We Got Served http://www.wegotserved.com Mon, 18 Aug 2014 07:18:53 +0000 en-US hourly 1 http://wordpress.org/?v=3.9.2 Review: FlexRAID Transparent RAID http://www.wegotserved.com/2014/08/18/review-flexraid-transparent-raid/ http://www.wegotserved.com/2014/08/18/review-flexraid-transparent-raid/#comments Mon, 18 Aug 2014 07:15:02 +0000 http://www.wegotserved.com/?p=69529 Cameron Bishop takes a look at FlexRAID Transparent Raid - an ambitious attempt to marry the ease and convenience of software RAID with the level of control usually reserved for hardware RAID.

The post Review: FlexRAID Transparent RAID appeared first on We Got Served.


If you have a large data collection across multiple drives, then you need a method of combining the drives together and keeping everything in check.  Back in the day, Windows Home Server introduced many home users to the wonderful world of storage and better yet, it made it so easy.  Since the ultimate demise of Microsoft’s Drive Extender there’s been a bit of a hole in the options for home server enthusiasts.  Should you bite the bullet and go for a hardware RAID setup, or should you spend your time setting up a software solution such as Microsoft Storage Spaces to replicate the good old days of disk pooling?

Transparent RAID is a technology developed and sold by FlexRAID.  The product was started as a concept and has developed into a standalone product, with the focus being on non-destructive RAID, designed to fit in with a user’s existing data collection.  So what does it do?  In a nutshell, Transparent RAID wants to give you all the flexibility and features of having a hardware RAID setup without actually needing one, while avoiding some of the pitfalls of hardware RAID.

This means features like Hot Spare or Online RAID Expansion and Contraction are available, and the whole product is managed from a web interface - perfectly suited for a headless system.  The RAID setup works on parity (much like RAID 5 or 6) and provides efficient disk reads and writes while allowing for disk failure and recovery from failure.

Test Setup

To test the software I decided to compare it to Microsoft Storage Spaces, something most readers should have access to.  I grabbed a PC with an Intel Core i3-2100 supported by 4GB of RAM and installed a 160GB hard drive for the operating system. Four 1TB hard drives were used for storage.  The operating system of choice here was Windows 8.1 x64 with all updates installed.

Firstly there were some baseline disk tests to determine our speeds, with the OS drive importantly being faster than the four storage drives.  This helps set expectations for file transfer speeds down the track.

160gb OS drive speed HDTune Review: FlexRAID Transparent RAID

The operating system drive is snappy for a mechanical drive.


1TB WD drive speed HDTune Review: FlexRAID Transparent RAID

These storage drives are not speed demons, but represent typical mechanical drive operation


To complement these tests, I created a large file for continuous file transfer speed tests, and grabbed a folder of real-world files (a collection of device drivers) to simulate a transfer of multiple files at multiple sizes.

To start with, I just tested these drives formatted with NTFS inside Windows without any storage pooling technology running at all.

The results showed that a large file copy transferred at roughly 100-110MB/s and the random files bounced around a bit but stayed between 50-80MB/s for the duration of the transfer.  This is our benchmark, and now that we know roughly how fast the disks go we can start testing.

Product Setup

Transparent RAID installs in two parts – the host component intended for the machine with the storage drives, and the client component that manages the host.  Installation for the host is taken care of by a batch file that installs the proprietary storage driver and then asks to reboot.  This will be very familiar to anyone who has owned a hardware RAID card as Transparent RAID mimics the same host/client setup.


FlexRaid driver install Review: FlexRAID Transparent RAID

Install of the host software includes a proprietary driver from the developer


One criticism of the install is that log files are generated on the root of C: so after my round of installing and testing I had over 55mb of log files generated.  Depending on the rate of expansion, these could swallow some serious disk space if left unchecked.

The post Review: FlexRAID Transparent RAID appeared first on We Got Served.

http://www.wegotserved.com/2014/08/18/review-flexraid-transparent-raid/feed/ 0
Review: Western Digital My Cloud Mirror http://www.wegotserved.com/2014/08/17/review-western-digital-cloud-mirror/ http://www.wegotserved.com/2014/08/17/review-western-digital-cloud-mirror/#comments Sun, 17 Aug 2014 15:11:03 +0000 http://www.wegotserved.com/?p=69492 It won't break records for performance, but the My Cloud Mirror offers strong features, good looks and great value which combine to make a compelling package for families seeking their first NAS.

The post Review: Western Digital My Cloud Mirror appeared first on We Got Served.


For many families in today’s digital world, the time comes when there is so much data to store and protect in the home – music, video, documents home movies, photos – that it makes sense to move away from external hard drives and think about a network storage solution. Previously, those families used to shopping in Best Buy for well-known brands like Seagate and Western Digital, would be faced with unfamiliar logos such as Synology, QNAP, ASUSTOR and others when considering their selection. But now, with a considered push into network attached storage well under way, Western Digital has launched a number of NAS solutions to help the average family transition to this brave new world.

Today’s subject, the Western Digital My Cloud Mirror, is one arm of the company’s entry-level NAS range. It’s a two-bay NAS device (a single bay option, simply called My Cloud, is also available) shipping in predefined 4 TB, 6 TB and 8 TB capacities. By adding the word “Mirror” into the product name, Western Digital is introducing the concept of redundant data protection in a way that’s simple for the average consumer to understand.

Higher up the range, you’ll find the My Cloud EX2 and EX4 (the latter reviewed in March 2014) which Western Digital class as “Expert” devices. But for “consumers and creative professionals”, it’s the My Cloud and My Cloud Mirror that the company recommends. We received a 4 TB device from Western Digital for review and here’s its story.

What’s in the Box?

As you’d expect from a package designed to woo Mum and Dads from the retail store shelves, the My Cloud Mirror is attractively packaged with its storage, sharing and protection features shouting loudly on the box.


WD My Cloud Mirror Box Review: Western Digital My Cloud Mirror

In the box, you’ll find:

  • WD My Cloud Mirror Personal Cloud Storage device
  • Ethernet cable
  • AC power adapter
  • Quick Install Guide

The WD brand is familiar to most, and for those shopping the big box retail shelves for storage it’s no coincidence that the My Cloud Mirror looks very similar to Western Digital’s larger, direct attached storage solutions. Nestling adjacent to a device like WD’s USB-connected My Book Duo, you could easily imagine a retail assistant in store, seamlessly guiding customers from that product into a first NAS device, such as the My Cloud Mirror.

The device itself looks pretty on the outside, but in NAS terms is very simple and actually feels pretty cheap – a glossy, plastic, white chassis with a plastic silver back and a reasonably flimsy drive lid at the top of the device. Shipping at £239.99 for 4 TB – drives included – you really wouldn’t expect anything more, so the aesthetics do their job well.

While the My Cloud Mirror ships with drives already installed (twin 2 TB WD Red NAS hard drives in our review model) they are upgradable should you wish to extend capacity in the future. Flip the lid and you can see that the drives are held in place reasonably cheaply – there are no drive trays, but rather each drive is fitted with thumb screws which slide into notches on the inner chassis. A bracket then screws across the two drives to hold them in place.

The front face of the My Cloud Mirror is also very simple – three LEDs indicate power and disk activity for the two hard drives. Around the back, the device is fitted with a Gigabit Ethernet port, twin USB 3.0 ports and a Kensington lock. There’s not even a power button – just slot in the power cable and off you go.

WD My Cloud Mirror 3 500x500 Review: Western Digital My Cloud Mirror

Setup and Features

Once connected to the network, initialising the device takes just a few minutes –  a connector application (for Mac or PC) is downloaded from Western Digital’s website. This locates the device, formats the drives (if necessary – a RAID 1 mirrored array is configured by default, but can be changed later) and allows you to install the WD My Cloud client application on your computer. The setup experience, and indeed, the dashboard used to manage the My Cloud Mirror is very similar to that we saw with the My Cloud EX4 earlier in the year – no bad thing, as we found it to be a cinch to use. Unbox and you’ll be up and running in minutes.

WD My Cloud Mirror setup 1 Review: Western Digital My Cloud Mirror


As mentioned, you manage the My Cloud Mirror through a web-based dashboard. Large icons at the top of the screen allow you to navigate through the various configuration menus - Users (for configuring and securing user accounts), Shares (folder management), Cloud Access (remote access configuration), Storage, Apps and Settings. The Home page makes it very easy to keep track of how much storage is available for use, as well as key statistics like network and CPU performance. You then simply click on the relevant arrow to dig down for detailed information. A simple icon system reports warnings and errors on-screen – yellow for important information, red for critical. The order of the day? Simplicity – and Western Digital have simplicity nailed with this excellent user interface.

WD My Cloud Mirror dashboard 1 Review: Western Digital My Cloud Mirror

For an entry-level, two-bay device, the My Cloud Mirror’s feature set is impressive – of course, you’re not going to see a huge array of advanced features as you would with more expensive systems, but the basics are well covered with a couple of surprises thrown in for good measure.

The post Review: Western Digital My Cloud Mirror appeared first on We Got Served.

http://www.wegotserved.com/2014/08/17/review-western-digital-cloud-mirror/feed/ 1
We Got Served Store’s Summer Sale Now On http://www.wegotserved.com/2014/08/15/got-served-stores-summer-sale-now/ http://www.wegotserved.com/2014/08/15/got-served-stores-summer-sale-now/#comments Fri, 15 Aug 2014 12:58:14 +0000 http://www.wegotserved.com/?p=69489 Fill Up on We Got Served eBooks - 25% Off Until Monday

The post We Got Served Store’s Summer Sale Now On appeared first on We Got Served.


You know, it’s been quite  a while since we ran a store-wide sale, so with the sun shining, now’s a great time to kick off our Summer Sale.

Here’s the deal: Use the checkout code SUMMER25 and you’ll save a huge 25% off any eBook in our range at We Got Served Store.

The sale has started now and runs until midnight on Monday. So, if you’ve been holding out on your next project, now’s the time to grab it.

Check out our current Top 10 bestsellers.

The post We Got Served Store’s Summer Sale Now On appeared first on We Got Served.

http://www.wegotserved.com/2014/08/15/got-served-stores-summer-sale-now/feed/ 0
SynoLocker Decryption Database Up For Sale as Attackers Claim Over 5500 Victims http://www.wegotserved.com/2014/08/15/synolocker-decryption-database-sale-attackker/ http://www.wegotserved.com/2014/08/15/synolocker-decryption-database-sale-attackker/#comments Fri, 15 Aug 2014 12:26:11 +0000 http://www.wegotserved.com/?p=69484 Hackers threaten to disappear in the next week, as SynoLocker decryption database is put up for sale at £61,000.

The post SynoLocker Decryption Database Up For Sale as Attackers Claim Over 5500 Victims appeared first on We Got Served.


In a twist to the recent SynoLocker Ransomware attack affecting a number Synology NAS users, researchers over at F-Secure have discovered that the entire SynoLocker database of decryption keys has been put up for sale.

In a note posted at the company’s website, the F-Secure team have reported a change to the message users with infected boxes will see when attempting to access their data. The message, entitled “This website is closing soon…” claims that the SynoLocker operation will be closing down in the next week, with the database of over 5500 unclaimed private keys up for sale at 200 bitcoins (around £61,000 at today’s exchange rate).

Once the website closes, the hackers state that the entire database will be permanently deleted, leaving users unable to decrypt their data – that is, unless someone were to purchase the database and offer keys themselves.


synolocker closing SynoLocker Decryption Database Up For Sale as Attackers Claim Over 5500 Victims



At this point, it is unknown how many users paid the 0.6 Bitcoin ransom to unlock their data but if the hackers are to be believed, many thousands of users have been affected by the exploit. A number of Synology NAS owners have appeared to have paid up and are reporting their experiences attempting to decrypt the devices over at the Synology forums.



The post SynoLocker Decryption Database Up For Sale as Attackers Claim Over 5500 Victims appeared first on We Got Served.

http://www.wegotserved.com/2014/08/15/synolocker-decryption-database-sale-attackker/feed/ 0
Synology Pulls Remote Access Services From Vulnerable NAS Devices in SynoLocker Response http://www.wegotserved.com/2014/08/09/synology-pulls-remote-access-services-vulnerable-nas-devices-synolocker-response/ http://www.wegotserved.com/2014/08/09/synology-pulls-remote-access-services-vulnerable-nas-devices-synolocker-response/#comments Sat, 09 Aug 2014 08:31:48 +0000 http://www.wegotserved.com/?p=69465 Synology moves to protect vulnerable users from SynoLocker exploit as researcher uncovers a wide variety of security issues in NAS devices from multiple vendors

The post Synology Pulls Remote Access Services From Vulnerable NAS Devices in SynoLocker Response appeared first on We Got Served.


Synology last night released a further update to NAS users concerned about the recent SynoLocker ransomware attack. While the company has been criticised by some users on their own forums for slow communication regarding the issue, a number of updates have been issued this week with a consistent call to action: ensure you’re running the latest version of DiskStation Manager on your NAS device.

To reinforce that advice, Synology have now taken the step of blocking certain remote access services for devices that have not been updated. The two services, DDNS and QuickConnect provide easy configuration of NAS devices for remote access over the Internet. By blocking access to remote access services, vulnerable devices should be afforded protection from the SynoLocker exploit while users get around to updating the DiskStation Manager software.

As these remote access services are hosted by Synology (translating device IP addresses to friendly remote access URLs), it’s relatively straightforward for the company to block remote access to devices running outdated and vulnerable versions of the DiskStation Manager software. Undoubtedly, it’s an extreme measure, but one that Synology clearly believes is necessary to prevent further exploitation of its users.

To keep up to date with Synology’s security announcements, it’s well worth bookmarking Synology’s Security Advisory page.

With a recent security review reportedly uncovering a swathe of security vulnerabilities across multiple NAS vendors, we’d advise NAS users to ensure they’re always running the latest version of their NAS software, and evaluating whether they truly need remote access to their devices from across the Internet. The most important advice: ensure you have an offline backup of your important data.

According to Computerworld, the review by Jacob Holcomb, a security analyst at Baltimore-based Independent Security Evaluators, has identified 22 CVE (Common Vulnerabilities and Exposure) issues and more are expected as the study continues. Devices in the evaluation include Asustor’s AS-602T, TRENDnet’s TN-200 and TN-200T1, QNAP’s TS-870, Seagate’s BlackArmor 1BW5A3-570, Netgear’s ReadyNAS104, D-LINK’s DNS-345, Lenovo’s IX4-300D, Buffalo’s TeraStation 5600, Western Digital’s MyCloud EX4 and ZyXEL’s NSA325 v2.

“There wasn’t one device that I literally couldn’t take over”, said Holcomb. 

Here’s the full update from Synology:

Dear Synology users,

We have discovered security vulnerabilities on the software currently installed on your Synology product. These vulnerabilities might result in unauthorized parties compromising your Synology product.

We strongly suggest you install the newest version of DSM as soon as possible. To do so, please visit our Download Center and download DSM 5.0-4493, DSM 4.3-3827, DSM 4.2-3250, or DSM 4.0-2263 according to your current version. Then, log in to DSM and go to Control Panel > Update & Restore > DSM Update > Manual DSM Update (for DSM 4.3 and earlier, please go to Control Panel > DSM Update > Manual DSM Update) and manually install the patch file.

For more information about security issues related to Synology products, please check our Synology Product Security Advisory page.

Running the latest version of DSM is essential to guarantee your Synology product is protected from threats fixed in previous versions. In this respect, we are no longer providing DDNS and QuickConnect services for Synology products that are running vulnerable versions of DSM. To continue enjoying Synology’s DDNS and QuickConnect service, please follow the instructions above to update your Synology product.

We apologize for any inconvenience caused by this issue. Should you encounter any further problems, please feel free to contact our technical support team.

Synology Development Team

The post Synology Pulls Remote Access Services From Vulnerable NAS Devices in SynoLocker Response appeared first on We Got Served.

http://www.wegotserved.com/2014/08/09/synology-pulls-remote-access-services-vulnerable-nas-devices-synolocker-response/feed/ 21
Synology Confirms: No Decyrption Help Available for SynoLocker Victims http://www.wegotserved.com/2014/08/06/synology-confirms-decyrption-help-available-synolocker-victims/ http://www.wegotserved.com/2014/08/06/synology-confirms-decyrption-help-available-synolocker-victims/#comments Wed, 06 Aug 2014 19:58:02 +0000 http://www.wegotserved.com/?p=69459 Update from NAS specialist confirms that data held to ransom through security exploit cannot be decrypted by the company.

The post Synology Confirms: No Decyrption Help Available for SynoLocker Victims appeared first on We Got Served.


Further to our earlier story regarding Synology NAS users having their files encrypted through a ransomware exploit known as “SynoLocker”, the company today admitted that they were unable to offer decryption support for affected users.

An update from Synology today reinforced the fact that the security exploit in the company’s DiskStation Manager software was patched in December 2013. While the company recommends users update their NAS devices to the latest version of DSM (or one of a number of earlier releases apparently unaffected by the issue) there is little comfort for users whose files have already been taken hostage by the exploit.

Synology said today, “For users who have encountered the above symptoms, please shutdown the system immediately to avoid more files from being encrypted and contact our technical support… However, Synology is unable to decrypt files that have already been encrypted.”

Over the last few months, Synology has released a number of updates to patch security holes in the DiskStation Master software. In February 2014, the company announced a patch for a serious exploit that could allow users to gain unauthorised access to data remotely. Then, just last week, another update was released to prevent denial of service attacks on Synology NAS devices.

Whether Synology’s software is less secure than other NAS vendors is unknown, however. It may be that the company is simply the first NAS vendor to be attacked with such an exploit at scale. Certainly, you’d like to think that all of the NAS manufacturers are reviewing their code urgently in the light of this development.

If you have concerns about the vulnerability of the data on your NAS, then you may wish to switch off remote access to your device for the time being – or at the very least, ensure you have the latest version of your NAS device’s operating system on board.

Here’s the latest update from Synology in full:


Synology has confirmed the ransomware affects Synology NAS servers running older versions of DiskStation Manager, by exploiting a vulnerability that was fixed in December, 2013, at which time Synology released patched software and notified users to update via various channels. Affected users may encounter the following symptoms:

  • When attempting to log in to DSM, a screen appears informing users that data has been encrypted and a fee is required to unlock data.
  • Abnormally high CPU usage or a running process called “synosync” (which can be checked at Main Menu Resource Monitor).
  • DSM 4.3-3810 or earlier; DSM 4.2-3236 or earlier; DSM 4.1-2851 or earlier; DSM 4.0-2257 or earlier is installed, but the system says no updates are available at Control Panel >DSM Update.

For users who have encountered the above symptoms, please shutdown the system immediately to avoid more files from being encrypted and contact our technical support here:https://myds.synology.com/support/support_form.php. However, Synology is unable to decrypt files that have already been encrypted. For other users who have not encountered the above symptoms, Synology strongly recommend downloading and installing DSM 5.0, or any  version below:

  • DSM 4.3-3827 or later
  • DSM 4.2-3243 or later
  • DSM 4.0-2259 or later
  • DSM 3.x or earlier is not affected

Users can manually download the latest version from our Download Center and install it at Control Panel DSM Update Manual DSM Update.

Synology sincerely apologises for any problems or inconvenience this issue has caused our users. As cybercrime proliferates and increasingly sophisticated malware evolves, Synology continues to devote resources to mitigate threats and is dedicated to providing users with reliable solutions. If users notice their DiskStation behaving suspiciously even after being upgraded to the latest DSM version, please contact security@synology.com

For the technical details on how the SynoLocker exploit works, check out this article from F-Secure.

The post Synology Confirms: No Decyrption Help Available for SynoLocker Victims appeared first on We Got Served.

http://www.wegotserved.com/2014/08/06/synology-confirms-decyrption-help-available-synolocker-victims/feed/ 5
New QNAP CloudLink App Set to Make Remote Access Simple http://www.wegotserved.com/2014/08/06/new-qnap-cloudlink-app-set-make-remote-access-simple/ http://www.wegotserved.com/2014/08/06/new-qnap-cloudlink-app-set-make-remote-access-simple/#comments Wed, 06 Aug 2014 07:39:36 +0000 http://www.wegotserved.com/?p=69456 QNAP CloudLink app automatically configures remote access to QNAP storage devices without the need for manual port forwarding.

The post New QNAP CloudLink App Set to Make Remote Access Simple appeared first on We Got Served.


This week, QNAP are releasing a brand new app for their QTS NAS operating system designed to assist users configuring remote access to their servers.

The new app, called CloudLink, allows a fully automated remote access setup without the need to manually forward ports on your router to the NAS device.  Just install the CloudLink App from the QTS App Center and sign in to myQNAPcloud ID on your NAS. CloudLink will select an optimised connection for you according to your network environment and then you can connect to your server using the myQNAPcloud website.

Alongside remote web access, CloudLink will allow you to connect to your NAS using QNAP’s Qfile and Qmanager mobile apps as well as the Qsync utility for PCs. You’ll need QTS version 4.1.0 or above to take advantage of CloudLink.

We’ll be taking a look at the new app in a forthcoming reviews of QNAP’s HS-251 Silent NAS.

The post New QNAP CloudLink App Set to Make Remote Access Simple appeared first on We Got Served.

http://www.wegotserved.com/2014/08/06/new-qnap-cloudlink-app-set-make-remote-access-simple/feed/ 0
Synology NAS Devices Hit By SynoLocker Ransomware Exploit http://www.wegotserved.com/2014/08/06/synology-nas-devices-hit-synolocker-ransomware-exploit/ http://www.wegotserved.com/2014/08/06/synology-nas-devices-hit-synolocker-ransomware-exploit/#comments Wed, 06 Aug 2014 07:10:09 +0000 http://www.wegotserved.com/?p=69454 Synolocker ransomware exploit silently encrypts data and demands a payment to unlock files on older versions of Synology DiskStation Manager software.

The post Synology NAS Devices Hit By SynoLocker Ransomware Exploit appeared first on We Got Served.


Last weekend, a flurry of posts hit Synology’s online forums with users complaining that their network attached storage device had been compromised. A message, shown on the DiskStation Manager console told users that their files had been encrypted and could only be unlocked on payment of a ransom. Here’s Synology user K. Salo:

My Diskstation got hacked last night. When I open the main page on the webserver i get a message that SynoLocker has started encrypting my files and that I have to go to a specific address on Tor network to get the files unlocked. It will cost 0.6 BitCoins. It encrypts file by files. Therefore I started to copy my most important files to another disk while encryption was in progress on other files. After the most important files was copied I turned of my disk.

A nasty exploit indeed. Synology has made the following announcement with regard to the issue:

We are fully dedicated to investigating this issue and possible solutions. Based on our current observations, this issue only affects Synology NAS servers running some older versions of DSM (DSM 4.3-3810 or earlier), by exploiting a security vulnerability that was fixed and patched in December, 2013. At present, we have not observed this vulnerability in DSM 5.0.

For Synology NAS servers running DSM 4.3-3810 or earlier, and if users encounter any of the below symptoms, we recommend they shutdown their system and contact our technical support team here: https://myds.synology.com/support/support_form.php:

  •  When attempting to log in to DSM, a screen appears informing users that data has been encrypted and a fee is required to unlock data.
  •  A process called “synosync” is running in Resource Monitor.
  •  DSM 4.3-3810 or earlier is installed, but the system says the latest version is installed at Control Panel > DSM Update.

For users who have not encountered any of the symptoms stated above, we highly recommend downloading and installing DSM 5.0, or any version below:

  •  For DSM 4.3, please install DSM 4.3-3827 or later
  •  For DSM 4.1 or DSM 4.2, please install DSM 4.2-3243 or later
  •  For DSM 4.0, please install DSM 4.0-2259 or later

DSM can be updated by going to Control Panel > DSM Update. Users can also manually download and install the latest version from our Download Center here: http://www.synology.com/support/download.

If users notice any strange behaviour or suspect their Synology NAS server has been affected by the above issue, we encourage them to contact us at security@synology.com where a dedicated team will look into their case.

We sincerely apologise for any problems or inconvenience this issue has caused our users. We will keep you updated with the latest information as we address this issue.

Fingers crossed a rapid recovery solution is found for those users affected by the bug. For more on the SynoLocker conversations, check out this link and this link over at Synology’s forums.

The post Synology NAS Devices Hit By SynoLocker Ransomware Exploit appeared first on We Got Served.

http://www.wegotserved.com/2014/08/06/synology-nas-devices-hit-synolocker-ransomware-exploit/feed/ 3
Amahi Home Server v7.4 Released With Enhanced UI, Plugin Framework and Android App http://www.wegotserved.com/2014/07/30/amahi-home-server-v7-4-released-enhanced-ui-plugin-framework-android-app/ http://www.wegotserved.com/2014/07/30/amahi-home-server-v7-4-released-enhanced-ui-plugin-framework-android-app/#comments Wed, 30 Jul 2014 11:42:01 +0000 http://www.wegotserved.com/?p=69442 New release for Amahi Home Server brings easier storage management and remote access features.

The post Amahi Home Server v7.4 Released With Enhanced UI, Plugin Framework and Android App appeared first on We Got Served.


Amahi Home Server, the free, open-source home server platform, had an update this week. The new release, v7.4 offers a range of usability enhancements and new features which is sure to excite the Amahi community and is likely to bring new fans to the platform.

Those features include Greyhole UI, which offers easier configuration and management of storage pools on the platform, alongside the integration of the Bootstrap framework from Twitter which will boost the web-based management console.  There’s a new plugin framework which should make life easier for developers wishing to bring new and extended features to Amahi in the future. The new platform also utilises Ruby on Rails 4.1 and Ruby 2, which the Amahi team say will improve overall performance, security and efficiency of the platform.

Also released alongside the platform update is a new Amahi app for Android, designed to help you access the content stored on your home server when you’re on the go. The app offers easy remote access (without the need for port forwarding or VPNs) to your files and folders as well as remote media streaming of popular file formats such as  MPEG-4MKVDivXXvid, MP3 and others, courtesy of an integrated VLC media player. 

The new app supports phones and tablets running Android 4.2 and later.

If you’ve yet to check Amahi out, head over to the developer’s website to learn more.

The post Amahi Home Server v7.4 Released With Enhanced UI, Plugin Framework and Android App appeared first on We Got Served.

http://www.wegotserved.com/2014/07/30/amahi-home-server-v7-4-released-enhanced-ui-plugin-framework-android-app/feed/ 0
Synology Patches NAS Security Vulnerability, Improves RAID Stability http://www.wegotserved.com/2014/07/30/synology-patches-nas-security-vulnerability-improves-raid-stability/ http://www.wegotserved.com/2014/07/30/synology-patches-nas-security-vulnerability-improves-raid-stability/#comments Wed, 30 Jul 2014 07:08:05 +0000 http://www.wegotserved.com/?p=69440 Important update for Synology NAS devices patches remote access vulnerability and improves volume expansion stability.

The post Synology Patches NAS Security Vulnerability, Improves RAID Stability appeared first on We Got Served.


Synology has just announced an “important update” for their DiskStation Manager operating system.

In an email issued overnight, the company said:

Dear Synology users,

We have released an update with several important enhancements for the DiskStation Manager (DSM) 4.3-3827. It is available for download on your DSM: Control Panel > DSM Update. It is always recommended that you install the latest update to obtain an even smoother user experience. Should you encounter any issues, please do not hesitate to contact our expert support team.

If you haven’t upgraded to DSM 4.3-3827, it can be found at our Download Center.

Synology Development Team

The update itself includes the following fixes:


  1. Improved the stability of volume expansion.

Fixed Issues

  1. Fixed two SAMBA vulnerabilities which allowed remote attackers to use the weaknesses to perform DoS attacks (CVE-2014-0244, CVE-2014-3493).
  2. Fixed an issue which prevented users from being able to log into DSM after completing QuickConnect Wizard after a fresh DSM installation.
  3. Fixed an issue causing slow response time in DSM on the early version of RS10613xs+ when too many concurrent connections were active.

Two issues in particular stand out. The update suggests the previous possibility of issues that could occur when users attempt to increase the size of their RAID arrays, as well as a security vulnerability that could allow access to your storage device from a remote connection. Given the potential risk to data here, we’d recommend that Synology users grab the update as soon as possible.


The post Synology Patches NAS Security Vulnerability, Improves RAID Stability appeared first on We Got Served.

http://www.wegotserved.com/2014/07/30/synology-patches-nas-security-vulnerability-improves-raid-stability/feed/ 0
New Fitbit App Provides a Kick For Windows Phone 8.1 http://www.wegotserved.com/2014/07/30/new-fitbit-app-provides-kick-windows-phone-8-1/ http://www.wegotserved.com/2014/07/30/new-fitbit-app-provides-kick-windows-phone-8-1/#comments Wed, 30 Jul 2014 06:46:28 +0000 http://www.wegotserved.com/?p=69436 Launch of Windows Phone 8.1 fitness app sees Fitbit providing support for the top 3 smartphone platforms.

The post New Fitbit App Provides a Kick For Windows Phone 8.1 appeared first on We Got Served.


While it’s fair to say that Windows Phone didn’t hit the ground running at launch, the list of official apps for the smartphone platform is slowly accelerating.

Health and wellbeing fans will be pleased to hear the news from Fitbit, who are launching a free app for Microsoft’s Windows Phone 8.1 devices to allow them to work with the company’s range of fitness trackers.

With the app, data can be synced from a Fitbit tracker to the smartphone using a Bluetooth connection so users can monitor stats such as steps taken, distance travelled, calories burned, active minutes, floors climbed and sleep quality. Support for Windows Phone Live Tiles provides up-to-date content and notifications at a glance.

James Park, CEO and Co-founder of Fitbit: “Windows Phone is projected to be the fastest growing smartphone OS platform, so supporting this platform is important so that all of our users have access to their stats, no matter which phone they choose. With our new Fitbit app for Windows Phone 8.1, we expand our already extensive list of leading Android and iOS supported devices, to bring Fitbit’s benefits to even more users.”

The launch of a Windows Phone 8.1 app sees Fitbit now supporting the top 3 smartphone platforms with a direct sync capability. According to the company, over one hundred devices are now welcome to work with Fitbit.

Check out our review of the Fitbit Flex activity tracker – a device I’ve been happily using for over eighteen months.

The post New Fitbit App Provides a Kick For Windows Phone 8.1 appeared first on We Got Served.

http://www.wegotserved.com/2014/07/30/new-fitbit-app-provides-kick-windows-phone-8-1/feed/ 0
New Seagate Channel for ROKU Makes Media Streaming Easier http://www.wegotserved.com/2014/07/24/new-seagate-channel-roku-makes-media-streaming-easier/ http://www.wegotserved.com/2014/07/24/new-seagate-channel-roku-makes-media-streaming-easier/#comments Thu, 24 Jul 2014 11:53:54 +0000 http://www.wegotserved.com/?p=69422 Stream media from Seagate Central or Seagate Wireless Plus to your Roku with a brand new channel.

The post New Seagate Channel for ROKU Makes Media Streaming Easier appeared first on We Got Served.


Seagate’s wireless hard drives have been around for a couple of years now and are a great way of streaming media to devices that may not have a traditional Ethernet connection, such as smartphones, tablets and so on.

I own one and use it in the car for the kids to watch movies and we’ll be taking it on holiday with us this summer to ensure we’ve got a big chunk of our media library with us as we travel (Fringe boxset, here we come).

With compatible streaming apps for iOS and Android mobile devices in the bag, Seagate has turned its attention to other devices in the home. A while back, an app for Samsung Smart TV was launched, and today the company has announced the a new partnership with Roku to allow their media streamers to access content stored on Seagate Central or Seagate Wireless Plus devices.

Music, movies, photos, and more can be streamed from your Seagate networked storage device to the Roku media player in a rich experience that includes cover art for movies, albums, song titles for music and thumbnails for photos.

seagate roku1 New Seagate Channel for ROKU Makes Media Streaming Easier

With over 1500 channels, Roku is the most-used streaming media player in the U.S, according to industry analysts, Parks Associates.

So, add a cheap Roku streamer you your travel bag and you have a very mobile-big-screen streaming solution for holidays or business travel.

The post New Seagate Channel for ROKU Makes Media Streaming Easier appeared first on We Got Served.

http://www.wegotserved.com/2014/07/24/new-seagate-channel-roku-makes-media-streaming-easier/feed/ 0