Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/festplat/public_html/blog/wp-content/plugins/statpress/statpress.php on line 1191

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/festplat/public_html/blog/wp-content/plugins/statpress/statpress.php on line 1191

Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/festplat/public_html/blog/wp-content/plugins/statpress/statpress.php on line 1194

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/festplat/public_html/blog/wp-content/plugins/statpress/statpress.php on line 1194

Warning: mysql_real_escape_string(): Access denied for user ''@'localhost' (using password: NO) in /home/festplat/public_html/blog/wp-content/plugins/statpress/statpress.php on line 1197

Warning: mysql_real_escape_string(): A link to the server could not be established in /home/festplat/public_html/blog/wp-content/plugins/statpress/statpress.php on line 1197
Patch « Tag « festplatte.ch


Berechtigungen beim verschieben von Files übernehmen

GPO, Security, Windows No Comments »

Werden unter Windows Files verschoben, werden die Berechtigungen bekanntlich nicht neu gesetzt im neuen Ordner, sondern bleiben bestehen. Dies hat natürlich seine Vor- und Nachteile.

Will man dies umgehen, dass Files automatisch die neuen Berechtigunen des neuen Ordners übernehmen sollen, kann dies mit einer kleine Anpassung in der Registry erfolgen. Dies muss auf sämtlichen Clients eingetragen werden, bei welchen dies gewünscht wird.

  1. Click Start, click Run, type regedit, and then press ENTER.
  2. Locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
  3. On the Edit menu, click Add Value, and then add the following registry value:

    Value name: MoveSecurityAttributes
    Data type: DWORD
    Value data: 0

  4. Exit Registry Editor.
  5. Make sure that the user account that is used to move the object has the Change Permissions permission set. If the permission is not set, grant the Change Permissions permission to the user account.

Um den Key über GPO verteilen zu können, kann dies mittels einem ADM File durchgeführt werden.

CLASS MACHINE
	CATEGORY "RegKeySettings"
		POLICY "Moving Files"
			EXPLAIN "Get parent rights when moving files - Enable = get rights from partent folder"
			KEYNAME "SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer"
			PART "MoveSecurityAttributes" NUMERIC
				VALUENAME "MoveSecurityAttributes"
				MIN 0
				MAX 1
				DEFAULT 0
			END PART 
		END POLICY

Link:
http://support.microsoft.com/kb/310316/en-us

Share


VMware ESX/ESXi 3.5 Update 4 released

ESX 3.5, VMware No Comments »

At the beginning of this month VMware released the Update 4 for its management tier vCenter.
Yesterday the company also pushed the big update for the hypervisor itself.

The new Update 4 (build 153875) is available for both ESX 3.5 and ESXi and includes:

  • support for Intel Xeon 5500 series CPUs (codename Nehalem)
  • support for Novell SUSE Enterprise Linux 11 (both Server and Desktop, both 32bit and 64bit),
  • Ubuntu 8.10 (both Server and Desktop, both 32bit and 64bit), Windows PE 2.0 as guest OSes
  • support for new SATA Controllers (from PMC, Intel, CERC and HP)
  • support for new NICs (from HP, NetXtreme and Intel, including the just announced ones with VT-c)
  • support for new storage arrays (from Sun)
  • support for new management agents (from Dell and HP)
  • an enhanced VMXNET driver for Windows XP and 2003 (which will require the re-installation of VMware Tools)

-> More release notes

Share


VMware ESX/ESXi Update 3 is Available

ESX 3.5, VMware No Comments »

This new release of ESX/ESXi 3.5 comes with the following enhancements:

  • Increase number of vCPUs per Core Limit (from 8 to 20)
  • New supported servers, NICs and storage IO controllers
  • New supported Guest Operating Systems

… and many more improvements and bug fixes.

ESX Server 3.5 Update 3 Release Notes
ESXi Server 3.5 Update 3 Installable Release Notes

Share

kritische Microsoft RPC Lücke – Patch MS08-067

Security, Windows No Comments »

Wie kritisch ist diese Lücke nun Tatsächlich?! Es ist doch schon sehr lange her, als Microsoft einen Critical1 Patch ausserhalb den offiziellen Patchdays zur Verfügung stellte.
Entsprechend nervös reagieren nun heute auch die IT Spezies darauf. Von Taskforce Team bilden bis nix machen, habe heute so ziemlich alles erlebt :)

Beamen wir uns zurück ins 2003:
Der “Blaster Worm” war zu dieser Zeit in aller Munde und zerschiesst im Businessbereich hunderttausendfach Systeme.

Heise Security meint folgendes dazu, vorallem der zweite Abschnitt gibt zu denken…:

Zudem schreiben die Redmonder im Security Bulletin MS08-067, dass es bereits erste gezielte Attacken gäbe, bei denen Angreifer versuchen würden, durch die Lücke in Systeme einzudringen. Öffentlich sei bislang aber noch kein Exploit gesichtet worden. PCs mit einer aktivierten Firewall sollen vor derartigen Angriffen sicher sein. Unter Vista und Server 2008 soll zudem eine vorherige Authentifizierung erforderlich sein, um den Fehler ausnutzen zu können.


Angesichts der Tatsache, dass Windows von 2000 bis zu Server 2008 betroffen ist, stellt sich die Frage, wie der fehlerhafte Code gerade in einem so sensiblen Serverdienst so lange unentdeckt bleiben konnte. Selbst in der Beta-Version von Windows 7 ist der Fehler enthalten. Microsoft betont immer wieder, dass im Rahmen des Software Development Lifecycles (SDL) unabhängige Teams den Programmcode sowohl manuell als auch mit Tools auditieren würden.

Share

VMware ESX 3.5 Update2 Patch

ESX 3.5, VMware No Comments »

Der Patch steht nun zur Verfügung

http://www.vmware.com/landing_pages/esxexpresspatches.html?start=585
http://www.vmware.com/download/

Statement von CEO Paul Maritz

Letter from VMware CEO Paul Maritz

Last night, we became aware of a code issue with the recently released update to ESX 3.5 and ESXi 3.5 (Update 2).
When the time clock in a server running ESX 3.5 or ESXi 3.5 Update 2 hits 12:00AM on August 12th, 2008, the released code causes the product license to expire. The problem has also occurred with a recent patch to ESX 3.5 or ESXi 3.5 Update 2. When an ESX or ESXi 3.5 server thinks its license has expired, the following can happen:
Virtual machines that are powered off cannot be turned on;
Virtual machines that have been suspended fail to leave suspend mode; and,
Virtual machines cannot be migrated using VMotion.
The issue was caused by a piece of code that was mistakenly left enabled for the final release of Update 2. This piece of code was left over from the pre-release versions of Update 2 and was designed to ensure that customers are running on the supported generally available version of Update 2.
In remedying the situation, we’ve already released an express patch for those customers that have installed/upgraded to ESX or ESXi 3.5 Update 2. Within the next 24 hours, we also expect to issue a full replacement for Update 2, which should be used by customers who want to perform fresh installs of ESX or ESXi.
I am sure you’re wondering how this could happen. We failed in two areas:
Not disabling the code in the final release of Update 2; and
Not catching it in our quality assurance process.
We are doing everything in our power to make sure this doesn’t happen again. VMware prides itself on the quality and reliability of our products, and this incident has prompted a thorough self-examination of how we create and deliver products to our customers. We have kicked off a comprehensive, in-depth review of our QA and release processes, and will quickly make the needed changes.
I want to apologize for the disruption and difficulty this issue may have caused to our customers and our partners. Your confidence in VMware is extremely important to us, and we are committed to restoring that confidence fully and quickly.
Thank You,
Paul Maritz
President and CEO
VMware

Weitere Links zum Thema:
http://communities.vmware.com/thread/162377?tstart=0&start=600
http://communities.vmware.com/thread/162714?tstart=0&start=15
http://communities.vmware.com/thread/162713

Share