Terms of Use For FixedByVonnie

By proceeding to access fixedByVonnie.com, you expressly acknowledge, and agree to, all of the following:

fixedByVonnie.com is a personal website and blog owned by Security Plus Pro LLC, which is being presented for informational purposes only. The views on this website are solely those of the website owner (and not those of any employer or of any professional associations affiliated with the website owner).  Any views expressed in this website and any information presented on this website, or in any of its blog entries, should not be relied on for any purpose whatsoever other than as the personal opinions of the website owner.  The website owner expressly disclaims any and all liability for any information presented on this site.  The owner of this website and its blog posts shall not be held liable, and shall be held harmless, for any errors or omissions in any information or representations contained in this website, or in any of its blog entries.  The website owner also expressly disclaims any liability for the current or future availability of any such information. The website owner makes no representations as to the accuracy or completeness of any information on this website or which may be found by following any link on this website. The website owner shall not be held liable for any losses, injuries, damages, claims, or causes of action, from the display or use of any information on this website or in any of its blog entries. If you use the information on this website, or on any of its blog entries, you do so solely at your own risk.

Virtual Machines Archives - Page 2 of 4 - fixedByVonnie
Blog Archives

Welcome to Kali Linux (Part 2 of 3)

In the last guide, I gave you a sweeping overview of the powerful digital forensic toolset known as Kali Linux.  In this guide, I’m going to show you how to install Kali Linux in VirtualBox so you can have a test

Posted in Linux, Security Tagged with: , , , , ,

Welcome to Kali Linux (Part 1 of 3)

What’s your favorite hacker movie? Is it Iain Softley’s 1995 classic Hackers?  Or what about War Games or maybe you couldn’t get enough of Bruce Willis in Live Free or Die Hard? All these movies are great right?  They all tell

Posted in Linux, Security Tagged with: , , , , , , ,

How to connect your GNS3 lab to the internet in Mac OS X

Today I’m going to show you how to break GNS3 out of your virtual world into the real world of the internet. GNS3 is a great resource for anyone who needs access to live Cisco gear but doesn’t have the money

Posted in Desktops, Hardware, Laptops, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Connecting a VirtualBox machine to GNS3 in Mac OS X Yosemite

It’s one thing to have a brilliant virtual network of Cisco routers and switches but it’s another thing to integrate real host operating systems into the mix.  Wouldn’t it be nice if you could have a Windows virtual machine interacting

Posted in Apple, Mac OS X 10.10 Yosemite, Windows, Windows XP Tagged with: ,

Windows 10 build 10036 has leaked to the internet

I’ve been playing with Windows 10 build 10036 for several hours now and can confidently say that I love it. Since this is a pre-release leak, it’s a little buggy but I really like the trajectory where Microsoft is taking

Posted in Windows, Windows 10 Tagged with: , ,