Because it’s about time I did it. Sorry people with browsers that still don’t support SNI (not that they can read this), but it’s time to move forward.
I am now officially a VMware Certified Professional on vSphere 5 (and 4 and 3), so yay for that and everything.
As of this morning, I am officially a Microsoft Certified IT Professional: Enterprise Administrator, which is much less impressive than it sounds. It’s basically just the 2008/2008 R2 equivalent of the MCSE, but I guess Microsoft got bored of people referring to it as “Must Consult Somebody Else” and so decided to change the name.
Why so late to the party? Well under normal circumstances I wouldn’t go out of my way to get Microsoft qualifications, but my current employer offered to pay for the exams so it seemed silly not to and I actually learned some stuff about NAP that I didn’t already know (And some stuff about RRAS that I didn’t want to).
Now to start work on my VCAP
A potential vulnerability has been found in Safeguard Enterprise 5.x and SafeGuard Easy 5.5x and Sophos Disk Encryption v 5.5x that could allow an informed attacker, under specific circumstances, to reuse outdated or invalidated credentials for locally accessing an endpoint computer.
This affects all versions of Safeguard Enterprise that I’m aware of, though patches are only available back to 5.35.0 so if you’re still running 5.30.x or (God help you) 5.21, then you’re out of luck unless you upgrade. As it is apparently difficult to identify machines that may be vulnerable, Sophos are recommending that you update all of your endpoints ASAP to be on the safe side.