Home Tags Guests

Tag: guests

Like podcasts? Here are some of our favorite space listens

At Ars, we love podcasts. And we love space.
So we definitely love space podcasts.

Qubes kicks Xen while it’s down after finding ‘fatal, reliably exploitable’...

You left the stable door open? AGAIN? C'mon guys, keep those guests locked up Qubes is once again regretting how long it's taken to abandon Xen's PV hypervisor, disclosing another three bugs including host escape vulnerabilities.…

IDG Contributor Network: Google Home can now recognize voices. What does...

Google has added support for up to six users to its virtual assistant device, Google Home.

That’s a huge leap in the world of machine learning and artificial intelligence.
It solves many problems related to voice-activated virtual assistants, while also creating some serious privacy concerns.I have three Gmail users in my house who all access the same Google Home device, which is linked to my account.
It’s used for playing music, watching videos through Nvidia Shield, helping with recipes, asking questions, checking appointments, and other such tasks.Here’s the problem: I hate it. My Google search history and YouTube playlists are all messed up.
It’s full of queries by my wife, guests, kids, and our au pair. My private appointments are accessible to anyone who can ask for them.

Anyone can activate my Google Home device by yelling from outside the window and taking control of connected devices like oven, lights, and door lock (I was smart enough to not install smart locks). Worst of all, Google is not learning anything about me as it’s being used by everyone.To read this article in full or to leave a comment, please click here

Panasonic showcases the future of business innovation

Panasonic Business has created a showcase of its future technology at the Manufacturing Technology Centre (MTC) in Coventry, with many of the systems on show in Europe for the first time.
In response to recent market listening activities Panasonic invited over 100 guests, representing some of Europe’s biggest companies, to see first-hand a showcase of almost 50 different innovative technologies.This followed a number of strategic initiatives which saw Panasonic engage with the market to identify... Source: RealWire

Malmaison Hotel du Vin keeps guests connected with unlimited WiFi

London, 13th March 2017: Malmaison Hotel du Vin, the leading lifestyle hotel brands, announce significant investment into upgrading its wireless network infrastructure.

To manage the upgrade, the group has enlisted the services of Airangel. One of the UK’s leading enterprise guest WiFi solutions firms, it provides safe and secure WiFi that is easy to deploy, simple to manage and allows guests to get online quickly with the minimum amount of effort.

The investment reinforces the... Source: RealWire

How to not do presidential opsec: Crisis management over dinner in...

Trump's response to N. Korea missile was posted on Facebook by Mar-a-Lago guests.

Ransomware avalanche at Alpine hotel puts room keycards on ice

If at first you succeed, try, try again, think extortionists A top Austrian hotel coughed up thousands in ransom to cybercrooks, who hacked its computer system and locked guests out of their rooms until the money was paid.…

Big Blue’s BigInsights has big-ish bugs

Guests gain XSSive privileges in IBM's Hadoopery IBM has patched twin cross-site scripting (XSS) vulnerabilities in its Hadoop-probing InfoSphere BigInsights platform.…

RHBA-2017:0115-2: qemu-kvm-rhev bug fix update

Updated qemu-kvm-rhev packages that fix several bugs are now available for RedHat Virtualization Hypervisor 7. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems.

The qemu-kvm-rhev packages prov...

Hackers Target Sundance Film Festival

Local and online box offices were temporarily knocked offline Saturday.

America's largest independent film festival became the target of a cyber attack over the weekend.

The Sundance Film Festival kicked off Friday in Park City, Utah, with movie premieres, midnight showings, and a network failure.

"Sundance Film Festival has been subject to a cyberattack, causing network outages that have shut down our box office," a spokesman told Variety, adding that "all screenings will still take place as planned."

The official Twitter account on Saturday promised that "our team is working hard to get our systems back up [as soon as possible]." Within an hour, the Salt Lake City and Gateway box offices were "back up and running," and online ticketing for future shows was quickly restored.

Update: The Salt Lake City Box Office is back up and running. #SLC #Sundance

— SundanceFilmFestival (@sundancefest) January 21, 2017

Update: Online ticketing for future shows is back up. #Sundance

— SundanceFilmFestival (@sundancefest) January 21, 2017

Update: The Festival Box Office at Gateway in #ParkCity is now up and running. #Sundance

— SundanceFilmFestival (@sundancefest) January 21, 2017

"Our artist's [sic] voices will be heard and the show will go on," the organizers tweeted.

The hack, according to Variety, occurred around noon MT (2 p.m. ET)—shortly after comedian Chelsea Handler led a Women's March in Park City in protest of Donald Trump. It was also the same day as several big premieres, including films about war, terrorism, Chinese dissonance, doping in sports, and race and class in America.

It remains unclear whether the incidents were related, or how many Festival guests were affected by the box office interruptions. The Sundance Institute did not immediately respond to PCMag's request for comment.

This month's showcase includes the premiere of Dear Angelica, the first animated experience created entirely in virtual reality, according to Oculus, whose in-house Story Studio produced the movie—available for Rift owners to download from the Oculus app store.

RHBA-2017:0071-1: qemu-kvm bug fix update

Updated qemu-kvm packages that fix two bugs are now available for Red HatEnterprise Linux 7. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-spacecomponent for running virtual machines using KVM.This update fixes the following bugs:* Previously, Red Hat Enterprise Linux 5.11 guests failed to shut down, andstopped at the "system halted" status. A patch has been applied to fix this bug,and Red Hat Enterprise Linux 5.11 guests shut down as expected. (BZ#1392027)* Previously, using the qemu-kvm system_reset utility when no space was left onon the host caused the qemu-kvm service to terminate with a segmentation fault.The underlying source code has been modified to fix this bug. As a result, theqemu-kvm process stays active, and guest systems can be reset without an error.(BZ#1393042)Users of qemu-kvm are advised to upgrade to these updated packages, which fixthese bugs. After installing this update, shut down all running virtualmachines. Once all virtual machines have shut down, start them again for thisupdate to take effect. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   Red Hat Enterprise Linux Server (v. 7) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   PPC: qemu-img-1.5.3-126.el7_3.1.ppc64.rpmFile outdated by:  RHSA-2017:0083     MD5: d464baa9ee046b6c5d9e8d4aed4a7ddfSHA-256: 54816ab4ab5df9b5e6e50f4e99fc6a21f49706f3fe6cd0392bfc541d416afa95 qemu-kvm-debuginfo-1.5.3-126.el7_3.1.ppc64.rpmFile outdated by:  RHSA-2017:0083     MD5: dba1c8f2f0c9378ec056d8003d0f135bSHA-256: fda38f948a9a0859d1c205eb9963989df12766d205c546ac22e38701a1d930cb   PPC64LE: qemu-img-1.5.3-126.el7_3.1.ppc64le.rpmFile outdated by:  RHSA-2017:0083     MD5: 6ea2e38bcf6b05c2a0505ec2abe8aea3SHA-256: 835afd80efecb6d78c13a3a2f15ef6ae7a325a2a05dee9e5fa2105e2c4aa250b qemu-kvm-debuginfo-1.5.3-126.el7_3.1.ppc64le.rpmFile outdated by:  RHSA-2017:0083     MD5: cd307d65d1c92d3eec94a790cf9f20c8SHA-256: 5f15dd8d762e579f922d8cd348bdb956d2554772814a700aa27ef55dcdfdc0c8   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   (The unlinked packages above are only available from the Red Hat Network) 1392027 - shutdown rhel 5.11 guest failed and stop at "system halted"1393042 - system_reset should clear pending request for error (IDE) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2017:0027-1: openvswitch bug fix update

Attention: RHN Hosted will reach the end of its service life on July 31, 2017.Customers will be required to migrate existing systems to Red Hat Subscription Management prior to this date.Learn more here Details An updated openvswitch package that fixes multiple bugs is now available. Open vSwitch provides standard network bridging functions andsupport for the OpenFlow protocol for remote per-flow control oftraffic.Bugs fixed in these updated packages include:* Do not wake up when there is no db connection (#1397504)* Use instant sending instead of queue (#1397481)* DPDK vhost: workaround stale vring base (#1397196)* Do not restart the service after a package upgrade (#1397045)* Fixed to not require SSSE3 if DPDK is not used (#1397048)* Applied the systemd backports (#1397049)* Fixed missing close calls for tnl ports (#1397050) Solution Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258 Updated packages Red Hat Virtualization ( v.4 for RHEL 7) SRPMS: openvswitch-2.5.0-22.git20160727.el7fdp.src.rpm     MD5: dec02656d4e107cafea152a2206c4aa5SHA-256: d7913545abcc2f0102a42467376d3530894730f5d22aa2c8b5b72582364e094f   x86_64: openvswitch-2.5.0-22.git20160727.el7fdp.x86_64.rpm     MD5: 26b4b86cbac2f8cd4d0afc4952b1a173SHA-256: 5bf8e3e1f1609c89baa10deb1a6de1df2ef03d5e8c7204f3133d676bf3d02034 openvswitch-devel-2.5.0-22.git20160727.el7fdp.x86_64.rpm     MD5: c1d458d0173bde202fa5edcfb6085df4SHA-256: a7c354bb99fbf51587f1c751ec400eeca328fe9812e231fd4db3643d0b625432 openvswitch-test-2.5.0-22.git20160727.el7fdp.noarch.rpm     MD5: a3b45a1d3453c76d20d2f61651a8abeaSHA-256: 4376df2ffdaf5428349794f9e47a216fa6f53faca9741b2d32f781d9c81d054f python-openvswitch-2.5.0-22.git20160727.el7fdp.noarch.rpm     MD5: 081ef358ea78d23a1f4fa05749a1933bSHA-256: ec9e8d713bfd00fba83655de348c63417c2f85c53984196e2fe93f612d4bf00e   (The unlinked packages above are only available from the Red Hat Network) Bugs fixed (see bugzilla for more information) 1397045 - [fdProd] yum update of openvswitch 2.5 from 2.4 causes restart of openvswitch service that can disrupt network connectivity1397048 - [fdProd] OVS fails if SSSE3 is not supported1397049 - [fdProd] [OVS] systemd ordering of OVS service causes hang during restart when there is NFS mount over OVS1397050 - [fdProd] OvS rtnetlink race condition1397196 - [fdProd] OVS daemon crashed when guests running pktgen over OVS-dpdk bond1397481 - [fdProd] latency regression1397504 - [fdProd] ovs-vswitchd takes 100% CPU time These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:https://www.redhat.com/security/team/key/#package The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/