Gmail in safari browser

What is Phishing? The Minefield in your Mailbox

They’ve been used against us for over two decades, so phishing attacks are hardly new. They have evolved, however. No longer limited to email, they can also be delivered...
32 Cyber Security Terms Everyone Should Know

32 Cyber Security Terms Everyone Should Know

Cybersecurity, like most technical subjects, comes with its own set of jargon. At first, it can seem impenetrable. Here’s an easy introduction to 32 terms you should be familiar...
Seagate IronWolf Pro 18TB

Seagate IronWolf Pro 18TB hard drive: Fast, Tons of Capacity, No Shingling

Seagate's latest entry into the spin-platters-because-they-make-storing-data-cheaper market is the rather excellent and exceedingly capacious 18TB IronWolf Pro. I once paid $700 for a 4GB drive. $550 for 18TB? Amazing. Design...
TrueNAS R-series models

iXsystems Launches R-Series Systems and Scale-out HCI Software

iXsystems made two big announcements today with the launch of the new TrueNAS R-Series storage systems and the TrueNAS SCALE Open Source Hyper-Converged Infrastructure (HCI) software. Meet the TrueNAS R-Series The...

SSD vs. HDD: What’s the Difference?

If I were to be cavalier about the question posed and answered by this article, I'd simply tell you that Solid-State Drives (SSDs) are very fast, and Hard Disk...
What is browser hijacking?

What are Browser Hijackers and How Do You Remove Them?

Browser hijackers are a type of malware designed to attack and compromise web browsers. They change your browser's settings without your permission or knowledge. Why attack browsers? Because everyone...
FreeNAS vs UNRAID

FreeNAS vs. UnRAID: What are the Differences?

To the outside world, FreeNAS (TrueNAS) and UnRAID appear far more alike than different. In effect, they are. Both are operating systems that allow you to leverage your own...
Statue of Queen Victoria

What is Punched Paper Tape, and How to Read It

To most people who can even remember what punched paper tape is, it'll seem like a relic of yesteryear. But as we'll see, that's not strictly the case. What...
QNAP QGD-1600P Switch

White Paper: QNAP QGD-1600P Managed Network Switch

Internet of Things (IoT), smart connected solutions, and installations have seen tremendous growth in recent years, and the business impact that they carry is not something that can be...
What is Thin Provisioning

What is Thin Provisioning? Use Only What You Need

No, we're not talking SlimFast here, or a forced hike on limited rations (don't ask). We're talking about yet another computer term that doesn't completely clue you in on...
QNAP Logo

How to Reset a QNAP NAS to Factory Default

If your QNAP NAS box was infected with malware (such as QSnatch), or you simply plan to sell it, you'll need to perform a factory reset to wipe your...
Engenius ECS2512

Engenius ECS2512 Managed Switch Review: Cloud Management, Multi-gig, and PoE

If you're looking to step up from gigabit performance across a small network or node, you'd be hard-pressed to find a better solution than Engenius's managed 10/2.5GbE ECS2512 switch....
pile of vintage door keys

What Are Brute Force Attacks?

Brute-force attacks use software that generates random passwords and tries known passwords from data breaches to try to match your password. What are brute-for attacks? They're the threat actors'...
keyboard and world map

What is an APT and Why Should You Care?

An APT is an advanced persistent threat, usually conducted as a long-term, low-key infiltration of a network, and conducted by world-class hackers. What is an APT? It's the threat...

Subscribe to stay updated with the latest news on data storage, network security, and surveillance.