System Recovery Procedures for NAS 4100

NAS 4100 Recovery Overview: The NAS 4100 comes with 4 separate hard drives. In the event of a hard drive failure you will be notified via an Email alert and/or Web UI. RAID regeneration can take up to 30 minutes depending on which drive has failed.

To check status of your NAS 4100 drives use Logical Disk Manager. To access the Disk Management utility:

    1. Open “MaxNeighborhood” and double-click on the NAS 4100 that you want to create the folder on.
    2. Login to NAS 4100 with the appropriate Administrator (or Administrator equivalent) username and password.
    3. Click on “Administer this server appliance”. Upon doing this, the NAS 4100 Home Page will appear in the Browser.NAS 4100 Recovery
    4. From the Home Page, click on the “Disks and Volumes”Link. At this point, the Disks and Volumes page will be displayed in the Browser.NAS 4100 Recovery

      NOTE: You may click on the Graphical Link OR the Java Text Link…either will suffice.

    5. Click on the “Disks and Volumes”link.NAS 4100 Recovery

      NOTE: You may click on the Graphical Link OR the Java Text Link…either will suffice.

    6. Click the “Yes”button in the VBScript: Disk Configuration Window.NAS 4100 Recovery
    7. The Windows 2000 Management Snap-In will be displayed in your browser.NAS 4100 Recovery

      The NAS 4100 hard drives are configured as; Disk 0, Disk 1, Disk 2 and Disk 3. Each one of these hard drives, if lost, exhibits slightly different behavior.

Disk Failure | Recovery Time

Disk 0 | 30 Minutes

Disk 1 | 06 Minutes

Disk 2 | 30 Minutes

Disk 3 | 15 Minutes

Read More

Top 10 worst computer viruses (Part One)

Computer SecurityAll this panic over a simple strain of flu got us thinking about some of the more virulent computer pandemics that have hit in recent years. While a computer virus pales in seriousness to a human outbreak, malware attacks can still take a huge toll on businesses throughout the world.

The viruses below may not have been the most widespread or effective, although many of them were. Instead they are the ones that stick in the mind as being particularly notable. There are been so many over the years, and viruses will always be a part of computing now, but these may bring back memories, not all of them pleasant.

Honourable mention: Creeper
Iain Thomson: Creeper was possibly the very first computer virus, although this is contested. It was invented back in 1971 by Bob Thomas, using the Tenex operating system, and used the precursor of the internet, ARPANET, to spread between DEC PDP 10 systems.

To delete the Creeper program another piece of code, Reaper, was created to hunt it down and destroy it. The first anti-virus virus, Reaper was an excellent idea and one that worked well.

Some don’t consider it a virus because it lacked many of the features of modern viruses, but I’m counting it anyway because it was an example of the harmlessness of the early age of computers. Creeper did nothing more than display the message ‘I’m the creeper, catch me if you can!’ No payload, no theft, it was an example of a simpler age.

Shaun Nichols: In computer years, 1971 was nearly prehistoric. No Apple, no Microsoft and the internet was still a wild, far-off concept. Still, in this era where computer programming was a highly-specialised skill, we saw many firsts.

Perhaps a sign of the early times, Creeper’s creator not only released the virus itself, but a cleaning program called Reaper that removed the Creeper code.

Honourable mention: Brain
Iain Thomson: Brain was the first virus written for Microsoft’s DOS operating system, back in 1986. It was originally developed to stop the copying of a medical software program developed by two Pakistani brothers, Basit and Amjad Farooq Alvi.

Brain spread by floppy disc and copied itself into the boot sector of the media. It displayed the names of the creators, and suggested the infected recipients got in contact to get disinfected.

It spread quickly and the two brothers were inundated with calls from people around the world demanding that their machines were disinfected. Such was the volume of calls that the two eventually had their phone lines cut off.

Shaun Nichols: Remember how much heat Sony took when it used a rootkit as part of its copy-protection software? Well, it turns out Sony wasn’t the first group to make that mistake.

Back in 1986, a pair of developers from Pakistan tried to stop piracy of their biomedical software by including a small snippet of code to track and report possible piracy. That code was soon removed and redistributed as a virus.

This was back in 1986, so the ‘FAIL’ meme had yet to be put into use, but if it had, Brain Computer Services would have no doubt more than earned the tag.

Read More

What exactly is the consequence of changing the “system locale” in Windows 8?

I read http://windows.microsoft.com/en-US/windows-vista/change-the-system-locale (windows 8 linked me to this help page) and I still can’t completely understand what that means. In which way is the system locale different than the display language? Solution: System Locale (Language for non-Unicode Programs): This setting has three major purposes: Specifies the default ANSI, OEM, MAC, and EBCDIC code pages…

Read More