Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Saturday, November 29, 2014

Build a low budget computer meant for 24/7 operation.



Sometimes you need a machine you can trust to be on for many days at a time. But you're not looking to invest into a server grade build, nor do you need exceptional performance. Let's say it's supposed to run a script or a process, constantly. For example - a DVR server.
In this case you need to optimize your configuration for durability. So to start - we need a nice ventilated chassis. If budget is not unlimited, then a basic well ventilated chassis will do.

Motherboard - We need the motherboard as cheap and as durable for the price as possible. So a good idea is to look through motherboard vendor lineups - go to the cheapest model and then raise the bar till you reach a model with all solid capacitors. For example - currently (end of 2014) Asus has the H81 series motherboards, and one of the cheapest is H81M-K. It however does not have all solid capacitors, so if we take the next model, right above this one - it will be H81M-A - which does offer an all solid capacitor configuration, and is only slightly more expensive.

CPU - if you're not looking for high performance, I would suggest a simple Intel CPU, such as currently Haswell based Pentium Dual core series. They are cheap and bear the Intel quality standard.
You can also go with a T series Intel CPU which consumes the least power.

RAM - again something that is of acceptable quality but not gamer grade. A built in heat-sink is always a plus. As an example - Corsair CMV4GX3M1A1600C11

Hard Drive - This is where you need to invest a bit more into a drive made for 24/7 operation, such as Western Digital Caviar Red made for RAID, NAS and 24 hour operation. Similar models from other manufacturers include Seagate Surveillance HDD or Toshiba High Durability Specialty drives.

PSU - A great way to provide stable power to a long running machine is to go with a good power supply unit that you can trust. Some even come with a built in surge protector. Also make sure you get a PSU with an 80Plus rating, which means it wastes less power. A good example of an affordable 80Plus PSU is Corsair VS350


Saturday, September 20, 2014

Optimize QNAP NAS security

In this post I will talk about tweaking your QNAP NAS device to be more secure than it's configured by default.
I'm going to assume that the main settings of user and folder structure have been configured at this point, and you're good to go, but you'd like to maximize security for the NAS using the built in features.

As a side note - I am using QOS firmware version 4.1.0 to demonstrate the features depicted in this post.

Let's start by enabling SSL for the web management console of the NAS.


You can force secure connection so there would be no other way but to connect securely to the web console, but if something goes wrong (with the SSL certificate) - you may not be able to log onto the web console. So pick the right option for yourself.
By default, the NAS will use a self generated SSL certificate, it is also possible to upload and utilize a third party SSL certificate, which can come from a verified provider.
The certificate and the private key both can be uploaded inside the Security > Certificate & Private Key tab.

Now we can set up email alerting. I believe that email alerts are a very practical way of staying up to date on server's health and security issues. This can be done under the Notification section, First set up the SMTP server, I suggest using Gmail, as its configuration is already built into the console, and Gmail provides a very stable and free email service, so if you don't already use Gmail, you may want to create an account specifically for this server alerting system. Put in your Gmail address and password, and hit the "Send a Test Email" button to see if you can receive email alerts from the server. If you can't - your network hardware maybe blocking it. so it's something you should look into. Open outbound SMTP SSL ports in your router/gateway, for example.
Once the test email arrives, you need to set the server to send you email alerts to your preferred email address, this is done in the Alert Notification tab.
Check the "Send system error alert by: Email" and "Send system warning alert by: Email", and make sure to enter your target email address(es) under "Email Notification Settings". If you don't set this up - you will not receive alerts to your email address.
Once done, hit the Apply All button on the bottom of the page.

Now, I should mention that if your NAS server is planned to be accessible remotely - be it via VPN, FTP, or you would simply like to remotely administer it using the web console - there will be constant hack attempts coming from the Internet. Most of the time these are not targeted at your server specifically but rather automated by certain malicious machines online to try and guess the username and password of a NAS or any other protected machine that is accessible remotely. So to get rid of that potential threat to the data and stability of your NAS we need to set the server to automatically ban or block IPs that are trying to hack your device. The feature that controls this is located under Network Access Protection inside the Security section of the web console.


First tick the box "Enable Network Access Protection", and then configure protocols for which the server will monitor access attempts and react accordingly.
I usually prefer setting the connection methods shown in the screen-grab. Note that SAMBA and AFP are not monitored as they are local connection types and may interfere with your users' access stability. You don't have to block the offending IPs forever, you can just ban their access temporarily, but I see no reason to do that as they will continue right on trying to penetrate your network after they are unblocked.
Once done, make sure to hit Apply or Apply All.
This feature was introduced after version 3.8.0 so if your NAS is running an older firmware version - maybe it is time to update.

Another important issue to consider is evaluating the connection methods that are open in your NAS.
If you don't plan to administer the NAS via SSH - do turn it off, because a lot of hack attempts will come via SSH. SSH is enabled by default, so it may be a good idea to turn it off to raise the level of security.
To disable SSH and/or FTP, go into the Network Services section and disable the unnecessary connection methods.

Finally, you may want to enable logging of file usage on your NAS. This can also tell you about internal users' actions in detail, as well as log incoming hack attempts. This is done in System Connection Logs under System Logs. Click the Options button and check all of the connection methods relevant to your situation. Make sure to check SAMBA to monitor the local users' connections. Once your log fills up to 10,000 events - you can automatically dump it into a CSV file onto one of the shared folders. You can create a protected log folder that only you as the admin have the access to, and point the CSV file creation there.

It is worth mentioning that QNAP NAS comes with an internal antivirus feature that is disabled by default, so if you want the NAS to scan the files that it hosts you can enable the Antivirus application (located under the Applications section on the bottom of the console), you can schedule scan jobs and automatic definition updates here as well.

Wednesday, April 30, 2014

Build an energy efficient computer



Here I will show a sample configuration of an energy efficient workstation.

This build, in my view, will provide power efficiency and stability as well as good performance.

PSU - Any 80 Plus (and up - such as Bronze, Silver, Gold, Platinum and Titanium)
Top brands include: Corsair, Seasonic, Cooler Master, Thermaltake, Antec and others.
I would recommend Corsair AX series power supply (rated 80 Plus Platinum) as it would waste the least power.

CPU - Any Intel 4th Generation CPU which model ends on T.
I recommend i7-4765T as its TDP is at 35W. So at its full power it won't go beyond 35 watts.

Motherboard - Leading low watt brands include Asus, EVGA, Gigabyte and Asrock. A gaming motherboard will typically consume much more power than a mini-ITX motherboard.
I recommend Asus Z87i-PRO - good performance and low power.

RAM - There is a low voltage type of DDR3 called DDR3L which uses less power, also emits less heat. Brands include Kingston HyperX Lovo or Genesis and Adata XPG, among others.
I recommend Kingston HyperX LoVo - Kingston's special line of low voltage ram.

Hard Drive - Western Digital Caviar Green or Seagate Barracuda LP for HDD, Samsung 840 Series for SSD.
I would recommend a Samsung 840 EVO or PRO series drive.

Optical Drive - most optical disc drives are the same power, however a slim drive version will consume less power than the standard version.

Monitor - Any LED backlit LCD monitor, preferably with high Energy Star compliance. The smaller the size of the screen - the lower the power consumption. Here's a list of 18-22 inch monitors and their wattage.



Tuesday, April 29, 2014

Turn an IBM X3100 M4 Server into a workstation.



This is a neat little server that comes from IBM that officially doesn't support Windows 7. In this post I will guide you through making it run Windows 7 using the built in LSI Raid controller and a RAID mode.
If you decide to use AHCI mode however, it becomes easier (as it is supported by Windows 7), but you will be missing a performance (or stability) increase you'll get with the RAID.

The LSI raid controller on this server does not have drivers that support Windows 7 - only Windows Server 2008 (R2). There's also a great many driver packages available from IBM for this controller, so choosing the right one is quite time consuming. After 4 different failed driver packages I finally found the right one that would enable the RAID controller inside the Windows 7 installation PE. I have uploaded it HERE.
Just unrar and copy it onto a flash drive and browse to it during the installation (when it fails to find any hard disks).

Once the system finishes installing - most of the drivers will be installed, the only ones that won't be are the Chipset and the onboard video (Matrox G200ER2). Download the driver for it here.
Chipset drivers are available here.

Sunday, October 27, 2013

Sunday, October 20, 2013

Table of all Intel desktop CPUs for the last 10+ years.

I have been quite busy with this new project for the last couple of months. I had my mind set on creating a flow chart that shows all Intel desktop CPU sockets present in the last 10 or so years, and all processors that are supported for them. It covers Intel CPUs under LGA775, LGA1156, LGA1366, LGA1155, LGA2011 and LGA1150 sockets. 

The flow chart starts from the socket, continues onto microarchitecture, core code name, CPU brand name and ends with main specifications of the CPU. It covers Pentium, Celeron, i3, i5, i7 and Xeon CPUs. Very easy to compare and pick out the appropriate CPU model for the necessary task.

 This is a very large poster, high resolution print quality. In digital form it can be searched using your PDF software's search function to find the CPU you need.

 I have posted it here on Scribd.


Table of intel proccessors