Journal-Upgrading My NAS (Network Attached Storage)
My original NAS ran a bootleg Synology (Xpenology) system. For unknown reasons, simultaneous R/W operations on two drives would cause the DSM web interface to freeze. This prompted a move to TrueNAS. However, since TrueNAS utilizes the ZFS file system, ECC memory is highly recommended to ensure data integrity. After verifying that my original motherboard and CPU did not support ECC, I embarked on a hardware upgrade plan.
498 words
|
2 minutes
Cover Image of the Post
Farewell to Chaos:I Developed a Cable Label Formatting Tool
Born for efficiency, established for standards — check out this Cable Label Formatting Tool.
501 words
|
3 minutes
Cover Image of the Post
When MinIO Web Console Vanishes, CLI is King:A Beginner's Guide to mc
MinIO, the open-source object storage giant, has undergone a heavy-handed removal of its Web Management Console core code in community releases post-20250524. With over 110,000 lines of code deleted, how can we manage MinIO without the Web Console? Let's dive into the mc command line.
596 words
|
3 minutes
Cover Image of the Post
OpenSSH Security Upgrade Guide:Detailed Online and Offline Solutions
OpenSSH is a core component for remote server management. While its open-source nature occasionally reveals security vulnerabilities, it also drives continuous optimization and iteration. Upgrading is the most effective way to address these vulnerabilities. However, many Linux servers are deployed in isolated environments without direct internet access, making manual compilation and installation a necessary skill. This article details how to securely upgrade OpenSSH via source compilation in an offline environment.
528 words
|
3 minutes
Cover Image of the Post
Multiplayer Gaming Guide:Building a Virtual LAN with N2N
Recently, my friends and I have been immersed in the 'Civilization' series—always promising 'just one more turn' until the early hours of the morning. Despite being on the other side of the globe, we successfully established a Virtual LAN using P2P VPN technology to enjoy a seamless multiplayer experience. This article shares the practical implementation of this technique.
383 words
|
2 minutes
Cover Image of the Post
Security Inspection Headache? Here’s the Ultimate High-Risk Port & Forbidden File Upload Checklist!
This article provides a comprehensive checklist of high-risk ports recommended for closure and a guide to prohibited file upload types. Covering remote access, databases, file sharing, and risky executables/scripts, it aims to streamline security audits and enhance network defense.
332 words
|
2 minutes
Cover Image of the Post
nwipe Tutorial:Secure Data Sanitization via Open-Source Tooling
nwipe is a lightweight yet powerful open-source data erasure tool supporting various international standard algorithms. This article details its installation, usage, and applicable scenarios to help you thoroughly and securely destroy sensitive data.
606 words
|
3 minutes
Cover Image of the Post
Data Sanitization:An Overview of Technologies and Standards
An analysis of data sanitization technologies and standards, including global overwriting standards (e.g., GA/T 1143, DoD 5220.22-M). This article explores logical wiping for storage media versus physical destruction, compares mainstream standards, and introduces essential tools like AOMEI and nwipe.
715 words
|
4 minutes
Cover Image of the Post
1
2
3