Posts Tagged ‘linux’

Part 5: DIY UNRAID NAS: Making Use of the Free Internal USB Headers

Sunday, November 30th, 2025

 

 

Welcome back to Andysworld!*™ and to Part 5 of my DIY UNRAID NAS series.

In this instalment, I explore a small but very useful upgrade: using the free internal USB headers inside the Intel NUC Extreme 11th Gen to hide the UnRAID boot USB neatly inside the chassis. This keeps the build clean, reduces the risk of accidental removal, and makes the system feel much more like a dedicated appliance.


Why Move the UnRAID USB Inside the NUC?

UNRAID must boot from a USB flash drive. Most people leave it plugged into an external port on the back of the system, but the NUC Extreme includes internal USB 2.0 header pins.

By using those internal headers, we can:

  • Keep the USB drive inside the case
  • Free up an external USB port
  • Reduce the chance of accidental removal or damage
  • Improve the overall look and tidiness of the build
  • Make the system feel more like a self-contained NAS appliance

Credit and Hardware Used

This idea came from a very useful Reddit thread:

Reddit source: https://tinyurl.com/yd95mu37
Credit: Thanks to “JoshTheMoss” for highlighting the approach and the required cable.

Adapter Cable

The adapter used in this build was purchased from DeLock:

Adapter product page: https://www.delock.com/produkt/84834/merkmale.html

This adapter converts the internal USB header on the motherboard to a standard USB-A female connector, which is ideal for plugging in the UnRAID boot drive.


What Happens in Part 5

In this episode I:

  • Open up the Intel NUC Extreme 11th Gen chassis
  • Locate the unused internal USB header on the motherboard
  • Prepare the UnRAID USB stick, wrapping it in Kapton tape for additional insulation and protection
  • Install the DeLock internal USB adapter
  • Route and position the cable neatly inside the chassis
  • Connect the USB stick to the internal adapter (with the usual struggle of fitting fingers into a very small case)
  • Confirm that the system still boots correctly from the now-internal USB device
  • Give a short preview of what is coming next in Part 6

Video Chapters

00:00 – Intro
00:07 – Welcome to Hancock's VMware Half Hour
00:47 – Using the free internal USB headers
01:05 – Reddit Source – https://tinyurl.com/yd95mu37
01:17 – Kudos to "JoshTheMoss"
02:32 – The Reddit Post
02:44 – Purchased from – https://www.delock.com/produkt/84834/merkmale.html
02:59 – Intel NUC Extreme 11th Gen close-up
03:58 – Internal USB header left disconnected
04:36 – USB flash drive is used for UnRAID
04:49 – Wrapped USB flash drive in Kapton Tape
05:31 – Fit the cable with fat fingers
07:09 – Part 6 – NVMe Time
07:51 – 4 × 4 TB Samsung 990 PRO NVMe Gen 4
08:25 – Thanks for watching

Watch the Episode

Embedded video:


Follow the DIY UNRAID NAS Series on Andysworld!*™

This project is progressing nicely, and each part builds on the last. In Part 6, I move on to storage performance and install 4 × 4 TB Samsung 990 PRO Gen 4 NVMe SSDs for serious throughput.

If you are interested in homelab builds, UNRAID, VMware, or just general tinkering, keep an eye on the rest of the series here on Andysworld!*™.

Thanks for reading and for supporting the site.

HOW TO: Synchronize Changes in a Linux P2V with VMware vCenter Converter Standalone 9.0 (Part 101)

Thursday, November 27th, 2025

If you’ve ever attempted a P2V migration using VMware vCenter Converter Standalone 9.0, you’ll know that the product can be as unpredictable as a British summer. One minute everything looks fine, the next minute you’re stuck at 91%, the Helper VM has thrown a wobbly, and the Estimated Time Remaining has declared itself fictional.

And yet… when it works, it really works.

This post is the follow-up to Part 100: HOW TO: P2V a Linux Ubuntu PC, where I walked through the seed conversion. In Part 101, I push things further and demonstrate how to synchronize changes — a feature newly introduced for Linux sources in Converter 9.0.

I won’t sugar-coat it: recording this episode took over 60 hours, spread across five days, with 22 hours of raw footage just to create a 32-minute usable video. Multiple conversion attempts failed, sequences broke, the change tracker stalled, and several recordings had to be completely redone. But I was determined to prove that the feature does work — and with enough perseverance, patience, and the power of video editing, the final demonstration shows a successful, validated P2V Sync Changes workflow.


Why Sync Changes Matters

Traditionally, a P2V conversion requires a maintenance window or downtime. After the initial seed conversion, any new data written to the source must be copied over manually, or the source must be frozen until cutover.

Converter 9.0 introduces a long-requested feature for Linux environments:

Synchronize Changes

This allows you to:

  • Perform an initial seed P2V conversion

  • Keep the source machine running

  • Replicate only the delta changes

  • Validate the final migration before cutover

It’s not quite Continuous Replication, but it’s closer than we’ve ever had from VMware’s free tooling.


Behind the Scenes: The Reality of Converter 9.0

Converter 9.0 is still fairly new, and “quirky” is an understatement.

Some observations from extensive hands-on testing:

  • The Helper VM can misbehave, especially around networking

  • At 91%, the Linux change tracker often stalls

  • The job status can report errors even though the sync completes

  • Estimated Time Remaining is not to be trusted

  • Each sync job creates a snapshot on the destination VM

  • Converter uses rsync under the hood for Linux sync

Despite all this, syncing does work — it’s just not a single-click process.


Step-by-Step Overview

Here’s the condensed version of the procedure shown in the video:

  1. Start a seed conversion (see Part 100).

  2. Once complete, use SSH on the source to prepare a 10GB test file for replication testing.

  3. Run an MD5 checksum on the source file.

  4. Select Synchronize Changes in Converter.

  5. Let the sync job run — and don’t panic at the 91% pause.

  6. Review any warnings or errors.

  7. Perform a final synchronization before cutover.

  8. Power off the source, power on the destination VM.

  9. Verify the replicated file using MD5 checksum on the destination.

  10. Celebrate when the checksums match — Q.E.D!


Proof of Success

In the final verification during filming:

  • A 10GB file was replicated

  • Both source and destination MD5 checksums matched

  • The Linux VM booted cleanly

  • Snapshot consolidation completed properly

Despite five days of interruptions, failed jobs, and recording challenges, the outcome was a successful, consistent P2V migration using Sync Changes.


Watch the Full Video (Part 101)

If you want to see the whole process — the setup, the problems, the explanations, the rsync behaviour, and the final success — the full video is now live on my YouTube channel:

Part 101: HOW TO: Synchronize Changes using VMware vCenter Converter Standalone 9.0

If you missed the previous part, you can catch up here:
Part 100: HOW TO: P2V a Linux Ubuntu PC Using VMware vCenter Converter Standalone 9.0


Final Thoughts

This video was one of the most challenging pieces of content I’ve created. But the end result is something I’m genuinely proud of — a real-world demonstration of a feature that many administrators will rely on during migrations, especially in environments where downtime is limited.

Converter 9.0 may still have rough edges, but with patience, persistence, and a bit of luck, it delivers.

Thanks for reading — and as always, thank you for supporting Andysworld!
Don’t forget to like, share, or comment if you found this useful.

60 second migrations! Watch & Learn! Minisforum MS-A2 Hyper-V to Proxmox 9.0 Migration Minisforum MS-A2 Series Part 15 Ultimate #homelab

Wednesday, August 20th, 2025

Minisforum MS-A2 Hyper-V to Proxmox 9.0 Migration Minisforum MS-A2 Series Part 15 Ultimate #homelab

 

In this episode of Hancock’s VMware Half Hour, I walk you through migrating Hyper-V virtual machines to Proxmox 9.0 on the Minisforum MS-A2. 

We’ll cover connecting to the Proxmox server via SSH, exploring datastores, working with VHDX files, and running migration demos—including moving a full VM in under 60 seconds! This step-by-step guide shows how easy it is to transition workloads from Hyper-V into Proxmox for your #homelab or production environment.

Whether you’re testing, learning, or planning a migration, this video gives you the tools and knowledge to make it happen smoothly.

Scripts are here on GitHub – https://github.com/einsteinagogo/Hyper-VtoProxmoxMigration.git

Minisforum MS-A2 Migrate ESXi VMs to Hyper-V, Minisforum MS-A2 Series Part 6 Ultimate #homelab

Thursday, July 31st, 2025

 

In Part 6 of the Minisforum MS-A2 Series, we show you how to migrate VMware ESXi Virtual Machines (VMs) to Microsoft Hyper-V on Windows Server 2025 — using the powerful and compact Minisforum MS-A2 as the ultimate homelab platform.

This video features Veeam Backup & Replication v12.3 to safely back up your ESXi VMs and restore them directly to Hyper-V. It’s a clean and efficient migration method for anyone exploring life after VMware.

Whether you’re planning a full platform switch or testing a hybrid setup, you’ll find practical, step-by-step guidance from backup to restore — with key gotchas and tips throughout.

In this episode, you’ll learn:

Preparing VMware ESXi VMs for migration

Creating backups using Veeam v12.3

Restoring backups to Microsoft Hyper-V

Configuring networking, storage, and integration services

Post-migration testing and optimization

Real-world advice for homelabbers and IT professionals

Perfect for #homelab enthusiasts, sysadmins, and IT pros evaluating alternatives to VMware.
Got questions or want to share your experience? Drop a comment below!

Like this video if it helped you
Subscribe and hit the bell to follow the full MS-A2 homelab journey

What’s Occurin’ on Andysworld!

Friday, June 6th, 2025

Hey everyone — welcome back to Andysworld!, where there’s always something bubbling in the pot (usually tech-flavoured, sometimes coffee, sometimes bees).

500 Hacks a Day — Mission Accomplished!

After a consistent streak of daily pwnage, I’ve finally hit 500 hacks a day on TryHackMe! It’s been an epic ride, sharpening my skills and staying sharp in the ever-evolving world of cybersecurity. But… that’s it for now. As much as I’ve loved the challenge, life’s too hectic to keep up the daily grind — and honestly, it’s time to re-balance.

Still, 500-a-day? I’ll take that win ?

Hancock’s VMware Half Hour – Rolling On

If you’ve not tuned into Hancock’s VMware Half Hour yet, what are you doing? ? The YouTube channel is keeping me plenty busy — but it’s worth every minute. From real-world scenarios to community spotlights and the latest from the VMwareverse, it’s been great to share stories, learn, and laugh with fellow techies around the world.

Catch the next episode if you haven’t already — things are just heating up.

vExpert PRO – 5 Years Strong!

Big news landed this month — I’m proud (and humbled) to announce that I’ve been recognised as a VMware vExpert PRO for the fifth year running. Not only that, but I’ve also picked up the vExpert VCF badge, too!

This recognition means a lot — it’s not just about titles; it’s about community, contribution, and passion. The vExpert family has been a huge part of my journey, and it’s an honour to continue helping others grow and succeed in the ecosystem.

and that’s not forget the Bees !

Beekeeping at Meltonby Honey

Bees are a mixed bag this is to say, some are doing really well, and some are not doing so well, so this month of June, in the June Gap – need to start sorting out and selecting hives to work this Summer, and dare I say it starting Winter preparations, and a week today attend a Bee Health Day, sponsored by DEFRA !


That’s it for now — life’s buzzing, tech is flying, and the blog never sleeps (even if I do). Thanks to everyone who’s been along for the ride so far.

Until next time — stay curious, stay hacking, and don’t forget to say “What’s Occurin’?” ?

Andy

Hacking for Fun (and Learning) on TryHackMe

Friday, June 6th, 2025

 

If you’ve been following me for a while — either here on Andysworld! or on social — you’ll probably have noticed I’ve got a bit of a thing for TryHackMe. That’s right: the gamified, hands-on cybersecurity platform that lets you “learn hacking the fun way.”

While I’ve worn many hats over the years — from building corporate desktops in the 90s to deploying Thin Clients, backing VMware before it was cool, and even keeping bees in my spare time — I’ve always had a quiet curiosity for cybersecurity.

But in recent years, that curiosity has turned into something more structured. I’ve been diving head-first into daily challenges, CTFs, and red team/blue team rooms on TryHackMe. Every day I log in and test my “hacking” and “penetration” skills. (Legally, of course. Let’s not get too excited.)

Why TryHackMe?

Simple: it’s accessible, addictive, and just plain fun. The platform breaks down complicated security concepts into digestible learning paths and real-world scenarios. Whether you’re into Linux fundamentals, web app hacking, or breaking into Windows environments, there’s something for everyone — and something new to learn every day.

I started with a few easy rooms — some were fun, some had me questioning my life choices — but before long I found myself chasing streaks, solving buffer overflows, exploiting SQL injections, and pivoting through internal networks like it was second nature. It’s part puzzle, part education, and part thrill.

That Daily Streak… and the Climb

I’ll admit it: I got hooked on the daily streak. There’s something about seeing that little flame icon next to your

name that sparks a sense of achievement. Each day I carve out time to complete at least one room, even if it’s a short task or a simple walkthrough. And in doing so, I’ve kept my streak alive and sharpened my skills without ever feeling like it’s a chore.

And here’s the kicker — recently, after being ranked #1,060 out of over 3 million TryHackMe users, I finally cracked the four-digit barrier and rose to #998!
Top 1,000 in the world. Not bad for a “beekeeper with a hacking habit,” eh?

Oh — and right now, I’m sitting on a 461-day hacking streak.
That’s right. 461 consecutive days of training, solving, cracking, and learning.
I’m not far off the 500-day HackStreak badge, and believe me — I will get there. It’s part stubbornness, part obsession, but mostly just a whole lot of fun.

What’s Next?

Honestly, I’d love to get into some deeper reverse engineering, exploit development, and maybe even take on some of the harder red team labs. And who knows — maybe I’ll finally take a proper cert (OffSec, I’m looking at you) just to prove to myself I can.

TryHackMe has rekindled my passion for hands-on learning, just like Experts Exchange did in the early days. It’s reminded me that whether you’re troubleshooting snapshots, spinning up ESXi hosts, or brute-forcing a login page, there’s always more to learn.


Whether you’re an old-school sysadmin like me, a student just starting out, or someone who’s just curious about hacking without getting arrested — I highly recommend giving TryHackMe a spin.

And if you’re already in the game — drop me a message. I’ll see you on the leaderboard ?


Want me to whip up a graphic showing your current rank and streak progress? I can give it that polished blog badge feel.

 

 

Part 12: HOW TO: Install open-vm-tools for Linux on a VMware Linux virtual machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server

Thursday, August 29th, 2024

In this video, I will show you HOW TO: Install Open Virtual Machine Tools for Linux on a VMware Linux virtual machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server, using the VMware Host Client. The virtual machine has Ubuntu 20.04 LTS Desktop edition installed.

For more guidance and a step by step tutorial with screenshots, which supports this video, please see the following article which this video is based on HOW TO: Install open-vm-tools for Linux on a VMware Linux virtual machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server

Part 11: HOW TO: Install VMware Tools for Linux on a VMware Linux virtual machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server

Thursday, August 29th, 2024

In this video, I will show you HOW TO: Install VMware Tools for Linux on a VMware Linux virtual machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server, using the VMware Host Client. The virtual machine has Ubuntu 20.04 LTS Desktop edition installed.

For more guidance and a step by step tutorial with screenshots, which supports this video, please see the following article which this video is based on HOW TO: Install VMware Tools for Linux on a VMware Linux virtual machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server

Part 10: HOW TO: Create your second Virtual Machine Ubuntu 20.04 LTS Desktop on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server

Thursday, August 29th, 2024

In this video, I will show you HOW TO: Create your second Linux Virtual Machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server. The Linux Distribution we will install is Ubuntu 20.04 LTS Desktop Edition.

For more guidance and a step by step tutorial with screenshots, which supports this video, please see the following article which this video is based on HOW TO: Create your first Linux Virtual Machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server

Part 9: HOW TO: Create your first Linux Virtual Machine Ubuntu 20.04 LTS Server on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server

Thursday, August 29th, 2024

In this video, I will show you HOW TO: Create your first Linux Virtual Machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server. The Linux Distribution we will install is Ubuntu 20.04 LTS Server Edition.

For more guidance and a step by step tutorial with screenshots, which supports this video, please see the following article which this video is based on HOW TO: Create your first Linux Virtual Machine on a VMware vSphere Hypervisor 7.0 (ESXi 7.0) Host Server

This was the original article I wrote over 10 years ago, and I reference it in the video.

HOW TO: Tutorial Video – Install VMware Tools for Linux on a VMware Linux virtual machine