Feeds

LinuxWorld, virtually speaking

The future's in virtualisation

Secure remote control for conventional and virtual desktops

Winners Without losers

VMWare sponsored a contest - the Ultimate Virtual Appliance Challenge - over the past many months to create the most useful and interesting virtual appliances, and the winners were announced at LinuxWorld.

I'm now grabbing you by the lapels and urging you strongly to go check those winners out, because there are so amazingly cool, powerful, and, yes, innovative tools there for you to see. And not just see, but play with as well.

For instance, the winning team (who took away $100,000!) created an appliance called "HowNetWorks" that is described as "a network analyser that works at a higher level than more traditional network analyzers like tcpdump or ethereal. Packaged inside a VMware virtual machine on top of Ubuntu, this virtual appliance contains a completely new application written by the author and comes with full documentation to get you started (with videos)!"

Everything is under the GPL, of course, so you're free to use this as you wish, as well as study, modify, and redistribute the code. Ah, ain't open source grand?

Security pros might also be interested in the third prize winners ($25,000), who created the "Sieve Firewall" appliance. This one is a "[t]ransparent bridging iptables firewall configured through [a] Windows-based .net GUI," with several other interesting and innovative features. By making it easy for Windows admins to use a Linux-based firewall, this appliance could go a long way towards improving security in many businesses that need it.

In the server category, the winner ($5,000) was the Enterprise Encryption Server, a really smart way to provide a badly-needed service.

"The Enterprise Encryption Server provides an easy to deploy and manage centralized OpenPGP compatible encryption resource...Files that are copied to the appliance via FTP or Windows file sharing (SMB) are automatically encrypted/decrypted and then copied to remote destinations. For compliance reasons every step of the process is logged."

I know that several of you reading this are already thinking of ways that you could use this exciting, innovative tool. With VMWare, this will take a few minutes to set up, thus allowing you to leverage a small investment in time in some potentially huge ways.

There are plenty of other interesting winners and honorable mentions, including the Kid Safe Desktop ("stops illicit material from invading your child's computer by filtering and blocking web content while they surf"), Strongbox Virtual Appliance ("a complete office environment using strong steganographic encryption, with RAM isolated from disk"), and Internet Connection Sharing Appliance (a "Netfilter based NAT box - easily share your internet connection, without changing your network configuration").

Beyond those, there were 170 entries in the contest, so I encourage you to nose around in the complete list of available appliances. Who knows what you'll find, but it may be just the thing you need.

Or, it may inspire you to create your own virtual appliance for your organisation or your clients. This stuff isn't rocket science, and the tools are free, so you're basically limited only by your imagination and ingenuity. The point is, don't waste time. Try this stuff out and put it to use.

Virtualisation is going to continue its spread throughout the IT world, and security pros need to start taking advantage of its possibilities now. If you're interested in being in the right place at the right time, then start learning as much about virtualisation now as you possibly can. Your future self will thank you.

This article originally appeared in Security Focus.

Copyright © 2006, SecurityFocus

Scott Granneman teaches at Washington University in St Louis, consults for WebSanity, and writes for SecurityFocus and Linux Magazine. His latest book, Hacking Knoppix, is in stores now.

Secure remote control for conventional and virtual desktops

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
Linux Foundation says many Linux admins and engineers are certifiable
Floats exam program to help IT employers lock up talent
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.