Dual Monitor Won’t Enable on one Windows 7 machine but works on all other virtual desktops

I have something really odd here.  I have 10 Windows 7 Pro Virtual Desktops. All of them will work and enable dual monitors over PCoIP.   Doesn’t matter if it is a thin client, zero client or a PC with dual monitors.  They all work except for one Machine.  The machine not working is an exact duplicate of the other 9 virtual desktops and came from the same template.  It is a full virtual desktop like all the other ones.  This is on Horizon 6.1.1 with View Agent 6.2.2 running on all machines and same version of VMWare Tools.


From the same zero client I can log into one desktop and get dual screens and then from the same zero client I can log into the trouble virtual desktop and get one screen every time.


All vmware settings are the exactly same.  Allows 2 monitors, 3d is disabled and same amount of VRam.


I assume is is something in the Windows that doesn’t allow a second monitor but I can’t figure out what.  Anyone have any idea what I am missing?





Source: VMware

PowerGUI Gone – now what?

I looked and it seems Dell has removed PowerGUI from their download page and I don’t see it anywhere else.


I needed that to be able to get a vsphere object, put it into the object inspector, and then drill down and figure out how to call the properties on something like a VM that are hidden deep in the extension data.


What is the best tool to replace PowerGUI That allows me to do this?  Can’t do it with the PowerShell ISE last I checked…



Source: VMware

vCenter 6 server appliance and UCS manager plugin

Hi, has anyone successfully running the Cisco UCS plugin with vcenter server appliance 6?


I’ve used the Cisco plugin registration tool and tried plugin version 1.2.2 and 1.2.5. Still can’t get it to show in web client. The tool says it  was successful , the event logs show successful registration of the plugin, yet i don’t see the plugin at all. I’ve restarted the server multiple times so that cant be it. I’m thinking it doesn’t work with vcenter server appliance?

Source: VMware

If You Are a Victim of Identity Theft

This post was originally published on this site

Report any identity theft immediately by following these steps:Contact the three major credit bureaus and have them place a fraud alert on your credit report.If a credit card was involved, contact the credit card company and have a new credit card with a new number issued.Contact your local law enforcement agency and file a report.File a complaint with the Federal Trade Commission.Document all conversations so you know whom you spoke to and when.

TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

This post was originally published on this site

Original release date: December 01, 2016 | Last revised: December 02, 2016

Systems Affected

Microsoft Windows


“Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI), is releasing this Technical Alert to provide further information about Avalanche.


Cyber criminals utilized Avalanche botnet infrastructure to host and distribute a variety of malware variants to victims, including the targeting of over 40 major financial institutions. Victims may have had their sensitive personal information stolen (e.g., user account credentials). Victims’ compromised systems may also have been used to conduct other malicious activity, such as launching denial-of-service (DoS) attacks or distributing malware variants to other victims’ computers.

In addition, Avalanche infrastructure was used to run money mule schemes where criminals recruited people to commit fraud involving transporting and laundering stolen money or merchandise.

Avalanche used fast-flux DNS, a technique to hide the criminal servers, behind a constantly changing network of compromised systems acting as proxies.

The following malware families were hosted on the infrastructure:

  • Windows-encryption Trojan horse (WVT) (aka Matsnu, Injector,Rannoh,Ransomlock.P)
  • URLzone (aka Bebloh)
  • Citadel
  • VM-ZeuS (aka KINS)
  • Bugat (aka Feodo, Geodo, Cridex, Dridex, Emotet)
  • newGOZ (aka GameOverZeuS)
  • Tinba (aka TinyBanker)
  • Nymaim/GozNym
  • Vawtrak (aka Neverquest)
  • Marcher
  • Pandabanker
  • Ranbyus
  • Smart App
  • TeslaCrypt
  • Trusteer App
  • Xswkit

Avalanche was also used as a fast flux botnet which provides communication infrastructure for other botnets, including the following:        

  • TeslaCrypt
  • Nymaim
  • Corebot
  • GetTiny
  • Matsnu
  • Rovnix
  • Urlzone
  • QakBot (aka Qbot, PinkSlip Bot)


A system infected with Avalanche-associated malware may be subject to malicious activity including the theft of user credentials and other sensitive data, such as banking and credit card information. Some of the malware had the capability to encrypt user files and demand a ransom be paid by the victim to regain access to those files. In addition, the malware may have allowed criminals unauthorized remote access to the infected computer. Infected systems could have been used to conduct distributed denial-of-service (DDoS) attacks.


Users are advised to take the following actions to remediate malware infections associated with Avalanche:

  • Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. Even though parts of Avalanche are designed to evade detection, security companies are continuously updating their software to counter these advanced threats. Therefore, it is important to keep your anti-virus software up-to-date. If you suspect you may be a victim of an Avalanche malware, update your anti-virus software definitions and run a full-system scan. (See Understanding Anti-Virus Software for more information.)
  • Avoid clicking links in email – Attackers have become very skilled at making phishing emails look legitimate. Users should ensure the link is legitimate by typing the link into a new browser (see Avoiding Social Engineering and Phishing Attacks for more information).
  • Change your passwords – Your original passwords may have been compromised during the infection, so you should change them. (See Choosing and Protecting Passwords for more information.)
  • Keep your operating system and application software up-to-date – Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. You should enable automatic updates of the operating system if this option is available. (See Understanding Patches for more information.)
  • Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool. A non-exhaustive list of examples is provided below. The U.S. Government does not endorse or support any particular product or vendor.

          ESET Online Scanner




          McAfee Stinger


          Microsoft Safety Scanner


          Norton Power Eraser


         Trend Micro HouseCall



Revision History

  • December 1, 2016: Initial release
  • December 2, 2016: Added TrendMicro Scanner

This product is provided subject to this Notification and this Privacy & Use policy.