Skip to main content

Sneak Peek : FastSCP 2.0 from Veeam for ESX Server



I got to test the FastSCP version 2.0 against my ESX Servers and I was truly impressed with this tool! The new features are totally cool! The tool will be released on 26th Feb 2007, coming Monday thus.

Check out the cool new features:




  • ESX to ESX direct copy. FastSCP 2.0 allows a user to copy files directly between ESX servers or within one ESX server. Copying is fast and secure and doesn’t require any configuration or setup.
  • Multiple ESX Management. The new version allows a user to work with several ESX servers at the same time within a single interface. All servers are displayed as a folder tree in the Windows Explorer-like UI. The user can easily navigate through the folder tree and switch from one server to another.
  • Complete File Management & Windows Integration. FastSCP allows a user to work with ESX servers just like one works with files and folders in Windows. FastSCP supports both Drag n’ Drop and Copy & Paste.


And if you have forgotten, its a FREE TOOL!

Veeam CEO Ratmir on the new version:

“In a short period of time since its first release in October, 2006 FastSCP has become a very popular tool among ESX administrators“- said Ratmir Timashev, Veeam Software president and CEO. “The new version is built on customer feedback, and brings the product to the next level with new functionality, scalability, security and ease-of-use.”

Veeam FastSCP doesn’t require any ESX server reconfiguration. It has a Windows Explorer-like user interface familiar to any Windows user. Any administrator can install FastSCP on his/her workstation and start copying files right away.




My advice: You have to have this tool in your toolkit as an ESX Administrator!

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op