Program – Great leaders know that mentoring someone will not only help develop that person’s career, but also help leaders refine their skills.

 

  1.  Be Upbeat And Stay Positive – In the business world, it is easy to criticize what everyone does and to be negative, especially in this economy.  As a leader, you need to find ways to stay positive and find ways to do things better, faster and more effectively.  It is important to remember that people are not perfect, and while you do need to address poor performance, great leaders know the value of acknowledging when people are doing things correctly.  Doing so builds a positive work environment that helps make people feel appreciated.

 

  1.  Know Your Strengths – We each have strengths and weaknesses.  That being said, you will find that it is better to spend time working on your strengths rather than your weaknesses.  By doing this, you will find that you can rise to the expert level sooner than you would be by working on your weaknesses.  Bottom line: Know what you are good at and keep at it.

 

  1.  Surround Yourself With People Who Complement You – As I mentioned above, we all have strengths and weaknesses.  Great leaders know what their weaknesses are and find people who support their shortcomings.  Not because they need to cover their weaknesses, but because they know the benefit of having a strong team — and when the team wins, everyone wins.

 

  1.  Look At Your Career, Not So Much At The Company – Great leaders know that they are the ones who will create their own career paths; therefore, they will work on making it happen.  And once they become an expert in their selected careers, they will find that they can go almost anywhere they want to go.

 

  1.  Respect Your People – If you do not like to be around people, let alone lead people, then do not take a leadership position.  Conversely, if you do want to be in a leadership position, start building relationships with people by respecting what they do.  Additionally, it is important that a great leader never misses an opportunity to learn more about the people behind them.  Great leaders never skip an employee’s birthday gathering or a holiday party because they are too busy — they know that work will always be there.

 

  1.  Balance Your Work And Personal Life – Great leaders are often times driven people, but they know the key to success is to balance work and family.  Life is too short for you to live at your job.  One day, when work is winding down, you will think to yourself I wished I had done things differently.  Unfortunately, it will be too late to do so.  Great leaders set career boundaries and know when to spend more time with family and friends. Doing this will make stronger leaders.

 

  1.  Evolve Into Someone You Aspire To Become – Great leaders know that they are individuals and that, as an individual, they are not required to be like everyone else.  They also know that they can take the path less traveled, as the risk is sometimes greater than the reward.  To be a great leader, one must become a person of great interest who has great skills.

 

Executive Summary: When it comes time to lead people, great leaders know the power of information, information they gather from listening to people they respect.  They also know what to say, how to say it and when to say it so that during tough times things get done.

Installing vCenter Appliance 6.5

With the general availability (GA) release of vSphere 6.5 I decided to upgrade my home lab and learning environment to the latest and greatest of VMware’s product. Not only for learning, but for running the systems I use daily in my lab.

Preparation work:

  • Download and Install ESXi 6.5 to my new lab hardware – Configure ESXi 6.5
  • Download the VCSA 6.5 Installation media and start the install process – See below

I mounted the installation media (ISO) on my Windows notebook and started the installation by navigating to \vcsa-ui-installer\win32\ and starting the installer.exe application.

This will display the Center Server Appliance 6.5 Installer. Seeing how this install will be a new installation of vCenter I selected “Install”

Here you find a two step installation process. The first step will deploy a vCenter Server 6,5 appliance and the second step will be configuring this deployed appliance.

Accept the standard End User License Agreement (EULA) to move forward into the installation.

Next you select the type of installation you need for your environment needs. In my case I have chosen the embedded Platform Services Controller deployment.

Next, choose the ESXi host where you would like to have this vCenter appliance deployed and provide the root credentials of the host for authentication.

Then, provide a name for the vCenter appliance VM that is going to be deployed and set the root password for the appliance.

Based upon your environment size, select the sizing of the vCenter appliance. I went with Tiny as it fits the needs of my Lab environment. Note: It will configure the Virtual Appliance with 10GB of ram so be sure you can support this in yours.

Next, select the datastore where the vCenter appliance files need to reside.

Configure the networking of vCenter appliance. Please have a valid IP which can be resolved both forward / reverse prior to this to prevent any failures during installation.

Review and finish the deployment, and the progress for stage 1 begins. Upon completion, Continue to proceed to configure the appliance. This is stage 2.

The stage 2 wizard begins at this point. The first section is to configure Network Time Protocol (NTP) setting for the appliance and enable Shell access for the same.

Next configure an SSO domain name, the SSO password and the Site name for the appliance. Once the configuration wizard is completed you can login to the web client.

The following short video I made gives you an feel for the install process. Enjoy.

 

 

vSphere 6.5 release notes & download links

 

This weekend I had the fun of getting my hands and feet wet with installs of VMware’s ESXi 6.5 and vCenter 6.5. The links below should be useful to any of you looking to learn about the new release and download bits to install.

Release Notes:

Downloads:

Documentation:

Emoluments Clause

​Article I, Section 9, Clause 8: Emoluments Clause

Emoluments Clause. No Title of Nobility shall be granted by the United States: And no Person holding any Office of Profit or Trust under them, shall, without the Consent of the Congress, accept of any present, Emolument, Office, or Title, of any kind whatever, from any King, Prince, or foreign State.

Ref: https://www.archives.gov/founding-docs

Over 1 Million Google Accounts Hacked by ‘Gooligan’

As you know by now from the latest buzz. Over 1 Million #Google Accounts Hacked by ‘Gooligan’. Gooligan itself isn’t new, as its just a variant of  Ghost Push, a piece of Android malware

Researchers from security firm Check Point Software Technologies have found the existence of this malware in apps available in third-party marketplaces.

Once installed it then roots the phone to to gain system level access.  The rooted devices then download and install software that steals the authentication tokens that allow the phones to access the owner’s Google-related accounts without having to enter a password. The tokens work for a variety of Google properties, including Gmail, Google Photos, Google Docs, Google Play, Google Drive, and G Suite

In a recent blog post by the folks over at Check Point:  http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/

“The infection begins when a user downloads and installs a Gooligan-infected app on a vulnerable Android device. Our research team has found infected apps on third-party app stores, but they could also be downloaded by Android users directly by tapping malicious links in phishing attack messages. After an infected app is installed, it sends data about the device to the campaign’s Command and Control (C&C) server.

Gooligan then downloads a rootkit from the C&C server that takes advantage of multiple Android 4 and 5 exploits including the well-known VROOT (CVE-2013-6282) and Towelroot (CVE-2014-3153). These exploits still plague many devices today because security patches that fix them may not be available for some versions of Android, or the patches were never installed by the user. If rooting is successful, the attacker has full control of the device and can execute privileged commands remotely.

After achieving root access, Gooligan downloads a new, malicious module from the C&C server and installs it on the infected device. This module injects code into running Google Play or GMS (Google Mobile Services) to mimic user behavior so Gooligan can avoid detection, a technique first seen with the mobile malware HummingBad. The module allows Gooligan to:

  • Steal a user’s Google email account and authentication token information
  • Install apps from Google Play and rate them to raise their reputation
  • Install adware to generate revenue

Ad servers, which don’t know whether an app using its service is malicious or not, send Gooligan the names of the apps to download from Google Play. After an app is installed, the ad service pays the attacker. Then the malware leaves a positive review and a high rating on Google Play using content it receives from the C&C server.”

Android users who have downloaded apps from third-party markets can visit the Check Point blog post for a list of the apps known to contain Gooligan.

Also Check Point has released what is being called the Gooligan Checker web page to be used to check if you have been compromised by this latest threat.