When I searched dmesg for errors I found:
Created an OVA file to 'deploy' to another ESX Server and ran into an issue with the network interfaces. The Export of the OVA and the IMPORT went ok. But when I booted the machine and started to check connectivity i noticed there was no interfaces showing up when I ran the ifconfig command. When I searched dmesg for errors I found: Which pointed me to the etc/udev/rules.d/70-persistent-net.rules file. Examining the file I found the 'original' interfaces were in there and renamed, and there were 2 new interfaces added. I checked the NIC under the VMWare Settings and see that the 'assigned' MAC matches eth3 from the 70-persistent-net.rules file (shown below). The other NIC MAC matches eth2. Modified the /etc/udev/rules.d/70-persistent-net.rules file and removed the old entries and renamed the new entries to match the proper interface: Updated the /etc/sysconfig/network-scripts/ifcfg-ethx files so they have the proper MAC/HWADDR values. Reboot after changes, and everything is awesome!
1 Comment
Was lucky enough to see a few emails come through my inbox which pointed to some web sites serving up some Blackhole Exploit Kits..
So I decided to buy the MLB.TV package this year for baseball season. I'm a huge NATS fan and like listening/watching to the games while at work if possible and thought this would allow me to do that. One thing that surprised me while creating an account was the Password limitations.
First I tried a password like this: 1122word991% And it complained about the 'special characters' Second I tried this password: 1122word991 And it complained that the password was too long and "Password can not be greater than 10 characters". It amazes me in this day and age that a website would have a limited password complexity and length policy. Just glad I didn't store my Credit Card # with my account. With easy Password Policies I wonder how often MLB fans have their accounts cracked... (BTW this isn't my email addy below :^P ) mab Did a blog for work about the DNSChanger Malware.
http://www.1901group.com/malware-dnschanger/2012.03.05 |
AuthorSecurity Researcher with about 20 years in the Computer Security Field. Going to talk even if no one is listening.. Archives
January 2022
Categories
All
|