There is a vulnerability out that lets malware jump out of the virtual machine onto the host machine.
See:
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=2000
~Jim~
Softricity has just released and sent me a new Whitepaper to distribute entitled:
The Softricity® Desktop™: Instant Desktop Refreshes with Minimal IT Resources
This white paper discusses how the Softricity Desktop application virtualization platform enables organizations
to streamline and accelerate desktop refreshes for everything from PC replacements and help desk support, to employee
relocations and disaster recovery.
I have made it available at:
http://www.thinhelp.com/dl_goto.asp?id=67
Also posted with other utilities in the Softricity downloads area at:
Jim Kenzig
Citrix is currently showing a demo of Project Tarpon a desktop streaming
Technology
uses isolation environment.
components downloaded in an application cace folder under program
files/citrix/aie ..if you clear the cache it.detects if components are
gone and reinstalls them.
Supports offline access!
Jim
with the pounding music of thevhouse band, and the 40 foot high definition
screen, Mark Templeton kicked off iForum 2005.
Citrix announced its 64 bit version of presentation server as well as a
set of tools coming for longhorn server called Project Constellation. More
on this later.
One of the biggest challenges today with building client applications is the infrastructure issues of deploying and managing applications. In both business and consumer scenarios, application developers are looking for a platform that makes it easier to deploy applications to the desktop and to upgrade them seamlessly. The uptake of Web-based applications has been to a great extent due to these benefits, but people are increasingly also looking for applications that more fully exploit the speed and interactivity of the local PC. For example, AJAX applications have attracted attention lately, but the difficulty in building and debugging such applications leaves developers continuing to search for a better solution.
Enter the "Express" Application, a model that builds on top of ClickOnce (introduced with Visual Studio 2005) and provides a safe security model for applications deployed to a local cache that offers much of the power of the Windows Presentation Foundation combined with a lightweight path for maintenance and upgrade of an application.
Express applications run in a security-constrained sandbox and are hosted in the browser, running in the Internet zone. They deploy silently to a machine without an interactive security prompt and are locally cached. This is in contrast to regular trusted applications that typically have full access to the machine, run outside a browser window, and are installed into a \Program Files directory rather than being cached.
Application designers should select the optimum model for their needs based on the depth of their integration with the underlying platform. Applications that need to take full advantage of the client system such as large storage, start menu presence, offline capability, and so on should be full-trust applications. An application where a more Web-like experience is desired may be a good candidate for the Express application model (for example, visualizations, data-driven apps, and interactivity where the data comes from the server). The following flowchart highlights the major model choices."
==========
That is some pretty interesting stuff. The last paragrah still sums it up..not all applications are going to be a good candidate for this. So you'll still need a full blown PC for these apps.
However it is this paragraph from above that the Thin Computing industry needs to start to take notice of:
"Express applications run in a security-constrained sandbox and are hosted in the browser, running in the Internet zone. They deploy silently to a machine without an interactive security prompt and are locally cached. This is in contrast to regular trusted applications that typically have full access to the machine, run outside a browser window, and are installed into a \Program Files directory rather than being cached. "
Sounds sort of like what Softricity is doing only in a browser..right?
I am not sure what sort of "FM" that Microsoft is doing here to accomplish this but if I was a programmer I certainly would be jumping on the bandwagon here as it certainly gets us closer to the panacea of the virtual desktop, I spoke about in an earlier post. What a great time to be alive.
~Jim~
Provision Networks Launches VIP Program for Terminal Server Community
Microsoft MVPs and Server-Based Computing Experts Join
September 7, 2005 In Washington, DC, at the Health Information Technology Summit (www.hitsummit.com), Provision Networks, the global provider of server-based access infrastructure solutions for the Microsoft (NASDAQ: MSFT) Windows Terminal Server platform, today announced that the launch of its VIP (Very Important Professional) program, embracing the members of the terminal server community and recognizing their efforts, past, present and future, for educating, supporting, and proliferating the use of server-based access technologies worldwide.
Provision Networks produces and markets the Provision Management Framework®. The Provision Management Framework, Enterprise Edition is a full-featured access infrastructure solution that leverages the Microsoft Windows Server 2003 platform, and delivers anywhere, anytime access to applications and network resources. Enterprise features such as Seamless Windows, Application Publishing, Load Balancing, Access Control, a Web Portal and an SSL Gateway embrace the RDP protocol and enhance the deployment, manageability, performance, and security of Terminal Services environments of all sizes.
The VIP program is a very important first step for us in reaching out to the technical community, embracing their efforts, supporting their goals, nurturing their needs, and most importantly, for recognizing their priceless contributions to the server-based computing industry as a whole, said John Brennan, Vice President of Corporate Strategy with Provision Networks.
The Provision Networks VIP program is a global recognition program for individuals who share both their practical technical expertise and experiences with their peers, said Jody Simpson, Vice President of Media and Investor Relations with Provision Networks. Ms. Simpson continued to say: We are happy to be part of the terminal server community, and are excited and proud to recognize the following world-class individuals:
Mr. Matthew Harris A Microsoft Terminal Server MVP, Matt has worked for an educational organization for a number of years as a network administrator.
Mr. Jim Kenzig CEO of The Kenzig Group and the pioneer of the server-based computing online forums, Jims website (http://www.thethin.net/) is one of the most highly visited resources on the Internet.
Mr. Thomas Koetzing Based in Germany, Thomas is a terminal services expert, and owner of the CITRIX4GE site (http://www.citrix4ge.de/), a source for support and advice regarding terminal services and related technologies.
Mr. Rick Mack Based in Australia, and working for Volante Systems, Rick is one of the foremost experts on terminal server technologies. Rick has been involved in the industry since its inception over twelve years ago.
Mr. Jeff Pitsch An expert in terminal services technologies and major contributor to the online forums, Jeff is also the owner of http://www.sbcgatekeeper.com/, a site dedicated to helping administrators secure their Terminal Servers.
Mr. Patrick Rouse A Microsoft Terminal Services MVP, Patrick is the owner of http://www.workthin.com/, a site dedicated to the terminal services industry, and is currently the IT manager for a medical practice in Southern California.
Dr. Bernhard Tritsch - A Microsoft Terminal Services MVP, author of several books on terminal services, and Chief System Architect at visionapp, GmbH in Germany, Benny also owns and manages http://www.wtstek.com/, an online resource for the server-based community.
Mr. Stefan Vermeulen Based in the Netherlands, and working for Cognos, Stefan has become an expert on terminal server printing, and launched an online resource for the subject: http://www.printingsupport.com/.
About Provision Networks
Provision Networks is a global provider of server-based access infrastructure provisioning, management, optimization and security. Provision Networks solutions embrace and extend the Citrix MetaFrame and Microsoft Terminal Services platforms, delivering resilient and scalable on-demand access for enterprises worldwide.
The Enterprise Edition of the Provision Management Framework® is designed to extend the native (RDP) functionality of Windows Terminal Services with important features such as Seamless Windows, Session-Sharing, Intelligent Load Balancing, Application Publishing, a Web-based interface, and an integrated SSL Gateway (RDP over SSL).
The Provision Management Framework, Standard Edition is a comprehensive access management solution designed to improve and enhance the provisioning, performance, manageability, and security of your Citrix access infrastructure.
In a single package, you get:
With a world-class client list, comprised of some of the worlds largest commercial enterprises, and government organizations, Provision Networks is the most trusted name in access infrastructure management, security, and optimization.
Many years ago when Server Based Computing was still in its infancy I had the opportunity to get to know a guy named Kevin Goodman. At that time he had been working for a company called SoftBlox and had helped write a cool set of utilities called Appscape that he wanted me to look at. One of the utilities was a way to disable the X close from an application. SoftBlox went by the wayside but I maintained (and still do) the utilities that they had me distribute free for them when they were sponsoring my site at http://thethin.net/appscape.zip. Incidentally if you now want to prevent users from clicking on the X and closing the RDP client take a look at this FAQ item I created at: http://thethin.net/faqs2.cfm?id=468&category=1 of an interesting way to do it.
Upon leaving SoftBlox, Kevin along with Bernd Harzog, approached me with a project he had been working on. He explained to me about the memory problems inherent with the loading of an applications dynamic link libraries (dlls) multiple times within the Terminal Services Environment. He had an idea of a utility to fix the problem and asked if I would help test it out and give him some feedback. We did a case study with the library I work for about our success of the product (http://www.rtosoft.com/documents/casestudies/CCPLCaseStudy.pdf ) and I became one of Kevins first customers. A few months later, Kevin started Kevsoft and named the product TScale, which was renamed RTOSoft Tscale a few years later, then Citrix purchased the technology to add to Citrix Presentation Server 4.0 and now the rest is history. Kevin is now the CEO, Founder, and VP of development of RTO Software.
What made me reminisce about this was Kevins recent Pod cast interview with Brian Madden. (http://www.brianmadden.com/content/content.asp?id=483) While listening to the interview Kevin mentioned the term rebasing of dlls, which is the magic that Tscale does and also mentioned several utilities, one of them being the Microsoft utility called Rebase.exe which piqued my curiosity. In the interview Kevin gives a very concise description of the rebasing technology behind Tscale and it really is worth giving it a listen.
In simple terms, the problem Tscale solves is one that is not exclusive to the Terminal Services environment but is exacerbated by it. When any windows application loads, it starts along with it, several dlls. These dlls are loaded into a fixed location in upper memory. The problem comes from when a user goes to load another application and that application wants to load its dlls into the same memory space as an application that you have already loaded. This results from either poor programming or multiple instances of the application running.
So what happens when you are running the SAME application multiple times as you do in the Terminal Server environment? The answer is that the dlls try to load over the top of each other and cause what is known as a race condition. It basically causes the CPU of the server to go nuts. The solution that Kevin found? Effectively rebase, or in effect move the dlls in real time to an open portion of memory. Thus Tscale was born.
If you are an application developer or tinkerer you can attempt to rebase your DLLs using the Microsoft Rebase.exe tool found in the Server 2003 SDK available for download at: http://www.microsoft.com/downloads/details.aspx?FamilyId=A55B6B43-E24F-4EA3-A93E-40C0EC4F68E5&displaylang=en More information about the rebase.exe tool can be found here on the Microsoft MSDN site: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/tools/tools/rebase.asp
However this material is not for the faint of heart and if you want to manage youre applications in the most efficient way via a graphical interface, buying TSCale is the best way that I know how to do it and requires a whole lot less work!
Jim Kenzig
Copyright 2005
I just wanted to tell and remind people that there are many scams going on via email and now many of them are involving the victims of Hurricane Katrina. One such scam even makes you think you are donating to the American Red Cross and attempts to steal your credit card numbers. There are also many telephone solicitation scams.
Please remember to be vigilant and not respond to these emails or cold calls. Your best way of donating is to send your money directly to the charitable organizations like the American Red Cross and the Salvation Army. These organizations offer you a receipt for your donation.
Please see the below article from todays New York Times for some further information.
~Jim~
September 8, 2005
After the Storm, the Swindlers
By
TOM ZELLER Jr.Even as millions of Americans rally to make donations to the victims of Hurricane Katrina, the Internet is brimming with swindles, come-ons and opportunistic pandering related to the relief effort in Louisiana, Mississippi and Alabama. And the frauds are more varied and more numerous than in past disasters, according to law enforcement officials and online watchdog groups.
Florida's attorney general has already filed a fraud lawsuit against a man who started one of the earliest networks of Web sites - katrinahelp.com, katrinadonations.com and others - that stated they were collecting donations for storm victims.
In Missouri, a much wider constellation of Internet sites - with names like parishdonations.com and katrinafamilies.com - displayed pictures of the flood-ravaged South and drove traffic to a single site, InternetDonations.org, a nonprofit entity with apparent links to white separatist groups.
The registrant of those Web sites was sued by the state of Missouri yesterday for violating state fund-raising law and for "omitting the material fact that the ultimate company behind the defendants' Web sites supports white supremacy."
Late yesterday afternoon, the Federal Bureau of Investigation put the number of Web sites claiming to deal in Katrina information and relief - some legitimate, others not - at "2,300 and rising." Dozens of suspicious sites claiming links to legitimate charities are being investigated by state and federal authorities. Also under investigation are e-mail spam campaigns using the hurricane as a hook to lure victims to reveal credit card numbers to thieves, as well as fake hurricane news sites and e-mail "updates" that carry malicious code aimed at hijacking a victim's computer.
"The numbers are still going up," said Dan Larkin, the chief of the Internet Crime Complaint Center operated by the F.B.I. in West Virginia. He said that the amount of suspicious, disaster-related Web activity was higher than the number of swindles seen online after last year's tsunami in Southeast Asia. "We've got a much higher volume of sites popping up," he said.
The earliest online frauds began to appear within hours of Katrina's passing. "It was so fast it was amazing," said Audri Lanford, co-director of
ScamBusters.org, an Internet clearinghouse for information on various forms of online fraud. "The most interesting thing is the scope," she said. "We do get a very good feel for the quantity of scams that are out there, and there's no question that this is huge compared to the tsunami."By the end of last week, Ms. Landford's group had logged dozens of Katrina-related swindles and spam schemes. The frauds ranged from opportunistic marketing (one spam message offered updates on the post-hurricane situation, with a link that led to a site peddling Viagra) to messages said to be from victims, or families of victims.
"This letter is in request for any help that you can give," reads one crude message that was widely distributed online. "My brother and his family have lost everything they have and come to live with me while they looks for a new job."
Several antivirus software companies have warned of e-mail "hurricane news updates" that lure users to Web sites capable of infecting computers with a virus that allows hackers to gain control of their machines. And numerous swindlers have seeded the Internet with e-mail "phishing" messages that say they are from real relief agencies, taking recipients to what appear to be legitimate Web sites, where credit card information is collected from unwitting victims who think they are donating to hurricane relief.
On Sunday, the Internet security company
Websense issued an alert regarding a phishing campaign that lured users to a Web site in Brazil that was made to look like a page operated by the Red Cross. Users who submitted their credit card numbers, expiration dates and personal identification numbers via the Web form were then redirected to the legitimate Red Cross Web site, making the ruse difficult to detect. The security company Sophos warned of a similar phishing campaign on Monday."They're tugging at people's heartstrings," said Tom Mazur, a spokesman for the United States Secret Service. Mr. Mazur said there were "a number of instances that we're looking into with this type of fraud, both domestically and overseas," but he would not provide specifics.
The lawsuit filed in Florida last Friday accused Robert E. Moneyhan, a 51-year-old resident of Yulee, Fla., of registering several Katrina-related domain names - including KatrinaHelp.com, KatrinaDonations.com, KatrinaRelief.com and KatrinaReliefFund.com - as early as Aug. 28, even before the hurricane had hit the Louisiana coast.
By Aug. 31, according to the Florida attorney general, Charles J. Crist Jr., Mr. Moneyhan's sites had begun asking visitors to "share your good fortune with Hurricane Katrina's victims." A "Donate" button then took payments through a PayPal account that Mr. Moneyhan had set up.
Mr. Moneyhan did not respond to numerous phone calls and e-mail messages, but the Web site names in question are now owned by ProjectCare.com, a loose collection of Web sites that is using the Katrina sites as an information center for hurricane victims.
Kevin Caruso, the proprietor of ProjectCare.com, said that he had offered to buy the sites from Mr. Moneyhan on Sept. 2, but that Mr. Moneyhan, distressed over the lawsuit, simply donated them to Project Care without charge. Mr. Caruso also said that after several phone conversations, he believed that Mr. Moneyhan, was "trying to help the Hurricane Katrina survivors, but did not have the experience to proceed properly."
The lawsuit, however, states that Mr. Moneyhan had tried to sell his collection of Katrina-related domain names on Sept. 1 "to the highest bidder." The suit seeks $10,000 in civil penalties and restitution for any consumers who might have donated to the Web sites while they were controlled by Mr. Moneyhan.
Jay Nixon, the Missouri attorney general, sued to shut one of the more bizarre fund-raising efforts yesterday. A state circuit court granted a temporary restraining order against Internet Donations Inc., the entity behind a dozen Web sites erected over the last several days purporting to collect donations for victims of Hurricane Katrina.
Also named in the Missouri suit, which seeks monetary penalties from the defendants, is the apparent operator of the donation sites, Frank Weltner, a St. Louis resident and radio talk show personality who operates a Web site called JewWatch.com.
That site - which indexes Adolf Hitler's writings, transcripts of anti-Semitic radio broadcasts and other materials, according to the Anti-Defamation League - attracted headlines last year when it appeared at or near the top of
Google search results for the query "Jew." It remains the No. 2 search result today.Most of Mr. Weltner's Katrina-related Web sites - which include KatrinaFamilies.com, Katrina-Donations.com, and NewOrleansCharities.com - appear to have been registered using DomainsByProxy.com, which masks the identity of a domain registrant.
However, Mr. Weltner's name appeared on public documents obtained through the Web site of the Missouri secretary of state yesterday. Those indicated that Mr. Weltner had incorporated Internet Donations as a nonprofit entity last Friday.
The various Web sites, which use similar imagery and slight variations on the same crude design, all point back to InternetDonations.org. There, visitors interested in donating to the Red Cross, Salvation Army or other relief organizations are told that "we can collect it for you in an easy one-stop location."
It is unclear whether any of the sites successfully drew funds from any donors, or if Mr. Weltner, who did not respond to e-mail messages and could not be reached by phone, had channeled any proceeds to the better-known charities named on his site. But the restraining order issued yesterday enjoins Mr. Weltner and Internet Donations Inc. from, among other things, charitable fund-raising in Missouri, and "concealing, suppressing or omitting" the fact that donations collected were intended "for white victims only."
"It's the lowest of the low when someone solicits funds" this way, Mr. Nixon said in an interview before announcing the lawsuit. "We don't want one more penny from well-meaning donors going through this hater."