Beefing Up Security In ASP.NET Part 2 Dot Net Bangalore 4th meet up on August...gmaran23
The document discusses beefing up security in ASP.NET applications. It covers mitigating vulnerabilities like large HTTP requests, insecure viewstate, and weak forms authentication. It recommends configuring HTTP runtime settings, enabling viewstate MAC and encryption, hashing and encrypting passwords, using SSL, and protecting sensitive configurations using web.config encryption. The presenter's other security-related talks and resources are also listed.
This short document promotes the creation of presentations using Haiku Deck on SlideShare. It features a stock photo and text prompting the reader that they may be inspired to create their own Haiku Deck presentation. A call to action is given to get started making a presentation.
This document analyzes how inequality in Ireland changed during the Great Recession from 2007-2012. It finds that demographic changes and changes in the labor market increased inequality, while changes in market incomes and the tax-benefit system decreased inequality. A decomposition analysis showed that population aging slightly increased inequality, while polarization of employment and a weaker link between education and incomes increased it. However, policy interventions reduced inequality overall. The results also showed variability depending on the order of analysis.
Mahmoud Ma’ani is a mechanical engineer from Jordan with over 4 years of experience in construction projects in Dubai. He has worked as a mechanical engineer and site engineer on projects involving HVAC, plumbing, and mechanical systems design and installation. His experience includes working on projects such as villas, housing complexes, and commercial buildings. He is proficient in AutoCAD, Primavera, and Microsoft Office applications. He is looking for new opportunities as a mechanical engineer in Dubai.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In a single sentence, it pitches presentation creation software.
This document is a curriculum vitae for Navnath Bhaskar Bhalerao, an electrical commissioning and construction project installation and maintenance technician. It outlines his 18 years of experience in electrical work for oil, gas, and petrochemical industries. It details his skills in low and high voltage electrical networks, switchgear, transformers, and commissioning and preventative maintenance of various electrical equipment. It also provides a work experience history listing 9 different contract positions between 2009-2016 in countries like the UAE, Iraq, Yemen, and South Sudan.
Beefing Up Security In ASP.NET Part 2 Dot Net Bangalore 4th meet up on August...gmaran23
The document discusses beefing up security in ASP.NET applications. It covers mitigating vulnerabilities like large HTTP requests, insecure viewstate, and weak forms authentication. It recommends configuring HTTP runtime settings, enabling viewstate MAC and encryption, hashing and encrypting passwords, using SSL, and protecting sensitive configurations using web.config encryption. The presenter's other security-related talks and resources are also listed.
This short document promotes the creation of presentations using Haiku Deck on SlideShare. It features a stock photo and text prompting the reader that they may be inspired to create their own Haiku Deck presentation. A call to action is given to get started making a presentation.
This document analyzes how inequality in Ireland changed during the Great Recession from 2007-2012. It finds that demographic changes and changes in the labor market increased inequality, while changes in market incomes and the tax-benefit system decreased inequality. A decomposition analysis showed that population aging slightly increased inequality, while polarization of employment and a weaker link between education and incomes increased it. However, policy interventions reduced inequality overall. The results also showed variability depending on the order of analysis.
Mahmoud Ma’ani is a mechanical engineer from Jordan with over 4 years of experience in construction projects in Dubai. He has worked as a mechanical engineer and site engineer on projects involving HVAC, plumbing, and mechanical systems design and installation. His experience includes working on projects such as villas, housing complexes, and commercial buildings. He is proficient in AutoCAD, Primavera, and Microsoft Office applications. He is looking for new opportunities as a mechanical engineer in Dubai.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In a single sentence, it pitches presentation creation software.
This document is a curriculum vitae for Navnath Bhaskar Bhalerao, an electrical commissioning and construction project installation and maintenance technician. It outlines his 18 years of experience in electrical work for oil, gas, and petrochemical industries. It details his skills in low and high voltage electrical networks, switchgear, transformers, and commissioning and preventative maintenance of various electrical equipment. It also provides a work experience history listing 9 different contract positions between 2009-2016 in countries like the UAE, Iraq, Yemen, and South Sudan.
Este documento ofrece consejos sobre la dieta para personas con diabetes. Recomienda una dieta basada en alimentos naturales como frutas, verduras, granos enteros, frijoles y avena. Afirma que seguir esta dieta no solo proporciona una alimentación saludable sino que también puede eliminar la diabetes de manera definitiva. Anima a las personas a hacer clic en un enlace para descubrir este "secreto".
Banco de preguntas actualizado para Agentes de Seguridad Blog Weah
Este documento contiene 23 preguntas de un examen sobre legislación y normativa relacionada con la seguridad privada en Ecuador. Las preguntas cubren temas como la Constitución ecuatoriana, los derechos ciudadanos, la ley de vigilancia y seguridad privada, y las responsabilidades y funciones de las compañías y guardias de seguridad privada.
La estructura organizacional establece los roles y responsabilidades de los miembros para lograr las metas de manera óptima. Las organizaciones coordinan el trabajo mediante la adaptación mutua, supervisión directa, normalización de resultados y procesos, y normalización de habilidades. Las cinco partes de una organización son el núcleo de operaciones, el vértice estratégico, la línea media, la tecnoestructura y el staff de apoyo, unidas por flujos de autoridad, materiales, información y procesos de decisión.
Moloko Koketso Moutlana is a South African male born in 1992 who currently works as an accounts clerk. He completed his matric in 2010 and obtained a bookkeeping qualification from the Institute of Certified Bookkeepers in 2013. His work experience includes serving as an accounts clerk for Omni Africa Technologies from 2013-2014 where his duties included procurement, cashbook management, and creating invoices. He lists excellent English, Afrikaans and Sepedi language skills as well as computer proficiency in Microsoft Office, Pastel Evolution and Payroll. His hobbies include listening to music, watching soccer, studying and exercising.
Vertex is an Ahmedabad-based interior design and construction company founded in 1997. It provides comprehensive interior solutions across India and has experience executing projects for corporate and industrial clients. The company's core values are quality, transparency, and commitment. Its vision is to be a landmark for on-time, high quality design-build professionals. Vertex aims to contribute to sustainability by using green and environmentally friendly materials. It prides itself on smooth project management and meeting deadlines. The company has a diverse client portfolio including HSBC, IL&FS Investsmart, Pidilite Industries, and Ratnamani Group, and focuses on building long-term client relationships.
The document provides an overview of the North Carolina System of Care (SOC) for children, youth, and families. It defines SOC as a coordinated network of community-based services and supports that are organized to meet the challenges of children with serious mental health needs and their families. Key aspects of SOC include:
1. Child and Family Teams (CFTs) provide direct services and supports through individualized planning and coordination.
2. Community Collaboratives promote teamwork and system changes at the community level to support CFTs.
3. The State Collaborative works at the state level to identify strengths/issues and support local efforts through relationship building and information sharing.
Families are at
Poppy and her friends went to Olympic Park on Sunday for a barbecue with their families where they enjoyed yummy food. They played on the playground, swinging and sliding. Olympic Park is described as a beautiful and wonderful place for children to have fun.
Listado oficial de inscritos vuelta de la juventud 2015LasBielas
This document contains the official list of riders registered for the 48 Vuelta de la Juventud bike race in Antioquia, Colombia from April 20-26, 2015. It lists 200 riders divided into 29 teams of 6-7 riders each. The teams are identified by their director and the riders are listed with their name and designation as Under 23 from Colombia.
Poppy spent the weekend with Bradley, where they went to the library and borrowed books, got takeaway chips from McDonald's, and Poppy made new friends with Horsie, Penguin and Baby Bear. Poppy also helped Bradley make a book, practice violin where she learned to play as well, and finished the day shooting basketballs before saying goodbye.
Managing Virtual Infrastructures With PowerShellguesta849bc8b
This document is a presentation about managing virtual infrastructures with Microsoft PowerShell. It introduces PowerShell and how it can be used to automate tasks and make administrators more efficient. It then demonstrates some basic PowerShell commands for virtualization tasks on platforms like VMware, Hyper-V, and Xen. More advanced topics and resources for learning more about PowerShell are also discussed.
Vepsun Technologies is an IT training company that has grown to become the largest independent training provider since 2010. It offers advanced technology courses delivered by experts to businesses and individuals. The company aims to form long-term relationships with clients by understanding their goals and putting efforts to refine and achieve those goals with experience. The document contains a lab guide for VMware vSphere 6.0 that includes instructions on installing an Active Directory server, ESXi server, and vCenter server.
Vibrant Technologies provides training on WebSphere application server. It offers courses to help individuals make careers in working with WebSphere. The document discusses Java SE 6 features like Java compiler API and scripting support. It also outlines WebSphere application server components and extensions like JAX-WS, JDBC 4.0, and how application servers work as extensions to web servers. The application model and running WebSphere on z/OS platforms is also summarized. Contact information is provided to learn more about Vibrant Technologies' training and career opportunities.
Virtualización de Escriorios VMWare View 5RaGaZoMe
The document describes the setup and configuration of a VMware View virtual desktop infrastructure laboratory. It includes details on the hardware, software, and steps to install and configure VMware vSphere, Microsoft SQL Server, and VMware View. The objective is to implement a platform for virtualizing desktops that can be accessed from various devices.
This document discusses securing Cassandra for compliance or paranoia. It covers encrypting data at rest and on the wire, authentication and authorization, and securing management tools like JMX. Encrypting data at rest can be done with options like dmcrypt, Vormetric, or DSE encryption. Node to node encryption and SSL is recommended to encrypt data on the wire. Role-based access control in Cassandra 2.2 allows for authentication and authorization. Securing JMX involves SSL and password-based authentication.
Describes in detail the security architecture of Apache Cassandra. We discuss encryption at rest, encryption on the wire, authentication and authorization and securing JMX and management tools
V mware v sphere 6.0 ultimate certified training - Adams AcademyAdams Academy
The VMware vSphere 6.0 Ultimate Certified Training course teaches everything about the VMware vSphere 6.0 Ultimate Bootcamp. Throughout the course, you will learn about virtualisation, planning and install ESXi, using tools to administer a VMware environment, and vCenter Server 6.0 and licensing.
See more: https://bit.ly/2IyBWU1
This document contains contact information and a CV for Ashraf Hassan Ahmed Soliman. It lists his personal details such as date of birth and nationality. It then outlines his objective to join the recipient's organization. The bulk of the document is a detailed CV covering his work experience managing servers and networks, database administration experience, relevant certifications such as VMWare and Microsoft, responsibilities including managing 250 application servers, and skills like server management, troubleshooting, and project management. It provides a list of past projects including planning an Active Directory structure and configuring a proxy server.
This document provides instructions for installing VMware Site Recovery Manager (SRM) 6. It outlines the prerequisites needed, such as compatible versions of vCenter Server and Platform Services Controller installed on both the protected and recovery sites. It describes the SRM installation process, including selecting the destination folder, specifying the Platform Services Controller address, vCenter Server instance, local site name, and administrator email. It also covers selecting the IP address for SRM and the database option.
VMware Site Recovery Manager (SRM) 6.0 Lab ManualSanjeev Kumar
This document provides instructions for installing VMware Site Recovery Manager (SRM) 6. It outlines the prerequisites needed, such as compatible versions of vCenter Server and Platform Services Controller installed on the protected and recovery sites. The steps of the SRM 6 installation process are described, including selecting installation options, registering with the PSC, and configuring local site settings. Key SRM components like the storage replication adapter and vSphere Replication appliances are also introduced.
The WordPress REST API is a powerful tool that can enhance your web development projects. In this presentation, attendees will learn how to leverage WordPress's existing endpoints and create custom ones using PHP without needing plugins. Attendees will also learn how to use their endpoints to power their front-end React apps, web apps or even entirely separate websites. Finally, attendees will learn about security concerns and how to lock down the REST API. Time permitting, attendees can have a Q&A period to ask questions.
The WordPress REST API was introduced in 2016 in version 4.7. It has been part of the WordPress ecosystem for about seven years and is well-documented. With the introduction of React and Gutenberg blocks, the REST API can take on a new life to help developers create complex apps with relative ease. Where once it was primarily used for basic integrations, now developers are harnessing its full capabilities for ambitious projects. The WordPress REST API can power modern web applications and custom blocks, showing that it remains highly relevant for building on the web today. Even after years of existence, the REST API remains a cornerstone of the WordPress framework.
Este documento ofrece consejos sobre la dieta para personas con diabetes. Recomienda una dieta basada en alimentos naturales como frutas, verduras, granos enteros, frijoles y avena. Afirma que seguir esta dieta no solo proporciona una alimentación saludable sino que también puede eliminar la diabetes de manera definitiva. Anima a las personas a hacer clic en un enlace para descubrir este "secreto".
Banco de preguntas actualizado para Agentes de Seguridad Blog Weah
Este documento contiene 23 preguntas de un examen sobre legislación y normativa relacionada con la seguridad privada en Ecuador. Las preguntas cubren temas como la Constitución ecuatoriana, los derechos ciudadanos, la ley de vigilancia y seguridad privada, y las responsabilidades y funciones de las compañías y guardias de seguridad privada.
La estructura organizacional establece los roles y responsabilidades de los miembros para lograr las metas de manera óptima. Las organizaciones coordinan el trabajo mediante la adaptación mutua, supervisión directa, normalización de resultados y procesos, y normalización de habilidades. Las cinco partes de una organización son el núcleo de operaciones, el vértice estratégico, la línea media, la tecnoestructura y el staff de apoyo, unidas por flujos de autoridad, materiales, información y procesos de decisión.
Moloko Koketso Moutlana is a South African male born in 1992 who currently works as an accounts clerk. He completed his matric in 2010 and obtained a bookkeeping qualification from the Institute of Certified Bookkeepers in 2013. His work experience includes serving as an accounts clerk for Omni Africa Technologies from 2013-2014 where his duties included procurement, cashbook management, and creating invoices. He lists excellent English, Afrikaans and Sepedi language skills as well as computer proficiency in Microsoft Office, Pastel Evolution and Payroll. His hobbies include listening to music, watching soccer, studying and exercising.
Vertex is an Ahmedabad-based interior design and construction company founded in 1997. It provides comprehensive interior solutions across India and has experience executing projects for corporate and industrial clients. The company's core values are quality, transparency, and commitment. Its vision is to be a landmark for on-time, high quality design-build professionals. Vertex aims to contribute to sustainability by using green and environmentally friendly materials. It prides itself on smooth project management and meeting deadlines. The company has a diverse client portfolio including HSBC, IL&FS Investsmart, Pidilite Industries, and Ratnamani Group, and focuses on building long-term client relationships.
The document provides an overview of the North Carolina System of Care (SOC) for children, youth, and families. It defines SOC as a coordinated network of community-based services and supports that are organized to meet the challenges of children with serious mental health needs and their families. Key aspects of SOC include:
1. Child and Family Teams (CFTs) provide direct services and supports through individualized planning and coordination.
2. Community Collaboratives promote teamwork and system changes at the community level to support CFTs.
3. The State Collaborative works at the state level to identify strengths/issues and support local efforts through relationship building and information sharing.
Families are at
Poppy and her friends went to Olympic Park on Sunday for a barbecue with their families where they enjoyed yummy food. They played on the playground, swinging and sliding. Olympic Park is described as a beautiful and wonderful place for children to have fun.
Listado oficial de inscritos vuelta de la juventud 2015LasBielas
This document contains the official list of riders registered for the 48 Vuelta de la Juventud bike race in Antioquia, Colombia from April 20-26, 2015. It lists 200 riders divided into 29 teams of 6-7 riders each. The teams are identified by their director and the riders are listed with their name and designation as Under 23 from Colombia.
Poppy spent the weekend with Bradley, where they went to the library and borrowed books, got takeaway chips from McDonald's, and Poppy made new friends with Horsie, Penguin and Baby Bear. Poppy also helped Bradley make a book, practice violin where she learned to play as well, and finished the day shooting basketballs before saying goodbye.
Managing Virtual Infrastructures With PowerShellguesta849bc8b
This document is a presentation about managing virtual infrastructures with Microsoft PowerShell. It introduces PowerShell and how it can be used to automate tasks and make administrators more efficient. It then demonstrates some basic PowerShell commands for virtualization tasks on platforms like VMware, Hyper-V, and Xen. More advanced topics and resources for learning more about PowerShell are also discussed.
Vepsun Technologies is an IT training company that has grown to become the largest independent training provider since 2010. It offers advanced technology courses delivered by experts to businesses and individuals. The company aims to form long-term relationships with clients by understanding their goals and putting efforts to refine and achieve those goals with experience. The document contains a lab guide for VMware vSphere 6.0 that includes instructions on installing an Active Directory server, ESXi server, and vCenter server.
Vibrant Technologies provides training on WebSphere application server. It offers courses to help individuals make careers in working with WebSphere. The document discusses Java SE 6 features like Java compiler API and scripting support. It also outlines WebSphere application server components and extensions like JAX-WS, JDBC 4.0, and how application servers work as extensions to web servers. The application model and running WebSphere on z/OS platforms is also summarized. Contact information is provided to learn more about Vibrant Technologies' training and career opportunities.
Virtualización de Escriorios VMWare View 5RaGaZoMe
The document describes the setup and configuration of a VMware View virtual desktop infrastructure laboratory. It includes details on the hardware, software, and steps to install and configure VMware vSphere, Microsoft SQL Server, and VMware View. The objective is to implement a platform for virtualizing desktops that can be accessed from various devices.
This document discusses securing Cassandra for compliance or paranoia. It covers encrypting data at rest and on the wire, authentication and authorization, and securing management tools like JMX. Encrypting data at rest can be done with options like dmcrypt, Vormetric, or DSE encryption. Node to node encryption and SSL is recommended to encrypt data on the wire. Role-based access control in Cassandra 2.2 allows for authentication and authorization. Securing JMX involves SSL and password-based authentication.
Describes in detail the security architecture of Apache Cassandra. We discuss encryption at rest, encryption on the wire, authentication and authorization and securing JMX and management tools
V mware v sphere 6.0 ultimate certified training - Adams AcademyAdams Academy
The VMware vSphere 6.0 Ultimate Certified Training course teaches everything about the VMware vSphere 6.0 Ultimate Bootcamp. Throughout the course, you will learn about virtualisation, planning and install ESXi, using tools to administer a VMware environment, and vCenter Server 6.0 and licensing.
See more: https://bit.ly/2IyBWU1
This document contains contact information and a CV for Ashraf Hassan Ahmed Soliman. It lists his personal details such as date of birth and nationality. It then outlines his objective to join the recipient's organization. The bulk of the document is a detailed CV covering his work experience managing servers and networks, database administration experience, relevant certifications such as VMWare and Microsoft, responsibilities including managing 250 application servers, and skills like server management, troubleshooting, and project management. It provides a list of past projects including planning an Active Directory structure and configuring a proxy server.
This document provides instructions for installing VMware Site Recovery Manager (SRM) 6. It outlines the prerequisites needed, such as compatible versions of vCenter Server and Platform Services Controller installed on both the protected and recovery sites. It describes the SRM installation process, including selecting the destination folder, specifying the Platform Services Controller address, vCenter Server instance, local site name, and administrator email. It also covers selecting the IP address for SRM and the database option.
VMware Site Recovery Manager (SRM) 6.0 Lab ManualSanjeev Kumar
This document provides instructions for installing VMware Site Recovery Manager (SRM) 6. It outlines the prerequisites needed, such as compatible versions of vCenter Server and Platform Services Controller installed on the protected and recovery sites. The steps of the SRM 6 installation process are described, including selecting installation options, registering with the PSC, and configuring local site settings. Key SRM components like the storage replication adapter and vSphere Replication appliances are also introduced.
The WordPress REST API is a powerful tool that can enhance your web development projects. In this presentation, attendees will learn how to leverage WordPress's existing endpoints and create custom ones using PHP without needing plugins. Attendees will also learn how to use their endpoints to power their front-end React apps, web apps or even entirely separate websites. Finally, attendees will learn about security concerns and how to lock down the REST API. Time permitting, attendees can have a Q&A period to ask questions.
The WordPress REST API was introduced in 2016 in version 4.7. It has been part of the WordPress ecosystem for about seven years and is well-documented. With the introduction of React and Gutenberg blocks, the REST API can take on a new life to help developers create complex apps with relative ease. Where once it was primarily used for basic integrations, now developers are harnessing its full capabilities for ambitious projects. The WordPress REST API can power modern web applications and custom blocks, showing that it remains highly relevant for building on the web today. Even after years of existence, the REST API remains a cornerstone of the WordPress framework.
The document discusses continuous deployment practices at Outbrain, an online content recommendation company. It emphasizes the importance of short feedback loops between code changes and user exposure through practices like deploying new code multiple times daily and testing code changes automatically before deployment. Infrastructure is codified and deployment is automated using tools like Chef to further streamline the process.
(ARC402) Deployment Automation: From Developers' Keyboards to End Users' Scre...Amazon Web Services
Some of the best businesses today are deploying their code dozens of times a day. How? By making heavy use of automation, smart tools, and repeatable patterns to get process out of the way and keep the workflow moving. Come to this session to learn how you can do this too, using services such as AWS OpsWorks, AWS CloudFormation, Amazon Simple Workflow Service, and other tools. We'll discuss a number of different deployment patterns, and what aspects you need to focus on when working toward deployment automation yourself.
This document discusses moving Selenium testing to the cloud using Sauce Labs. It begins with an introduction to Selenium Webdriver and Selenium Grid, noting the problems with running Grid locally like cost, single point of failure, and maintenance. It then outlines the benefits of moving to the cloud like reduced costs, scalability, flexibility, and ROI. Key aspects of Sauce Labs are described like security, integration, and how test execution works. Best practices for cloud testing are provided along with a demo of running a test on Sauce Labs and contact information for the presenter.
DevOps (Continuous Integrations, Continuous Delivery & Continuous deployment using Jenkins and Visual studio team services, setting up VTST build Agents, Integrating VSTS with SonarQube, NDepend,) , Complete automation of pushing code into VSTS from Visual Studio, Building Code by a Jenkin Server hosted on Azure and pushing that successful build on to Azure Web App via Release Pipeline or directly from Jenkins,VSTS Default agents, Setting up local agent from scratch, Setting up agents for code build, VSTS, Visual Studio Online Agents, Agent Pools, Hosted Agents, Hosted VS2017. Hosted Linux Agents, Setting up agent on VS Dev Test Labs, Setting up Template Parameters for Continuos Pipeline, Build Agent Creation Dynamically, Random Machine Name, Random Passwords, Dynamic Agent creation in VS Dev Test labs, Sonarcube, Code quality, Code Analysis, MSBuild, Integrate VSTS Build with NDepend, Package manager, Monolithic Architecture, Nuget, Package management, Npm js.com, Semantic versioning, Creating a nuget package, nuspec file, GitVersion Plugin, FeedURL, Chocolatey for package management, Chocolatey, chocolatey workflow,
Public exploit held private : Penetration Testing the researcher’s waytitanlambda
This talk is about how to solve practical challenges faced during pen-testing and exploits. Will help you to understand how it can be done efficiently. Will explore various tips and tricks about it. It will try to solve the common questions like:
0. How do I prepare? What kind of tools I should have?
1. I need to scan the entire network in a faster way?
2. How can I get more accurate results for scanning and fingerprinting?
3. Nessus says it is vulnerable but how can I exploit?
4. What if I know it is vulnerable but I don’t have any exploits available?
5. I am inside the box, compromised it, now what to do?
In short, it will show you the pain points of a typical pen-testing exercise how to deal with it and will help you to reach to “42”, the answer to life, the universe and everything.
Exact Microsoft AZ-900 Questions And AnswersArmstrongsmith
An Azure administrator plans to run a PowerShell script that will create Azure resources. The document provides sample questions and answers related to the Microsoft Azure Fundamentals certification exam. It also includes information about exactinside.com, such as contact details and copyright information.
Get a full tour of the new features we have recently developed, as well as other upcoming features for the OVH Private Cloud. With coding, federation and replication, discover the solution’s new building blocks through use cases.
This presentation will offer an overview on what are the frequently occurring 802.1x authentication based issues and how to quickly diagnose/troubleshoot the IAP WLAN network. Check out the webinar recording where this presentation was used. https://attendee.gotowebinar.com/register/5818157412807394306
Similar to Deploying VMware vCloud Director 5.5 (20)
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
1. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
Deploying VMware vCloud Director 5.5
Prerequisites/Tutorial To-Do List
MicrosoftSQL Server2008 R2
The SQL Servermustuse MixedMode authentication(cannotuse Windows
Authentication,mustbe aSQL account) We’ll gooverconfiguringthisinthe guide.
Linux VM
Must run one of the followingOSes(I’musingCentOS6forthisguide)
CentOS6 (64-bit) Update 4
RedHat Enterprise Linux 5(64-bit) Update 4
RedHat Enterprise Linux 5(64-bit) Update 5
RedHat Enterprise Linux 5(64-bit) Update 6
RedHat Enterprise Linux 5(64-bit) Update 7
RedHat Enterprise Linux 5(64-bit) Update 8
RedHat Enterprise Linux 5(64-bit) Update 9
RedHat Enterprise Linux 6(64-bit) Update 1
RedHat Enterprise Linux 6(64-bit) Update 2
RedHat Enterprise Linux 6(64-bit) Update 3
RedHat Enterprise Linux 6(64-bit) Update 4
Two networkadapters
At least4 GB of memory
Hard drive space for the OS andan additional 2GB of diskspace forvmware installation
and logfiles
WorkingESXi environmentwithvCenterServer
VMware vCloudNetworkingandSecurity5.5.x
VMware vCloudDirectorLicense Key
2. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
Bestpracticiesarticle canbe found
here:http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&exter
nalId=2059451
Deploy VMware vCloudNetworking andSecurity 5.5.x
VMware vCloud Networking and Security 5.5 (formerlly called vShield). Unlike other VMware
products, this product must be installed as an appliance. VMware provides you an OVA file that
contains the entire virtual appliance, so minimal configuration is needed. Here is a good overview of
the product and how it works: http://vmwarelearning.com/vcloud_net_sec/
Before beginning, here are the following hardware prerequisites. These prerequisites can be found
from the official VMware deployment guide: http://www.vmware.com/pdf/vshield_51_quickstart.pdf
Memory
vShield Manager: 8GB allocated, 3GB reserved
vShield App: 1GB allocated, 1 GB reserved
vShield Edge compact: 256 MB, large: 1 GB, x-large: 8 GB
vShield Data Security: 512 MB
Disk Space
vShield Manager: 60 GB
vShield App: 5 GB per vShield App per ESX host
vShield Edge compact and large: 320 MB, lx-Large: 4.4 GB (with 4 GB swap file)
vShield Data Security: 6GB per ESX host
vCPU
vShield Manager: 2
vShield App: 2
vShield Edge compact: 1, large and x-Large: 2
vShield Data Security: 1
3. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
Installing VMware vCloud Networking and Security 5.5 Appliance
1. Download the VMware vCloud Networking and Security 5.5 OVA file from myvmware.com
2. Login to vCenter
3. Select File->Deploy OVF Template…
8. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
8. Select Accept and then click Next >
9. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
9. Enter a name for the VM and click Next >
10. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
10. Select a datastore to place the VM on storage and click Next >
11. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
11. Select how you want to provision the VM and click Next >
12. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
12. Select the destination network and click Next >
13. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
13. Enter in a password for the default admin user and for privileged CLI access and clickNext>
15. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
15. Power on the VM
16. Open up a console the VM
16. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
17. Login to the VM using the username admin and the “user password” you specified in step
13.
17. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
18. Type enable and hit enter (use the “privileged user password” you specified in step 13).
19. Type setup and hit enter to launch the network configuration wizard
Enter in the static IP Address you wish to assign to the appliance and hit enter
Enter in the Subnet Mask for your network and hit enter
Enter in the Default gateway for your network and hit enter
Enter in your Primary DNS server’s IP address and hit enter
Enter in your Secondary DNS server’s IP addres and hit enter
Enter in your domain search list (DNS Suffix if you host your own internal DNS) and hit
19. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
20. Type y to confirm your changes and hit enter
21. Press control+alt+insert to send the control+alt+delete command to the VM to restart the
guest.
20. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
Note: Logging out like the wizard tells you didn’t work for me. Had to do the reboot.
21. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
22. Open up your webbrowser and head over to the static IP address you gave your appliance
22. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
23. Enter in the username admin and the password default to login
Configuring VMware vCloud Networking and Security 5.5 for vCenter
23. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
1. Click on the Edit button next to Lookup Service
2. Check Configure Lookup Service and enter in the information to your vCenter’s Lookup
Service instance:
Lookup Service Host
Lookup Service Port
SSO Administrator Username (should be admin@System-
24. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
Domainoradministrator@vsphere.local if you used the default installation options)
SSO Administrator Password.
Click OK once configured.
25. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
3. Click Yes to trust the server’s SSL certificate
26. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
4. Click Edit next to vCenter Server
5. Enter in your vCenter info and click OK
vCenter Server
Administrator Username
28. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
6. Select Yes to trust the vCenter SSL certificate
29. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
7. Check Install this certificate and do not display any security warnings and then click
the Ignore button when prompted
30. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
8. Click the Edit button next to NTP Server
31. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
9. Specify the IP address of the NTP server you wish to sync to and click OK
32. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
10. Click the Change Password link at the top to change the default admin password.
ClickOK when you are done.
At this point, you can begin to install the vShield App, vShield Endpoint, and vShield Data Security
services by selecting one of your hosts and clicking the Install links. However, configuration of
these options is outside the scope of this tutorial.
33. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
Note: One thing that I did notice that is different from vShield 5.1 is that once vShield Manager 5.5 is
synchronized with vCenter, the management plugin will automatically be registered to vCenter and
you can access vShield Manager from the vSphere Client.
Linux VMInstallation (CentOS6)
34. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
1. Grab a copyof the live CDisoto install the OS
1. http://isoredirect.centos.org/centos/6/isos/x86_64/
2. Nextyourwayto victorythroughthe install,substitutinginyourlocationandserverinfo.
3. Install VMtoolsonce you have yourOS up and running
A quick tutorial on how to get VMware Tools up and running on aCentOS 6 Linux machine.
Although the instructions are shown with the GUI, we’ll use terminal so the guide works with both
gui and non-gui based installs.
1. Mount the VM tools installer to your VM
35. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
2. Open up Terminal
3. Execute the following command (this will create a mount point for our CD drive)
36. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
1. mkdir /cdrom
4. Execute the following command (this will map the CD drive to our cdrom mount point)
37. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
1. mount /dev/cdrom /cdrom
5. Execute the following command to move to your temporary files folder
38. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
1. cd /tmp
6. Execute the following command to extract the VMware Tools tarball
39. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
1. tar -xvf /cdrom/VMwareTools (tab to autofill the rest of the package)
7. Execute the following command to run the VMware Tools installer
41. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
8. Press Enter/Return through each of the questions, using their defaults
44. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
9. Verify VMtools is running by looking at the client status in vSphere
4. Configure staticIPsoneach of your networkcards
5. Enable the firewall toallowinboundconnectionsonport443 (HTTPS)
45. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
6. Open up terminal if you are on the GUI version of CentOS 6
7. Execute the following command
47. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
8. Use your arrow keys to select Customize and hit enter
9. Use your arrow keys to select which service you would like to allow. Hit the spacebar to
enable or disable the rule and then select Close once you have enabled/disabled the rules
you wish.
48. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
1. In this case, I arrowed down to HTTPS and hit the spacebar.
50. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
11. Select Yes
Generate SSL certificates
We will needtogenerate some SSLcertificatesbefore runningthe vCloudDirectorinstallation. Please
followthe stepsbelowtocreate a javakeystore thatvClouddirectorwill use forSSL. Below are two
differentmethodsof generatingcertificates. Use the firstif youdon’twantto signyour certificates,use
the secondif you wantto signyour certificate withaninternal orexternalcertificate authority. Note:
UsuallyI create seperatekeystoreswithforeachservice,inthiscase,VMware wantsbothcertificatesin
the same keystore. Additionally,make sure youchange the defaultpasswordinthe commandsbelowto
somethingstronger(otherVMware productswantyouto use a genericpassword,thisone youcan
change as it will be promptedduringthe installprocess).
CreatingSelf-SignedCertificates
59. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
6. Use VMware’srecommendedtransactionisolationlevel. Clickthe NewQuerybuttonagainand
thenExecute the followingquery:
USE [vcloud]
GO
ALTER DATABASE[vcloud] SETSINGLE_USER WITH ROLLBACKIMMEDIATE;
ALTER DATABASE[vcloud] SETALLOW_SNAPSHOT_ISOLATION ON;
ALTER DATABASE[vcloud] SETREAD_COMMITTED_SNAPSHOT ON WITH NO_WAIT;
ALTER DATABASE[vcloud] SETMULTI_USER;
62. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
7. Next,create the SQL Userto connect tothe database (we will use vcloudasthe username,you
can change thisif youwouldlike). Clickthe NewQuerybuttonagainand thenExecute the
followingquery(amke sure to change the defaultpassword):
USE [vcloud]
GO
CREATE LOGIN [vcloud] WITHPASSWORD= 'vcloudpass', DEFAULT_DATABASE=[vcloud],
DEFAULT_LANGUAGE =[us_english],CHECK_POLICY=OFF
GO
CREATE USER [vcloud] forLOGIN [vcloud]
65. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
8. Last, assignthe properpermissionstothe SQL user. We will needthe usertohave db_owner
permissionsforthe install. Clickthe NewQuerybuttonagainand thenExecute the following
query:
USE [vcloud]
GO
sp_addrolemember[db_owner],[vcloud]
68. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
The official VMware KBarticle on configuringMSSQLServer(andoracle) can be found
here:http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&exter
nalId=2034540
Install vCloud Director
1. Copythe certificates.kskeystoreovertothe vCloudDirectorVMif you didn’tgenerate themon
it.
1. I placedmyssl certificatesinthe followingdirectory(VMware doesn’trecommenda
location,soI justpickedthisone):/opt/vmware/
2. Downloadacopy of VMware vCloudDirector5.5.Xfrom myvmware.com
69. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
3. Openup Terminal
4. Execute the followingcommandtoinstall one of the prerequisitesforthe vclouddirector
installer(CentOSshouldcome preinstalledwiththe others)
71. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
5. Enter y and thenpressentertocontinue the install
72. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
6. Enter y and thenpressentertocontinue the install
7. Navigate tothe folderwhere youdownloadedthe vmware-vcloud-directorbinfileandexecute
the followingcommandtoallowthe binfile tobe executed
75. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
9. Enter y to run the scriptafterthe installerverifiesprerequisites
76. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
10. Selectwhichadapteryouwouldlike toassignthe HTTPservice toand pressenter(thiswill be
for the webmanagementinterface)
84. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
18. Enter inthe name of yoursql database (usingthe defaultdatabase name vcloudforthisguide)
and pressenter
86. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
20. Enter yourdatabase user(vcloudis whatwe have beenusingforthistutorial) andpressenter
87. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
21. Enter the passwordtoyour sql userand pressenter
88. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
22. Type y and pressenterto start the service
100. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
13. Clickon Step2, Create a ProviderVDC
14. If you have differentresource poolswithdifferentconfigurations,Iwouldcreate asimilarname
for yourvDC. In thisexample,Ionlyhave one resource pool containingall the resourcesinmy
101. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
environment,soIam goingto name my vDC (Virtual DataCenter) MyCompany.
Click Nextwhenreadyto proceed.
1. Additionally,youcanselectwhatsupportedhardware versionyouwishtouse. AsI
have no ESX 4.x hosts,I am goingto selectHardware version 9as I have a newer
environment.
2. Note:PerVMware’swebsite,here isthe definitionof aProvidervDC: A ProvidervDCisa
collectionof compute,memory,andstorage resourcesfromone vCenter.A Provider
109. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
1. If you see thisbehavior,youwillhave tomanuallydeploythe vCloudDirectoragentsto
the hosts. To dothis,clickon the Manage & Monitortab inside of vCloudDirector.
2. SelectHosts
110. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
3. Rightclickon one of the hostsand select Prepare Host…
111. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
4. Enter the username andpasswordtothe host andclick OK
5. Repeatthisprocessforthe otherhosts inyour cluster(youcanselectmultiplehostsat
a time.Nowthat we have at leastone hostavailable,we canfailover afew VMsvia)
114. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
20. Clickon the Home tab andthenclickon the Create a new organization link
21. Enter inyourorganizationinformationandclick Next
116. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
22. Optionallyselectwhetheryouwantto use LDAPto provide accessto vCloudDirectorandthen
clickNext.
117. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
23. On the AddLocal Users page,clickAddto add virtual vCloudUsers(non-ldap). ClickNextonce
youhave addedthe usersof yourchoice or click Nextif youwant to add userslater.
118. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
24. On the Catalogpage,selectwhetherornotyouwant to allow sharing/publishingbetween
organizations. Inthiscase,justclick Next.
(oops,nopicture forthisone )
25. On the Email Preferencespage,click Next
119. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
26. Configure the policiestoyourliking. Inthiscase I am goingto leave thingswiththeirdefault
settingsandclick Next
(Oops,nopicture forthisone )
27. ClickFinish
120. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
28. Clickon Step6 Allocate resources to an organization
128. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
36. Enter a name for the newOrganizationVDCandclick Next
130. VEPSUN EducationServices,SR Arcade, 6th Cross, Tulasi TheaterRoad,Marathahalli,Bangalore.
Email- info@vepsun.com www.vepsun.in
At thispointyoushouldbe able topublishacatalog or create a new VMfrom scratch ina completely
isolatedenvironment. Youcan add an external networkorutilize aVXLAN withadditional
configurationstobegintoconnectyournetworktoan outside world.