Go | New | Find | Notify | Tools | Reply |
Member |
That’s good to know. My devices use a 28 character password along with 2FA using Google authentication. It’s probably the users with “Admin” for a password that are being hacked. There’s not enough computing power in the world to go through 28 digits, and you only get ten tries every five minutes. Demand not that events should happen as you wish; but wish them to happen as they do happen, and you will go on well. -Epictetus | |||
|
Member |
These guys do a report every quarter, gives you an idea of which manufacturers have th best track record. https://www.backblaze.com/blog...e-stats-for-q2-2021/ | |||
|
Member |
I run one backup server at work in a different room from the production server, and another backup NAS at my house to provide the offsite backup. It’s locked down tight with only the backup app able to access it. Do you know somebody that would host the server for you? I’ve heard of people that will place their backup server at a friend or relative’s house, and then do the same for that friend or relative. Each hosting each other’s backup server. Obviously it needs to be with somebody you trust. Demand not that events should happen as you wish; but wish them to happen as they do happen, and you will go on well. -Epictetus | |||
|
quarter MOA visionary |
Also targeting QNAP NAS as well >https://www.bleepingcomputer.com/news/security/qnap-warns-users-to-secure-nas-devices-against-dovecat-malware/ I would expect virtually every IoT device in the future including Smart TV's to get more of this too if they haven't already. Social Engineering, Bots and Script Kiddies with nothing to do. I can remember back in the early days of the internet when firewalls weren't even a random thought. I could allegedly hack another computer on the network as everyone was on the same network and scan (actually guess) another IP and try to connect to the computer. It wasn't hard - allegedly. | |||
|
Member |
From the bleepingcomputer.com article:
Probably every Linux-based device is vulnerable, which is a ton of stuff.
Allegedly. Right. The good old days, when you finally got an IPX network working and your biggest security worry was that your buddy would sneak a mage close enough to cast blizzard on your farms and peons. I kinda miss the early 90's computer scene. Demand not that events should happen as you wish; but wish them to happen as they do happen, and you will go on well. -Epictetus | |||
|
quarter MOA visionary |
One of my first network jobs was to troubleshoot a Novell IPX/SPX network cabled with 10 base 2 (coax). I ripped it all out for Ethernet TCP/IP ...fast ....really fast. | |||
|
Member |
Thanks for all the replies I decided on the Red pros. Actually ended up going with two 8tb drives instead of the 6tb I had planned originally. Two drives and the enclosure at a little over $800 total On the plus side at least I have 12 month no interest lol | |||
|
quarter MOA visionary |
The Red Pros will work well. I have them on my own QNAP NAS (5x4TB). I am however trying to go all SSD in most future installations. If you think that large SSD's are expensive they are and if they are data grade SSD's then it gets worse. With all the Apocalyptical shortages and Intel selling their SSD business to SK Hynix the only real choice for me are Samsung Enterprise SSD's. And these are SATA III drives as well. I recently built a small file server for a client with some 4TB drives and found a good price at just under $600 a piece ~ now they are $800 ~ $1K Unfortunately NVMe drives in a storage array aren't possible without very expensive (very) cards. It is also unfortunate that while you pick up the access speed (with SSD) increase over rotational drives you don't get the throughput of the NVMe drives. Never mind as I digress ~ those Red Pros are decent drives. | |||
|
Powered by Social Strata | Page 1 2 |
Please Wait. Your request is being processed... |