Seagate’s new BlackArmor NAS 440 Network Storage Server. Seagate has just launched their BlackArmor new line of network attached storage (NAS) devices called BlackArmor NAS 440 and 420 aimed at the small business market as well as for SOHO users. BlackArmor NAS stores up to 8TB of encrypted data. These storage servers come with software which makes it possible to automate the backup of your computers. The NAS 420 is priced at 9.99 while the NAS 440 costs 99.99 with 4TB, 99.99 for 6TB, and 99.99 for 8TB.
BlackArmor NAS are practically plug-and-play devices which back up automatically and not only store the data and digital content but also protect it from being lost. The BlackArmor NAS 440 storage server has four drive bays with such features as hot-swap of internal drives for archival or replacement with RAID security provided or remote access without additional software installations. The BlackArmor is compatible with Windows XP, Vista, and OS X. The network attached storage (NAS) devices also allows archiving and restoring your data.
There are built-in LCD displays, showing status information including event alerts in both systems, offering backups of up to 50 computers connected to a network. You may be in control of your data via LCD display and BlackArmor Manager Administrator software. The NAS supports RAID 0, 1, 10, 5, and JBOD. The drives can be removed without screwdrivers or downtime. Data is confidently stored on the devices, providing a lot of archival capacity. Other features include the use of dual RJ45 (gigabit) ethernet ports, 7200RPM SATA II disks, NAS-to-NAS replication for backup, support for Windows Server Active Directory with both HTTP and FTP download servers.
Read More...
Tuesday, March 31, 2009
Network Storage Server
Thursday, March 26, 2009
Fit-PC2 - the smallest computer in the world
Users can appreciate various capabilities of fit-PC2. Low power consumption is another plus which makes it the most power-efficient Intel Atom PC until now. Power consumption is just 6W in normal operation in Windows XP or Linux. Taking into consideration its power consumption it may be well named a Green Computer. Its weight is just 370g including hard disk which is nothing compared to another PCs. Fit-PC2 can be controlled via IR remote control. Fit-PC2 is able to withstand extreme temperatures, vibration or a high level of shock. Affordable price, good performance, low power consumption, tiny size makes fit-PC2 an ideal personal computer for end users.
Read More...
Monday, March 23, 2009
iPod Party Speaker
If so all you need is your iPod or MP3 player (even a CD player will do) and the musical marvel on wheels that is the iPod Party Speaker.
Made from heavy duty aluminium, it has a two wheel base and retractable handle on top so that you instantly become the master of mobile disco.
Simply put your iPod into the iPod dock, or use one of the four jacks to connect your MP3 player, CD player or even an electric guitar, and you are in business. Ready to fill that dancefloor wherever you decide to pump up the jam as Technotronic would say.
The iPod Party Speaker is a 22W mobile speaker system that will blast out your tunes wherever you are. It even comes with its own microphone so that you can do shout outs and provide Alan Partridge style intros and outros to your favourite tunes. Yes indeedee!
It has a 5m long mains lead, but it also has its own re-chargeable battery that will give you up to 12 hours of noise! So you can party on the beach, in the garden or in the park. Perfect for Summer barbeques.
The iPod Party Speaker is available online for £179.00 from IWOOT.
------------
see the full post in here
Read More...
Wednesday, March 18, 2009
Nuclear Doorbell
It all went wrong one day though when we pressed a doorbell and it started playing a tinny repertoire of Christmas classics, drowning us out in the process.
If I remember rightly, we ended up giving the doorbell money.
Anyway, if you want to mess with the minds of anyone who dares darken your door, get yourself a Nuclear Doorbell.
This seriously loud doorbell is wirelessly activated, is easy to install and requires no wiring because it's battery operated. Simply attach the buzzer to the outside of your front door and the doorbell to the inside, and then wait for some unsuspecting soul to press the doorbell.
That's when all hell breaks loose. A siren goes off and a booming voice alerts one and all to the presence of someone at the door.
"Attention! Attention! Someone has pressed the doorbell! Please remain calm!"
"There is somebody at the door! Repeat! There is somebody at the door! This is not a drill! Repeat! This is not a drill!"
All this fun and not a radiation leak in sight.
See and hear the Nuclear Doorbell in action at The Gadget Shop price £16.99.
see the full post in here
Read More...
Friday, March 13, 2009
iPod with free engraving
Not content with being a portable media player that can store up to 7,000 songs and 40 hours of video (32GB model), the iPod Touch puts an amazing gaming experience in the palm of your hand. In fact you'll have access to over 15,000 games and other applications courtesy of the App Store which you can access wirelessly simply by tapping the icon on the iPod Touch's screen.
And that same wireless connectivity means you can use your iPod Touch to connect to the internet wherever there's a wireless network. You can surf the web, watch YouTube, get directions and send emails from any Wi-Fi hotspot.
Its crisp, clear 3.5-inch colour widescreen screen means that watching films and TV shows on the move has never been better (and the iTunes store has a great range of both that you can rent or buy). And of course that screen together with groundbreaking technologies such as the Multi-Touch display, the accelerometer, and 3D graphics, makes the Apple iPod Touch a bone-fide handheld gaming machine too.
And you can now personalise any iPod with a free personalised engraved message on the back, making it the perfect gift or uniquely yours.
The iPod Touch with free engraving, gift wrap if you want it and free delivery is available from £165 from the Apple Store.
--------
see the full post in here
Read More...
Tuesday, March 10, 2009
The Weather Watch
Not content with telling you the time and doing the usual digital watch stuff (it's got a stopwatch, and calendar and alarm functions) - this little fellow is never happier than when predicting the weather. It's like having Michael Fish on your wrist, although hopefully a little more accurate when a storm's approaching.
The Weather Watch predicts the weather for 12 and 24 hours ahead by measuring barometric pressure trends. I don't know what that means either, but even I can follow the four easy to read icons that tell you in no uncertain terms whether it's going to be rainy, cloudy, partly cloudy or sunny.
And if the storm clouds do gather and the heavens open, you'll be equally pleased to discover that it has a backlight function for easy viewing in low light conditions and that it's water resistant up to 30m (98 feet in old money).
Order your Weather Watch today from The Gadget Shop for £39.99.
----------
see the full post in here
Read More...
Thursday, March 5, 2009
How To Be A Hacker
Expertise with the hacker can see & fix software on the computer; usually then publish openly on the Internet for the system to be better. Sialnya, take a few evil men use the information to crime - they are usually called cracker. Basically the hacker & cracker does not vary with the art world, here we are talking art Internet security network.
I hope the science of network security in this paper is used for things that good - not the Hacker cracker. Do not until you hit karma for using science to damage property of others. Moreover, the current needs of hacker growing in Indonesia and many more who want to dotcommers IPO shares in the various exchanges. Name good value & a dotcom can not fall into even if valuable in the dotcom collapse. In this case, the hacker can be expected in the security consultant for the dotcommers it - because the police HR & Indonesian security apparatus is very sad & very weak in the field of Information Technology & Internet. What could make cybersquad, cyberpatrol private budayakan perhaps necessary for survival in dotcommers Indonesia on the Internet.
Various security techniques in the Internet network can be obtained easily on the Internet, among others, in http://www.sans.org, http://www.rootshell.com, http://www.linuxfirewall.org/, http:// www.linuxdoc.org, http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/. Some of the techniques in the form of books that the number of its several hundred pages that can be taken for free (free). Some Frequently Asked Questions (FAQ) about the security of the network can be obtained in http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq.htm. And for the experimenter some script / program that is so can be obtained, among others, in http://bastille-linux.sourceforge.net/, http://www.redhat.com/support/docs/tips/firewall/firewallservice.html .
For readers who want to gain knowledge about the network can be downloaded for free from http://pandu.dhs.org, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf . Some books that shaped softcopy can be free to take on the capture of http://pandu.dhs.org/Buku-Online/. We must be especially grateful to the team by I Made Wiryana for this. At this time, I do not know the place of a discussion on the techniques of hacking this - but it may be in part discussed in the mailing list information such as the kursus-linux@yahoogroups.com & linux-admin@linux.or.id operasikan by the Linux User Group Indonesia (KPLI) http://www.kpli.or.id.
The simplest way to see the weakness of the system is to explore how information from various vendors, for example in # 3b http://www.sans.org/newlook/publications/roadmap.htm about the weakness of the system that they own. In addition, monitoring the various mailing lists on the Internet related to network security as in the list
Described by Front-line Information Security Team, "Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks," fist@ns2.co.uk http://www.ns2.co.uk. A cracker usually men aged 16-25 years. Based on the statistics of Internet users in Indonesia, then in fact the majority of Internet users in Indonesia are children at a young age also. Indeed, this age is the age that is the ideal draw in the new science of science, including the Internet, be pitied if we are not successful menginternetkan to 25,000 Indonesian schools s / d in 2002 - because the object of a future of Indonesia is in the hands of young children we.
Well, the young are generally cracker cracking do to improve / use of resources in the network for its own sake. Generally, the cracker is opportunis. See the weaknesses with the system program mejalankan scanner. After obtaining access to root, will install the cracker back door (backdoor) and close all existing general weakness.
As we know, most companies / dotcommers will use the Internet to (1) they are hosting a web server, (2) e-mail communication and (3) provides access to web / internet to its employees. The separation of Internet and Intranet networks generally done by using the techniques / software firewall and proxy server. See the condition of the use of the above, weaknesses in the system generally can penetrate through, for example with external Mailserver / used outside for easy access to the mail out of the company. In addition, by using the agressive-SNMP scanner & programs that force the SNMP community string can change the router into a bridge (bridge), which can then be used for the stepping stone for entry into the company's internal network (Intranet).
Cracker protected so that during the attack, technique cloacking (masquerade) is done with the jump from the previous engine was compromised (ditaklukan) program through telnet or RSH. In the intermediary machine that uses Windows attack can be done with the jump from the Wingate. In addition, the jump can be done through the proxy device configuration is less good.
After a successful jump and enter the other systems, cracker like to probing of the network and collect the information necessary. This is done in different ways, for example, (1) using the nslookup command to run the 'ls', (2) view HTML files on your webserver to identify the other machine, (3) to see various documents on the FTP server, (4) connecting the self to mail server and use the command 'expn', and (5) mem-finger user machines in the other external.
The next step, cracker will identify the network component that is trusted by the system only. Network components are the server administrator and machines that are usually in the most secure in the network. Start with a check & export NFS access to a variety of critical directory such as / usr / bin, / etc and / home. Exploit weaknesses engine through the Common Gateway Interface (CGI), with access to the file / etc / hosts.allow.
Next cracker network components need to identify the weak and the taklukan. Cracker can use the program in Linux like ADMhack, mscan, nmap and many other small scanner. Programs such as' ps' & 'netstat' on a trojan (remember the story of horse TROYA? Classic story in ancient greece) to hide the process of scanning. For the cracker can simply use the advanced aggressive scanning for SNMP-men-scan equipment with SNMP.
After a successful cracker identify network components that can be weak and in taklukan, the cracker will run the program to the daemon program menaklukan weak in the server. The program is a daemon program on the server is usually running behind the screen (as a daemon / Satan). The success of this menaklukan daemon program will enable a cracker to gain access as' root '(administrator in the server).
To remove the impression, a cracker is usually cleaning operation 'clean-up' operation with a variety of ways to clean the log file. And add the program to enter from the back door 'backdooring'. Changing the file. Rhosts in / usr / bin for easy access to the engine through the RSH taklukan & csh.
Then a cracker can use a machine that is already ditaklukan for their own interests, for example, take the sensitive information that should not dibacanya; mengcracking machine from another machine with a jump in taklukan; install a sniffer to see / record the various traffic / communication through; can even turn off the system / how to run the network with the command 'rm-rf / &'. The latter will be very fatal consequences because the system will be destroyed at all, especially if all the software on the hard disk letakan. The process of re-install the entire system must do, it will spin if this is done on machines that run mission critical.
Therefore, all machines & routers running mission critical should always check the security patch by & in the new software. Backup becomes especially important once the machines that run mission critical terselamatkan from the cracker ulah men-disable system with 'rm-rf / &'.
For us the day-to-day romp in the Internet generally, there would be very appreciative of the existence of the hacker (not cracker). Because thanks to the hackers, and there is the Internet we can now enjoy, such as this, even continue to refine the system to become better again. Various weaknesses in the system because the correct accomplishment colleagues hackers often do the repair page. voluntarily for hobbies. Moreover, often results in its hacking it for free on the Internet for the Internet community. A value & cultural gotong royong glorious thus grow in the virtual world of the Internet generally seemed futuristic and far from the social sense.
Development of the hobbiest hackers became important to the sustainability / survival vehicle on the Internet dotcommers Indonesia. As one of fact, in the near future Allah around mid-April 2001 will be conducted in hacking competition in the Internet to break a server that has been specified in advance. Hacking competition in motori by young people in the Linux User Group Indonesia (KPLI) of Semarang digerakan by children as young Kresno Aji (masaji@telkom.net), Agus Hartanto (hartx@writeme.com) & Lekso Budi Handoko (handoko @ riset.dinus.ac.id). As children usually other young, they generally have capital insufficient - support & sponsor of course very useful and will be expected by colleagues this young.
Hopefully all this will add to the spirit of readers, especially young readers, to move in the world of hackers mengasyikan and challenging. If the word Captain Jean Luc Picard in Movies Startrek Next Generation, "To boldly go where no one has gone before."
--------
see the full post in here
Read More...