Skip to main content

How to restore your VMware Virtual Machines

A simple guide on how you restore a Virtuall Machines to another VMware Server installation. Assuming you already installed a fresh VMware Server so you can move your Virtual Machines from the old server. 
  1. Copy the Virtual Machines folder from old VMware Server1 to VMware Server2 (new VMware Server install). Note. You should copy the Virtual Machines folder inside the VMware Server2 datastore folder. Normally Virtual Machines folder in your local drive.
  2. Login to your VMware Server2 management console
  3. In Summary, Commands, click on Add Virtual Machines to Inventory. It will shows your server existing VM datastore, and you should see the folders you copied from step 1.
  4. In Contents, select the Virtual Machines vmx file, and click OK.
  5. Click the Virtual Machines tab, to see if the Virtual Machines restore is completed.
  6. Select the Virtual Machines and click start. Wait to complete the process.
That's simple. 
Now start your Virtual Machine to see if the configuration and softwares are still working for you.

Error you might encounter when restoring a Virtual Machine to a new VMware Server.
Error: Cannot open the disk ... or one of the snapshot disks it depends on. Reason: Failed to lock the file.
Answer. If you did not shutdown the Virtual Machine properly check the lock files or folder *.lck extension and delete these.

Virtual Machine using Windows 64 bit computer can't restore in Windows 32 bit computer. You will be able to start the VM but you will get an error in your console something like this "Windows could not start because of a general computer hardware configuration problem. Attempting to load an x64 operating system, however this CPU is not compatible with x64 mode. Please install an x86 32-bit operating system." It makes sense, duh!

Can you install VMware Server in Windows 7? Answer is yes. I personally installed VMware Server to Windows 7 x32  and x64 for my test and development environment.

More questions, join me in http://forum.king.net message board.

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp