VMware workstation “Not enough physical memory”

In this tutorial we will see how to resolve the error “No enough physical memory” in VMware Workstation on Windows 8 and 8.1

In recent weeks, a problem appears on VMware Workstation installed on Windows 8.1. Indeed, when starting a virtual machine with more than 2 gigabytes of virtual machine, you can see the error message appear “Not enough physical memory is available to power on this machine configured with its settings”.


Note: Workstation error indicating a failure to allocate RAM resources when starting the virtual machine.

read more

Posted in Web Hosting, Windows Hosting | Tagged , , | Leave a comment

How to disable SSL 3.0 in IIS 8.5?

windows-IIS-8.5In this tutorial, we will disable the SSL 3.0 protocol in IIS, the website application that is found on Windows operating systems.

But why we are disabling SSL 3.0?

First, this protocol is deprecated so you to use its successor TLS. Second, version 3.0 of SSL has recently been the subject of a critical vulnerability, called Poodle.

Note: Poodle – Padding Oracle on Downgraded Legacy Encryption – CVE-2014-3566.

read more

Posted in Windows Hosting | Tagged , , , | Leave a comment

Microsoft strengthen the security of AD by acquiring Aorato

aorato-cloud Microsoft seizes the start-up company Aorato, which is specializing in the management of identity and access, to prevent advanced attacks.

Microsoft announced on its corporate blog about the acquisition of start-up company Aorato. The latter was created in 2011 by former executives of the technological unit of the Israeli army. The company enjoyed raising $10 million funding from Accel Partners and funds Innovation Endeavors for a total capital of 11 million. No financial information was given on the acquisition, but sources familiar with the matter mentioned in the Wall Street Journal claims, the sum is near about $200 million. This is a confirmation of interest by the Redmond Company for start-ups. The press mentioned advanced discussion last July.

read more

Posted in Latest News | Tagged , , | Leave a comment

How Google tracks the SSL and TLS vulnerabilities?

nogotofail Google recently released open source Nogotofail to uncover vulnerabilities in SSL and TLS in applications and terminals.

Google encourages webmasters to generalize the use of HTTPS, connections using an encryption protocol. If this exchange provides security at an additional level of privacy, it is not infallible. HTTPS connections are particularly exposed to attacks called the middle man (man-in-the-middle).

To reassure users, Google is now introduced a testing tool called as Nogotofail. Software released as an Open source project on GitHub, which means that it is open to outside input. “It works with Android, iOS, Linux, Windows, Chrome OS, OS X and any device to connect to the Internet”, said Google in a blog contribution. Purpose of the tool: verifying that application and devices do not contain known vulnerabilities of SSL / TLS (encryption protocols used with HTTPS connections) or bad configuration.

read more

Posted in Technology | Tagged , | Leave a comment

OSv – Cloud operating system dedicated to virtual machines

OSv Still in alpha version, but OSv aims to build an environment specifically tailored to the VM. So the question is it an alternative to container?

In the world of Cloud, virtualization plays an essential role. It is what provides the flexibility to distribute tasks among servers. To reduce the load of the machines, it is possible to opt for a low-level hypervisor, based on a minimal OS. With this approach, OSv will implement virtual machines (VMs).

OSv is indeed a minimalist operating system, dedicated specially to virtualized environments. It does not include any drivers for the physical hardware and offers no multi-user support. An offer adapted to the world of virtual machines, where single software is usually installed on a VM.

read more

Posted in Cloud Computing | Tagged , , , | Leave a comment