hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9.2K
active users

#hypervisor

2 posts2 participants0 posts today
George Ellenburg (he/him/his)<p>Sorry <a href="https://bofh.social/tags/Broadcom" rel="nofollow noopener noreferrer" target="_blank">#Broadcom</a>/ <a href="https://bofh.social/tags/vmWare" rel="nofollow noopener noreferrer" target="_blank">#vmWare</a>. Too little, too late. <a href="https://bofh.social/tags/esxi" rel="nofollow noopener noreferrer" target="_blank">#esxi</a> <a href="https://bofh.social/tags/hypervisor" rel="nofollow noopener noreferrer" target="_blank">#hypervisor</a><span> <br><br></span><a href="https://www.theregister.com/2025/04/14/vmware_free_esxi_returns/" rel="nofollow noopener noreferrer" target="_blank">https://www.theregister.com/2025/04/14/vmware_free_esxi_returns/</a></p>
Linux Magazine<p>Changes to Apple Silicon put the <span class="h-card" translate="no"><a href="https://social.treehouse.systems/@AsahiLinux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>AsahiLinux</span></a></span> project at odds with adding support for the M4 chips<br><a href="https://www.linux-magazine.com/Online/News/Asahi-Linux-Runs-into-Issues-with-M4-Support?utm_source=MLM" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Online/News</span><span class="invisible">/Asahi-Linux-Runs-into-Issues-with-M4-Support?utm_source=MLM</span></a><br><a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/Asahi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Asahi</span></a> <a href="https://fosstodon.org/tags/AppleSilicon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppleSilicon</span></a> <a href="https://fosstodon.org/tags/M4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>M4</span></a> <a href="https://fosstodon.org/tags/XNU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XNU</span></a> <a href="https://fosstodon.org/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
FoW<p>VMware가 ESXi 8.0U3e 버전의 새 무상 하이퍼바이저를 릴리스.<br>- <a href="https://support.broadcom.com/group/ecx/productdownloads?subfamily=VMware%20vSphere%20Hypervisor&amp;freeDownloads=true" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">support.broadcom.com/group/ecx</span><span class="invisible">/productdownloads?subfamily=VMware%20vSphere%20Hypervisor&amp;freeDownloads=true</span></a></p><p><a href="https://netsphere.one/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> <a href="https://netsphere.one/tags/ESXi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESXi</span></a> <a href="https://netsphere.one/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Raven<p>Proxmox VE 8.4 released on Debian 12.10 base with Linux Kernel 6.8.12, live migration support with mediated devices, API for third-party backup solutions, Virtiofs directory passthrough</p><p><a href="https://proxmox.com/en/about/company-details/press-releases/proxmox-virtual-environment-8-4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">proxmox.com/en/about/company-d</span><span class="invisible">etails/press-releases/proxmox-virtual-environment-8-4</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxmox</span></a> <a href="https://mastodon.bsd.cafe/tags/proxmoxve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxmoxve</span></a> <a href="https://mastodon.bsd.cafe/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://mastodon.bsd.cafe/tags/debianbookworm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debianbookworm</span></a> <a href="https://mastodon.bsd.cafe/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.bsd.cafe/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
gyptazy<p>What do you miss in <a href="https://mastodon.gyptazy.com/tags/Proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxmox</span></a> or <a href="https://mastodon.gyptazy.com/tags/XCPng" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XCPng</span></a>? </p><p>My customers often told me, that when migrating from <a href="https://mastodon.gyptazy.com/tags/VMware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMware</span></a> based setups, they would miss something like <a href="https://mastodon.gyptazy.com/tags/DRS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DRS</span></a>. As a result I published <a href="https://mastodon.gyptazy.com/tags/ProxLB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProxLB</span></a> as a load balancer. Now, I do the same for <a href="https://mastodon.gyptazy.com/tags/DPM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DPM</span></a> and also some other things. What do you miss or what stops you or your business from switching to Proxmox or XCPng?</p><p><a href="https://mastodon.gyptazy.com/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a> <a href="https://mastodon.gyptazy.com/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.gyptazy.com/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://mastodon.gyptazy.com/tags/vms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vms</span></a> <a href="https://mastodon.gyptazy.com/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.gyptazy.com/tags/features" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>features</span></a> <a href="https://mastodon.gyptazy.com/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.gyptazy.com/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Alexandre Borges<p>To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community.</p><p>ERS (439 pages, so far): </p><p>[+] ERS 05: <a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a><br>[+] ERS 04: <a href="https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/02/0</span><span class="invisible">4/exploiting-reversing-er-series-article-04/</span></a><br>[+] ERS 03: <a href="https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/2</span><span class="invisible">2/exploiting-reversing-er-series-article-03/</span></a><br>[+] ERS 02: <a href="https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/01/0</span><span class="invisible">3/exploiting-reversing-er-series-article-02/</span></a><br>[+] ERS 01: <a href="https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/04/1</span><span class="invisible">1/exploiting-reversing-er-series/</span></a></p><p>MAS (606 pages -- finished): </p><p>[+] MAS 10: <a href="https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/1</span><span class="invisible">5/malware-analysis-series-mas-article-10/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/08/0</span><span class="invisible">7/malware-analysis-series-mas-article-08/</span></a><br>[+] MAS 07: <a href="https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/01/0</span><span class="invisible">5/malware-analysis-series-mas-article-7/</span></a><br>[+] MAS 06: <a href="https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/11/2</span><span class="invisible">4/malware-analysis-series-mas-article-6/</span></a><br>[+] MAS 05: <a href="https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/09/1</span><span class="invisible">4/malware-analysis-series-mas-article-5/</span></a><br>[+] MAS 04: <a href="https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/1</span><span class="invisible">2/malware-analysis-series-mas-article-4/</span></a><br>[+] MAS 03: <a href="https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/0</span><span class="invisible">5/malware-analysis-series-mas-article-3/</span></a><br>[+] MAS 02: <a href="https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/02/0</span><span class="invisible">3/malware-analysis-series-mas-article-2/</span></a><br>[+] MAS 01: <a href="https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2021/12/0</span><span class="invisible">3/malware-analysis-series-mas-article-1/</span></a></p><p>The blog home page is: <a href="https://exploitreversing.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com/</span><span class="invisible"></span></a></p><p>I will be back in a few months with the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I have laid all the necessary groundwork. I'm currently taking a break from writing to focus on research.</p><p>Enjoy reading and have an excellent day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p><a href="https://infosec.exchange/tags/Xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Xbox</span></a> 360 modders have discovered a new way to get homebrew apps and games running on the console. A new software-only exploit known as <a href="https://infosec.exchange/tags/BadUpdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BadUpdate</span></a> allows you to use a <a href="https://infosec.exchange/tags/USB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USB</span></a> key to hack past <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hypervisor</span></a> protections and run unsigned <a href="https://infosec.exchange/tags/code" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>code</span></a> and <a href="https://infosec.exchange/tags/games" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>games</span></a> <a href="https://github.com/grimdoomer/Xbox360BadUpdate" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/grimdoomer/Xbox360B</span><span class="invisible">adUpdate</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p><a href="https://infosec.exchange/tags/Reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Reversing</span></a> <a href="https://infosec.exchange/tags/Samsung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Samsung</span></a> <a href="https://infosec.exchange/tags/HArx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HArx</span></a> <a href="https://infosec.exchange/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hypervisor</span></a> Framework <a href="https://dayzerosec.com/blog/2025/03/08/reversing-samsungs-h-arx-hypervisor-part-1.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dayzerosec.com/blog/2025/03/08</span><span class="invisible">/reversing-samsungs-h-arx-hypervisor-part-1.html</span></a></p>
Alexandre Borges<p>The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:</p><p><a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a></p><p>I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA @HexRaysSA for their constant and uninterrupted support, which have helped me write these articles. </p><p>I hope you enjoy reading it and have an excellent day.</p><p><a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.social/tags/hyperv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hyperv</span></a> <a href="https://mastodon.social/tags/architecture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>architecture</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://mastodon.social/tags/internals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internals</span></a> <a href="https://mastodon.social/tags/idapro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idapro</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a></p>
Alexandre Borges<p>The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:</p><p><a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a></p><p>I would like to thank Ilfak Guilfanov @ilfak and Hex-Rays SA <span class="h-card" translate="no"><a href="https://infosec.exchange/@HexRaysSA" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>HexRaysSA</span></a></span> for their constant and uninterrupted support, which have helped me write these articles. </p><p>I hope you enjoy reading it and have an excellent day.</p><p><a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://infosec.exchange/tags/hyperv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hyperv</span></a> <a href="https://infosec.exchange/tags/architecture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>architecture</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/internals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internals</span></a> <a href="https://infosec.exchange/tags/idapro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idapro</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a></p>
MetalSamurai<p><strong>Installing XCP-NG on Apple&nbsp;Hardware</strong></p><p><a href="https://xcp-ng.org/" rel="nofollow noopener noreferrer" target="_blank">XCP-NG</a> is an open source hypervisor platform; an operating system and tools to run virtual machines on a pool of computers, with a powerful web-based management interface. The hypervisor is based on <a href="https://xenproject.org" rel="nofollow noopener noreferrer" target="_blank">Xen</a>, with extensions to allow it to be managed by a CLI or the <a href="https://xen-orchestra.com/#!/xo-home" rel="nofollow noopener noreferrer" target="_blank">XenOrchestra</a> web UI. If you’re familiar with VMware ESXi you’ll pick up XCP-NG very quickly.</p><p>XCP-NG will run on most x86 hardware, including those older Intel Apple computers you may have lying about that can be repurposed to set up a home lab or similar.</p><p>However, getting XCP-NG (either of the two long term supported versions 8.2.1 or the newer 8.3) installed and running may cause you problems, as the installer will always finish with what appears to be a fatal error. Typically it’s something like:</p> <pre>An unrecoverable error has occurred. The error was:Failed to run efibootmgr: Could not prepare Boot variable: No such file or directory</pre> <p>Not encouraging, right? But don’t worry, we can fix this. There are four steps to recover and get everything running the way it should be. But some serious things have failed that could leave you scratching your head: that root password you set during installation? Gone. The storage space for VMs you configured? Not there. Timezone and keyboard preferences? Forgotten.</p><p>First, shut down the computer and disconnect the installation USB. You won’t need it again, and having an extra disk attached might cause confusion. Then, switch on the computer and get ready with your finger hovering over the “e” key on your keyboard. As soon as the Grub loader menu appears, hit “e” and start using the cursor keys to move through the boot argument string. Look for “ro”; change that to “rw init=/sysroot/bin/sh”. What does that do? Instead of booting with the root partition in read-only mode, we’re going to mount it read-write (so we can make changes) and instead of running init to start the usual boot sequence, we’re just going to drop straight into a command shell. Hit C-x to save and continue booting.</p><p>When you get to the root shell prompt “#”, type the following commands:</p><pre><code>chroot /sysrootpasswd</code></pre><p>The first changes the environment for later commands to use the /sysroot jail, so that commands, shared libraries etc. can all be found. If you get strange errors that libc.so can’t be found, you forgot this step. The second lets us set the root password. Enter it twice, make a note of it and remember this process if you ever forget the root password again and need to reset it.</p><p>The usual commands to reboot won’t work as they talk to init, but there’s no init process running, just our shell. You might find Ctrl-Alt-Del lets you reboot; I usually resort to the power switch at this point. Turn it off and back on again. This time, let it boot up normally until you see the console screen:</p><p>Use the arrow keys, Enter and Escape to navigate the menus. Check the Network and Management Interface details are correct, if they are, you can probably ssh in if that’s more convenient. If you need to make changes you’ll be prompted for the root password you just set.</p><p>Next go to Keyboard and Timezone and pick the correct keyboard layout and timezone from the drop down lists.</p><p>The final problem is the trickiest bit. The system needs at least one SR (storage repository) to store VMs in. You probably remember during the installation phase being asked if you wanted it for thin provisioning (ext) or thick provisioning1. Without that, you’re a bit stuck, as you can’t set up any VMs, and the best way to manage XCP-NG is through XenOrchestra (usually XOA – the XenOrchestra Appliance), which you’d normally provision as the first VM on your server. You can create the missing SR(s) from the command line, by <a href="https://docs.xcp-ng.org/storage/" rel="nofollow noopener noreferrer" target="_blank">following the XCP-NG documentation.</a> I did that once, years ago, and I didn’t take any notes. It’s not hard, just tedious and you’ll probably want to ssh in from another computer so you can copy and paste all the long UUID strings.</p><p>XenOrchestra is often deployed as the XOA appliance, but it’s just a web application and there’s a handy script to download the community edition sources and build it here: <a href="https://github.com/Jarli01/xenorchestra_installer" rel="nofollow noopener noreferrer" target="_blank">https://github.com/Jarli01/xenorchestra_installer</a></p><p>You’ll need a pre-existing x86 Debian/Ubuntu machine somewhere. If you don’t have one of those already, but you’ve got a new Apple Silicon Mac, you can install <a href="https://mac.getutm.app" rel="nofollow noopener noreferrer" target="_blank">UTM</a> and set up a Debian VM there. Just download a Debian or Ubuntu image from the Gallery, then follow the instructions for building XenOrchestra Community Edition above. I don’t think it works reliably on ARM/Apple Silicon yet, so you’ll need an Intel VM, hence using UTM.</p><p>One of the great things about XO is you can have multiple installations all talking to the same pool of hypervisor hosts, and can manage them from anywhere. It’s always useful to have a spare XO somewhere to let you manage your pool, so even though this XenOrchestra installation is a temporary bootstrapping step, I’d recommend keeping it around in case you ever need it again.</p><p>Log in to your new XenOrchestra web application, using the IP address of the computer you installed it on. The default login is “admin@admin.net” and the password is “admin”, you’ll want to change both of those at some point, but don’t worry about it just now.</p><p>Look down the list of options down the left hand side until you find “New”, and choose “Server” from the menu. Fill in the boxes – Label is the name you gave your server, but it can be anything meaningful. The address is the IP address of your server, username is “root” and the password is the root password you set above. Hit Connect, then approve the connection with the self-signed certificate. You can now manage your XCP-NG server easily.</p><p>Next go back to New and this time choose Storage. From here we are going to create the missing SR(s). Choose your Host from the pop-up list at the top, give your SR a name (eg “Primary” or literally anything meaningful – don’t worry too much about names for things in XCP-NG, they’re only for your benefit, underneath the system uses UUIDs, so you can rename everything at any time). Give the SR a description, again this is just extra information for you, so “Storage for VMs” will do. Choose the storage type; I recommend EXT for now, you can experiment with the other types later, then put in the device name to use.</p><p>If your Mac had only one internal drive the device is very likely “/dev/sda3”, but you should probably check. Log in to your server, either on the console or via ssh and use parted to check the partitions. One of them should be a very large unused one that uses up the rest of the disk. The installer usually leaves that as partition 3. If your Mac had multiple drives you’ll need to check whether you installed on sda or sdb. If your Mac had a Fusion drive (with a combined HDD and SSD) and you installed on the smaller, faster SSD, it’s probably sdb.</p><p>Click the Create button, and wait a minute. If you had a second internal drive, go back and repeat the process above for that other drive. You can just use the whole drive so “/dev/sda” or “/dev/sdb” will work.</p><p>You’ve now got a fully functional XCP-NG installation. Maybe go to Home / Pools / Patches and install any missing patches, followed by a restart before you start setting up VMs, then just follow Vates’ documentation to install an XOA appliance on your server and start setting up other VMs, access to any NFS or SMB shares you’ll be using to store installation ISOs or backups and set up your backup policy.</p><ol><li>With Thin Provisioning, VMs take up as much space on disk as they are actually using, so virtual hard disks will grow as they fill up. With Thick Provisioning all the space allocated for a virtual hard disk is reserved in one go. Thin provisioning lets you pack more VMs on and makes them way more efficient to copy and move around. Thick provisioning stops VMs from growing and filling up space unexpectedly and is better suited to remote virtual disk storage solutions such as iSCSI, where you’re probably using a SAN. ↩︎</li></ol><p><span></span></p><p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/apple/" target="_blank">#Apple</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/hypervisor/" target="_blank">#Hypervisor</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/utm/" target="_blank">#UTM</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/vm/" target="_blank">#VM</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/xcp-ng/" target="_blank">#XCPNG</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://metalsamurai.wordpress.com/tag/xenorchestra/" target="_blank">#XenOrchestra</a></p>
Alex<p>I'm currently looking for people with low level <a href="https://mastodon.org.uk/tags/firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmware</span></a>, <a href="https://mastodon.org.uk/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> and/or <a href="https://mastodon.org.uk/tags/virtio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtio</span></a> experience. Flexible contract or full time possibility. My DMs are open for CVs, ideally with pointers to <a href="https://mastodon.org.uk/tags/upstream" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>upstream</span></a> contributions. <a href="https://mastodon.org.uk/tags/getfedihired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getfedihired</span></a> <a href="https://mastodon.org.uk/tags/fedihire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihire</span></a> <a href="https://mastodon.org.uk/tags/jobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobs</span></a></p>
Linuxiac<p>Xen 4.20 open-source type-1 hypervisor brings Arm LLC coloring, AMD Zen 5 support, Intel EPT Paging-Write, and more.<br><a href="https://linuxiac.com/xen-4-20-hypervisor-brings-amd-zen-5-support/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/xen-4-20-hypervis</span><span class="invisible">or-brings-amd-zen-5-support/</span></a></p><p><a href="https://mastodon.social/tags/xen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xen</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.social/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://mastodon.social/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Francis 🏴‍☠️ Gulotta<p>Low Latency (&lt;2ms) process execution in a VM via a hypervisor, not a sandbox!?</p><p>I'm not going to pretend to understand all the limitations of a sandbox but I believe that we have solid hypervisors.</p><p><a href="https://opensource.microsoft.com/blog/2024/11/07/introducing-hyperlight-virtual-machine-based-security-for-functions-at-scale/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensource.microsoft.com/blog/</span><span class="invisible">2024/11/07/introducing-hyperlight-virtual-machine-based-security-for-functions-at-scale/</span></a></p><p><a href="https://toot.cafe/tags/wasm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wasm</span></a> <a href="https://toot.cafe/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a> <a href="https://toot.cafe/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://toot.cafe/tags/serverless" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>serverless</span></a> <a href="https://toot.cafe/tags/functions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>functions</span></a></p>
chribonn<p>What you need to do to download VMWare Fusion and Workstation for free.</p><p><a href="https://youtu.be/ol0gPsxOOZo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/ol0gPsxOOZo</span><span class="invisible"></span></a></p><p><a href="https://twit.social/tags/VMWare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VMWare</span></a> <a href="https://twit.social/tags/Workstation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Workstation</span></a> <a href="https://twit.social/tags/WorkStationPro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WorkStationPro</span></a> <a href="https://twit.social/tags/Fusion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fusion</span></a> <a href="https://twit.social/tags/Broadcom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Broadcom</span></a> <a href="https://twit.social/tags/Download" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Download</span></a> <a href="https://twit.social/tags/software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>software</span></a> <a href="https://twit.social/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeSoftware</span></a> <a href="https://twit.social/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hypervisor</span></a> <a href="https://twit.social/tags/virtualmachine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualmachine</span></a> <a href="https://twit.social/tags/TTMO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TTMO</span></a></p>
buheratorHyperlight is a library for creating micro virtual machines — or sandboxes — specifically optimized for securely running untrusted code with minimal impact. <br><br><a href="https://github.com/hyperlight-dev/hyperlight" rel="nofollow noopener noreferrer" target="_blank">https://github.com/hyperlight-dev/hyperlight</a><br><br>It supports both Windows and Linux, utilizing Windows Hypervisor Platform on Windows, and either Microsoft Hypervisor (mshv) or KVM on Linux.<br><br><a class="hashtag" href="https://infosec.place/tag/hypervisor" rel="nofollow noopener noreferrer" target="_blank">#hypervisor</a> <a class="hashtag" href="https://infosec.place/tag/virtualization" rel="nofollow noopener noreferrer" target="_blank">#virtualization</a>
Alex<p><span class="h-card" translate="no"><a href="https://infosec.space/@MsDropbear42" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MsDropbear42</span></a></span> the type-1/type-2 terminology should probably be retired at this point. <a href="https://mastodon.org.uk/tags/kvm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kvm</span></a> exhibits a lot of type-2 behaviour (e.g. guests are processes to the kernel) although being <a href="https://mastodon.org.uk/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> it accesses the hardware directly. <a href="https://mastodon.org.uk/tags/Xen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Xen</span></a> looks more like a typical type-1 layered <a href="https://mastodon.org.uk/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> although a lot of <a href="https://mastodon.org.uk/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> management is delegated to the <a href="https://mastodon.org.uk/tags/dom0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dom0</span></a> guest. And that's before you look at the architectural differences between for example <a href="https://mastodon.org.uk/tags/x86" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x86</span></a> and <a href="https://mastodon.org.uk/tags/arm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arm</span></a> (with and without <a href="https://mastodon.org.uk/tags/vhe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vhe</span></a>).</p>
vermaden<p>Added 𝗨𝗣𝗗𝗔𝗧𝗘 𝟯 [UPDATE 3] to 𝗙𝗿𝗲𝗲𝗕𝗦𝗗 𝗕𝗵𝘆𝘃𝗲 𝗩𝗶𝗿𝘁𝘂𝗮𝗹𝗶𝘇𝗮𝘁𝗶𝗼𝗻 [FreeBSD Bhyve Virtualization] article.</p><p><a href="https://vermaden.wordpress.com/2023/08/18/freebsd-bhyve-virtualization/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vermaden.wordpress.com/2023/08</span><span class="invisible">/18/freebsd-bhyve-virtualization/</span></a></p><p><a href="https://mastodon.social/tags/verblog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>verblog</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/bhyve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bhyve</span></a> <a href="https://mastodon.social/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://mastodon.social/tags/uefi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uefi</span></a> <a href="https://mastodon.social/tags/grub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>grub</span></a> <a href="https://mastodon.social/tags/x11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x11</span></a> <a href="https://mastodon.social/tags/uefi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uefi</span></a> <a href="https://mastodon.social/tags/bios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bios</span></a></p>