Apple exploits (and for that matter, any platform exploits) are a plenty. But most of them are fun, and as long as you can play around with them and understand…
Social Engineering and Phishing has been around for donkeys' years now. While really sophisticated attacks are usually designed and prepped months, sometimes years in advance, and can be brutally effective,…
This is a non technical blog. Well, "technical", if you are into systems and processes though. The whole Facebook WhatsApp Instagram Signal Telegram conversation and mess essentially ended up in…
OK, so people are reaching out for resetting ESXi password as the old blog of mine isn't there anymore http://www.vdsyn.com/resetting-the-root-password-for-esxi-5-x/ Ok this was on ESXi 6.5 - need to test…
Well, this is thoroughly a fun pet experiment - just to tinker around and see what breaks :-) Should you be trying this on a prod cluster? Holy !@#$ no!…
So, you are done with https://www.thevfanatic.com/understanding-esxi-7-0-1-upgrades-command-line/ and are now aching to see what a successful upgrade looks like? Fear not! We have a successful upgrade to feast our eyes on!…
Ever tried setting up a Nutanix or VMware lab and Chrome just cr*ps out on you? With nonsense like "Your connection is not private" NET::ERR_CERT_INVALID - whatever in God's name…