Welcome back to another episode of Hancock’s VMware Half Hour! In this video, we take you step-by-step through updating the UEFI BIOS on the Minisforum MS-A2, upgrading from version 1.0.1 to 1.0.2 – all from a very hot #homelab (35°C!).
We walk through downloading the BIOS update, prepping the system (disabling Secure Boot), launching the UEFI shell, and flashing the firmware using EfiFlash.nsh. There’s even a little pop culture nod to Toto and The Wizard of Oz ??, plus a shout-out to VMware vExperts like Daniel Kreiger, William Lam, and Stephen Wagner!
Chapters Included:
Setting up the MS-A2 for flashing
Booting into the UEFI Shell
Running the flash process
Successfully installing BIOS 1.0.2
VMware vExpert tips and how to apply
Post-update validation
Whether you’re a fellow VMware homelabber or just updating your own MS-A2 device, this guide will walk you through it with humour, precision, and heat-induced delirium.
Don’t forget to Like, Subscribe and Share if this helped you out!
If you’ve followed Andysworld.org for any length of time, you’ll know I’m always on the lookout for compact, powerful systems that pack a serious punch — especially for virtualization, homelab testing, and edge computing. The Minisforum MS-A2 just landed on my desk, and I couldn’t wait to tear into it, max out the RAM, and see how this tiny monster performs.
Why the Minisforum MS-A2?
Minisforum has carved out a strong niche in the mini PC market, but the MS-A2 is something different. Designed around the AMD Ryzen 9 9955HX (a 16-core, 32-thread beast), this unit is built for power users: developers, sysadmins, content creators, and homelab enthusiasts like myself.
The MS-A2 offers:
AMD Ryzen 9 9955HX (Zen 4, 5nm, 16C/32T)
Up to 128GB DDR5 SODIMM RAM
Quadruple PCIe Gen4 NVMe M.2 slots
Dual 2.5G Ethernet, Dual 10G SFP+
USB 4.0 / HDMI 2.1 / USB-C
Compact footprint with surprisingly good thermals
With specs like that, it’s an ideal candidate for running Proxmox, VMware ESXi, KVM, or even just as a hyper-efficient workstation.
The Unboxing Experience
Right out of the box, the MS-A2 gives off a premium vibe. The packaging is minimalist but well thought out. Inside you’ll find:
The MS-A2 unit itself (dense, solid, well-built)
120W or 180W power adapter (depending on config)
Mounting hardware
User manual and warranty information
Ports are plentiful and logically laid out. It even includes USB 4.0 and dual LAN ports — a must for virtualized networking setups in a homelab.
Installing 128GB DDR5 RAM
This is where things get exciting.
The MS-A2 officially supports up to 128GB of DDR5 SODIMM RAM (2x 64GB modules). While 64GB used to be the ceiling for mini PCs, the MS-A2 pushes those boundaries.
Here’s how I installed the RAM:
Power Down and Open the Chassis: Remove the bottom screws (Torx) and gently lift the cover. The internals are neatly laid out.
Locate the SODIMM Slots: There are two DDR5 SODIMM slots accessible without needing to remove any other components.
Install 2x 64GB DDR5 4800MHz Modules: I used Kingston DDR5 SODIMMs — click, click, done.
Reassemble and Boot: Replace the cover, screw it down, plug it in, and power on.
Check BIOS/UEFI: The system immediately recognised the full 128GB RAM without issue.
Initial Impressions & Performance Potential
I haven’t fully benchmarked it yet, but early signs are strong. This thing is built for virtualization and power-intensive workflows. With 128GB RAM, you could comfortably run:
Nested vSphere or ESXi environments
A full Proxmox VE cluster in one box
Multiple Linux and Windows VMs for testing
Container platforms like Docker, Podman, or Kubernetes
The dual 2.5G NICs are ideal for setting up a virtualized network or using VLANs for isolated testing.
Thermals remained under control during initial tests, thanks to the robust cooling design. The unit is quieter than expected even under moderate load.
Who Is the MS-A2 For?
If you’re:
A homelab enthusiast looking to consolidate noisy, aging servers
A virtualization geek building a portable test lab
A developer or DevOps engineer running VMs or containers
Or just someone wanting a high-end mini PC that doesn’t take up half a desk…
…the MS-A2 is absolutely worth your consideration.
What’s Next?
In the next blog post, I’ll benchmark this machine with:
Proxmox VE running multiple VMs
VMware ESXi 8.0 (yes, it installs!)
Synthetic CPU, disk, and memory benchmarks
Power draw and thermal tests
And maybe even try some GPU passthrough.
Final Thoughts
The Minisforum MS-A2 is a seriously impressive piece of kit. It proves that small doesn’t have to mean slow or limited. With 128GB DDR5 RAM, Ryzen 9 power, and robust I/O, it’s more than capable of replacing a rackmount server for many use cases — and it’ll fit in your backpack.
Stay tuned for more testing, benchmarks, and homelab setup tips.
Are you tired of dealing with the Raspberry Pi 5 frame buffer issue when running ESXi ARM? In this video, we’ll show you a step-by-step guide on how to fix this frustrating problem and get your Raspberry Pi 5 up and running smoothly with ESXi ARM. Whether you’re a hobbyist or a professional, this tutorial is perfect for anyone looking to troubleshoot and resolve the frame buffer issue on their Raspberry Pi 5. So, what are you waiting for? Let’s dive in and get started!
Hey everyone — welcome back to Andysworld!, where there’s always something bubbling in the pot (usually tech-flavoured, sometimes coffee, sometimes bees).
500 Hacks a Day — Mission Accomplished!
After a consistent streak of daily pwnage, I’ve finally hit 500 hacks a day on TryHackMe! It’s been an epic ride, sharpening my skills and staying sharp in the ever-evolving world of cybersecurity. But… that’s it for now. As much as I’ve loved the challenge, life’s too hectic to keep up the daily grind — and honestly, it’s time to re-balance.
If you’ve not tuned into Hancock’s VMware Half Hour yet, what are you doing? ? The YouTube channel is keeping me plenty busy — but it’s worth every minute. From real-world scenarios to community spotlights and the latest from the VMwareverse, it’s been great to share stories, learn, and laugh with fellow techies around the world.
Catch the next episode if you haven’t already — things are just heating up.
vExpert PRO – 5 Years Strong!
Big news landed this month — I’m proud (and humbled) to announce that I’ve been recognised as a VMware vExpert PRO for the fifth year running. Not only that, but I’ve also picked up the vExpert VCF badge, too!
This recognition means a lot — it’s not just about titles; it’s about community, contribution, and passion. The vExpert family has been a huge part of my journey, and it’s an honour to continue helping others grow and succeed in the ecosystem.
and that’s not forget the Bees !
Beekeeping at Meltonby Honey
Bees are a mixed bag this is to say, some are doing really well, and some are not doing so well, so this month of June, in the June Gap – need to start sorting out and selecting hives to work this Summer, and dare I say it starting Winter preparations, and a week today attend a Bee Health Day, sponsored by DEFRA !
That’s it for now — life’s buzzing, tech is flying, and the blog never sleeps (even if I do). Thanks to everyone who’s been along for the ride so far.
Until next time — stay curious, stay hacking, and don’t forget to say “What’s Occurin’?” ?
If you’ve been following me for a while — either here on Andysworld! or on social — you’ll probably have noticed I’ve got a bit of a thing for TryHackMe. That’s right: the gamified, hands-on cybersecurity platform that lets you “learn hacking the fun way.”
While I’ve worn many hats over the years — from building corporate desktops in the 90s to deploying Thin Clients, backing VMware before it was cool, and even keeping bees in my spare time — I’ve always had a quiet curiosity for cybersecurity.
But in recent years, that curiosity has turned into something more structured. I’ve been diving head-first into daily challenges, CTFs, and red team/blue team rooms on TryHackMe. Every day I log in and test my “hacking” and “penetration” skills. (Legally, of course. Let’s not get too excited.)
Why TryHackMe?
Simple: it’s accessible, addictive, and just plain fun. The platform breaks down complicated security concepts into digestible learning paths and real-world scenarios. Whether you’re into Linux fundamentals, web app hacking, or breaking into Windows environments, there’s something for everyone — and something new to learn every day.
I started with a few easy rooms — some were fun, some had me questioning my life choices — but before long I found myself chasing streaks, solving buffer overflows, exploiting SQL injections, and pivoting through internal networks like it was second nature. It’s part puzzle, part education, and part thrill.
That Daily Streak… and the Climb
I’ll admit it: I got hooked on the daily streak. There’s something about seeing that little flame icon next to your
name that sparks a sense of achievement. Each day I carve out time to complete at least one room, even if it’s a short task or a simple walkthrough. And in doing so, I’ve kept my streak alive and sharpened my skills without ever feeling like it’s a chore.
And here’s the kicker — recently, after being ranked #1,060 out of over 3 million TryHackMe users, I finally cracked the four-digit barrier and rose to #998! Top 1,000 in the world. Not bad for a “beekeeper with a hacking habit,” eh?
Oh — and right now, I’m sitting on a 461-day hacking streak. That’s right. 461 consecutive days of training, solving, cracking, and learning. I’m not far off the 500-day HackStreak badge, and believe me — I will get there. It’s part stubbornness, part obsession, but mostly just a whole lot of fun.
What’s Next?
Honestly, I’d love to get into some deeper reverse engineering, exploit development, and maybe even take on some of the harder red team labs. And who knows — maybe I’ll finally take a proper cert (OffSec, I’m looking at you) just to prove to myself I can.
TryHackMe has rekindled my passion for hands-on learning, just like Experts Exchange did in the early days. It’s reminded me that whether you’re troubleshooting snapshots, spinning up ESXi hosts, or brute-forcing a login page, there’s always more to learn.
Whether you’re an old-school sysadmin like me, a student just starting out, or someone who’s just curious about hacking without getting arrested — I highly recommend giving TryHackMe a spin.
And if you’re already in the game — drop me a message. I’ll see you on the leaderboard ?
Want me to whip up a graphic showing your current rank and streak progress? I can give it that polished blog badge feel.
After much anticipation, The ComputeBlade has finally arrived! This innovative piece of hardware has been making waves in the compact computing and homelab community since its inception as a Kickstarter project, which closed in February 2023. While the Kickstarter campaign was highly successful, the journey to delivery has been anything but smooth.
The ComputeBlade Journey
For those unfamiliar, the ComputeBlade is an ambitious project by Uptime Lab designed to bring powerful, modular computing to a compact blade-style chassis. It offers support for Raspberry Pi Compute Modules (CM4) and similar SBCs, providing a platform for homelab enthusiasts, developers, and small-scale edge computing setups.
However, the project has faced several setbacks that delayed delivery for many backers:
Russian Screws: Supply chain disruptions included sourcing specific screws, which became problematic due to geopolitical tensions.
PoE (Power over Ethernet) Issues: The team encountered complications ensuring consistent and safe PoE functionality.
Certification Challenges: Meeting various regulatory standards across regions added another layer of complexity.
Despite these hurdles, I opted to purchase my ComputeBlades retail, as Kickstarter backers have yet to fully receive their units.
For those interested in the Kickstarter campaign details, you can check it out here.
First Impressions
The retail packaging was sleek, compact, and felt premium. The ComputeBlade itself is a marvel of design, seamlessly blending form and function. Its modularity and expandability immediately stand out, with features such as:
Support for Raspberry Pi CM4: Making it a natural fit for virtualization, containerization, and other development projects.
Hot-Swappable Design: Simplifies maintenance and upgrades.
Integrated Networking: Includes options for advanced network setups, perfect for a homelab.
What’s Next?
Now that the ComputeBlade has arrived, I’m eager to put it through its paces. Over the next few weeks, I’ll be:
Testing Homelab Applications: From running lightweight virtual machines to hosting containers using Docker or Kubernetes.
Evaluating Networking Features: Especially the PoE capabilities and how it handles edge computing scenarios.
Sharing Configurations: I’ll document how I integrate it into my existing homelab setup.
Closing Thoughts
While the journey of the ComputeBlade from Kickstarter to retail has been rocky, the product itself seems poised to live up to its promise. If you’ve been waiting for a scalable and compact compute platform, the ComputeBlade might just be the solution you’ve been looking for.
Stay tuned for my follow-up posts where I dive deeper into its performance and practical applications. If you’re also experimenting with the ComputeBlade, feel free to share your experiences in the comments or reach out via social media.
As an avid enthusiast of VMware’s innovations, I’m diving headfirst into the ESXi ARM Fling v2.0, which is built on the robust VMware vSphere Hypervisor ESXi 8.0.3b codebase. The ARM architecture has always intrigued me, and with this latest version, VMware has pushed the boundaries of what’s possible with ESXi on ARM devices. It’s a playground full of potential for anyone experimenting with lightweight, power-efficient infrastructures.
The Turing Pi Journey
After much anticipation, my Turing Pi Mini ITX boards have arrived! These boards are compatible with the Raspberry Pi Compute Module 4, offering a modular, scalable setup perfect for ARM experimentation. With a few Compute Module 4s ready to go, I’m eager to bring this setup to life. However, finding a suitable case for the Turing Pi board has proven to be a bit of a challenge.
Case Conundrum
While Turing Pi has announced an official ITX case for their boards, it’s currently on preorder and comes with a hefty price tag. For now, I’ve decided to go with a practical and versatile option: the Streamcom Mini ITX OpenBench case. Its open-frame design is functional, and it’ll keep the board accessible during testing and configuration.
I’m also considering crafting my own custom case. Using laser-cut wood or acrylic is an appealing option, offering the opportunity to create something unique and tailored to my specific requirements. But for now, the OpenBench case will do nicely as I explore the ESXi ARM Fling.
Why ESXi ARM Fling v2.0?
The ESXi ARM Fling project is an exciting venture for anyone who loves to experiment with virtualization. Running ESXi on ARM hardware offers several advantages:
Energy efficiency: ARM boards consume far less power compared to traditional x86 systems.
Cost-effectiveness: Affordable hardware like the Raspberry Pi Compute Module 4 makes it accessible to a wider audience.
Flexibility: The compact form factor of ARM devices is ideal for edge computing, IoT, or even small-scale home labs.
The v2.0 update introduces enhanced support, better performance, and bug fixes, making it an excellent choice for exploring the ARM ecosystem.
What’s Next?
With the hardware in hand and the ESXi ARM Fling v2.0 ready to install, I’m planning to dive into:
Setting up and configuring the Turing Pi board with ESXi.
Testing the system’s stability, performance, and scalability using multiple Raspberry Pi Compute Modules.
Exploring practical use cases, such as lightweight Kubernetes clusters or edge computing applications.
I’ll share updates on the build process, challenges, and performance insights in future posts. For now, I’m excited to get started and see what this setup can achieve.
Stay tuned for more! If you’ve experimented with the ESXi ARM Fling or have tips for working with the Turing Pi board, I’d love to hear from you.
In this video presentation which is part of the Hancock’s VMware Half Hour I will show you HOW TO: Fix Synchronous Exception at 0x00000000XXXXXXX on VMware vSphere Hypervisor 7.0 (ESXi 7.0 ARM) on a Raspberry Pi 4.
It has been well documented that the Raspberry Pi 4 UEFI Firmware Image can cause this fault which renders the UEFI boot image corrupt. See here https://github.com/pftf/RPi4/issues/97
The UEFI firmware imaged used in the lab in this video is v1.37, it is debated as too whether this has been fixed in later releases v1.37, some suggest rolling back to v1.33 !
For the sake of continuity I’ve included previous EE Videos and Articles I’ve created here
In this video I’m going to show you HOW TO: Update the VMware vSphere Hypervisor 7.0 ARM Edition (ESXi 7.0 ARM edition) from v1.12 Build 7.0.0-1.12.21447677to v1.15 Build 22949429 on a Raspberry Pi 4, the method used is based on this article and video
The Sychronous Excepetion at 0x0000000037101434 in the UEFI BOOT Firmware v1.34 is still an issue today, which has not been fixed. These are messages received on Twitter from the Engineers which have worked on ESXi ARM. v1.35 is the latest UEFI firmware available from here
Andrei Warkentin (@WhatAintInside)
“yeah this is a long-standing SD card corruption bug ????… never quite identified, maybe some command needs ti be done on the way out to flush internal card buffers before the loss of power?”
Cyprien Laplace (@cypou)
I think you only need to replace the “RPI_EFI.fd” file from the boot partition. I forgot this bug existed, as all my Pis download the UEFI files using tftp.
(thus no corruption possible, but no change can be saved either)
In this video presentation which is part of the Hancock’s VMware Half Hour HOW TO Video Series I will show you HOW TO: Perform storage performance tests on VMware vSphere vSAN, using the VMware Hyper-converged Infrastructure Benchmark fling (HCIBench).
HCIBench is a storage performance testing automation tool that simplifies and accelerates customer Proof of Concept (POC) performance testing in a consistent and controlled way. VMware vSAN Community Forum provides support for HCIBench.
The storage devices we are using in this video are the Intel® Optane™ SSD DC P4800X Series 375GB, 2.5in PCIe x4, 3D XPoint™, but this procedure can be use to add any compatible storage devices in ESXi to a vSAN datastore.
This video follows on from the follow video in this series
If you are creating a design for VMware vSphere vSAN for a Production environment, please ensure you read the VMware Cloud Foundation Design Guide 01 JUN 2023 – this should be regarded as The Bible!