Vse O Računalniških Virusih

Total Page:16

File Type:pdf, Size:1020Kb

Vse O Računalniških Virusih vse o računalniških virusih 9/12 6,55 € september 2012 / letnik 22 www.monitor.si zabavna elektronika i računalništvo i nove tehnologije Poplava tankih Izvirni tanki prenosnik Apple MacBook Air ima v okenskem svetu že množico posnemovalcev. • Preizkusili smo jih 10. • Od 700 evrov naprej. vse v enem + Zasloni na dotik – kako delujejo + Googlova tablica Nexus 7 + Novi fotoaparati Preizkusili smo 15 novih omrežnih diskov NAS, ki so danes že pravi večopravilniki. + Nasveti za ISSN 1318-1000 ISSN Spogledujejo se celo z oblakom, eni bolje, drugi slabše. Windows in Mac Naslovka 09-2012.indd 1 21.8.2012 11:12:49 OMREŽNI DISKI NAS RAID v vsak dom! Omrežni diski NAS so bili še nedavno domena res hudih računalniških navdušencev in manjših podjetij. Tistih torej, ki jim je v krajevnem omrežju vedno primanjkovalo diskovnega prostora. Danes se stvari spreminjajo – z razmahom filmskega piratstva (da, recimo bobu bob!) je tudi v povprečnem domu vedno premalo diskovnega prostora, da o dodatnih možnostih, ki jih zmorejo današnji NASi, niti ne govorimo. 44 I Podatkovne škatle 46 I Domači oblaki 49 I Preizkušeni modeli 54 I Pogled v laboratorij in zlati Monitor 56 I Grafikoni 58 I Tabela Matjaž Klančar a, kilobajti, megabajti, giga- Poanta? En disk enostavno ni dovolj, potre- ko pri nekaterih modelih skoraj poljubno bajti, terabajti, skratka bajti bujemo vsaj dva za izdelavo varnostnih kopij. dodajamo in da zmorejo še vse kaj več, kot na sto in en način, so tisto, V računalnik namestimo dva diska (oz. si le hranijo podatke. Omogočajo postavitev kar v računalništvu že od omislimo zunanjega, priklopljenega prek spletnega strežnika, medijskega strežnika nekdaj kaže znake nenehne- USB) in nanj občasno prekopiramo vsebine, (DLNA, iTunes), poštnega strežnika, nad- ga naraščanja. Prvi računal- ki se nam zdijo pomembne. Ne, popravek zornega strežnika (nanj priklopimo kamere) Dniki so imeli le nekaj bajtov pomnilnika, prvi »občasno« ne bo dovolj, kajti ponavadi se iz- in še in še. Pravi mali švicarski nož. osebni računalniki že 1 kilobajt (Sinclair ZX kaže, da ročno kopiranje ne deluje, ker nanj Edina težava? Cena. Že sama prazna ška- 81), prve disketne enote za PCje so bile »dvoj- pozabimo. Bolje je, če si omislimo enega iz- tla stane več, kot bi si želeli za poceni linuxni ne gostote« (!) in so zmogle 360 KB. Mimo- med programov, ki to počnejo avtomatsko, re- računalnik na podlagi procesorja ARM (spo- grede, besedilo, ki ga berete, na disku zasede cimo ponoči. Če imate seveda računalnik pri- mnimo se mini računalnika Raspberry Pi, ki več. Brez fotografij. Nato smo počasi prešli na žgan 24 ur na dan, a ga najverjetneje nimate. ga dobimo za dobrih 30 evrov), ko jo napol- megabajte (prvi disk za PCje – 10 MB), nato Boljša rešitev je zrcaljenje (mirror), pri če- nimo z diski, pa cena hitro poskoči do 500 na gigabajte in, da, danes smo pri terabajtih. mer sta v računalniku dva enaka diska (no, ali celo 1000 evrov. No, za miren spanec brž- Disk zmogljivosti 2 TB stane borih 100 evrov. ni čisto nujno), njuna vsebina pa se sinhro- kone ni previsoka. Dva terabajta je izredno velika številka. Če nizira sproti, med delom. Če eden izmed di- bi hoteli tak disk napolniti prek danes naj- skov odpove, drugi deluje naprej. Večinoma, hitrejše krajevne omrežne povezave (giga- včasih tudi z nekaj dodatnega dela … Pri MONITORTV bitne), bi ga morali pri polni hitrosti polniti zrcaljenju sta le dve težavi – ko tako »zrca- več kot 5 ur! Toda – ali sploh je način, da bi lo« napolnimo, je dokaj težko dodati še kaj Oglejte si tudi video tak disk s čimerkoli napolnili? Z običajnimi prostora. Najenostavneje je kar kupiti nova Tudi tokrat si lahko glavno temo številke dokumenti, besedilom, fotografijami, celo z diska in postaviti novo zrcalno polje, to pa ni ogledate tudi v našem MonitorTVju. Najde- glasbo MP3 najverjetneje ne. Toliko prostora ravno poceni. In seveda – če se računalniku te ga na priloženem DVDju in v spletu: potrebujemo bolj ali manj le za eno – za video kaj hudega zgodi (kratek stik ali celo požar), www.monitor.si/NAS_2012 datoteke. In, da, recimo bobu bob, za piratske bosta pri tem odpovedala oba diska. Potre- video/filmske datoteke. Pri čemer bo še ve- bujemo torej nekaj, kar je lahko odmaknjeno dno ostalo dovolj prostora za dokumentirano od računalnika in dovolj veliko za več diskov. otroštvo naraščaja, v slikovni in video obliki. In prav slednje marsikomu pomeni veliko Končna rešitev – omrežni disk NAS! več kot hollywoodski filmi. Kaj bi se zgodilo, NAS (Network Attached Service) je dan- če/ko bi tak disk odpovedal? Filme bi naloži- danes škatla, v katero lahko vstavimo dva li na novo, kaj pa bi z večletnimi digitalnimi ali več diskov in je nekakšen mini računal- spomini? Izgubljeni, za vedno. Kajti diski v re- nik z Linuxom. Oboje skupaj pomeni, da snici tudi odpovejo. Vedno, prej ali slej. Zgoraj so podatki v njej nadvse varni, saj so diski podpisanemu se je to nazadnje zgodilo pred lahko sestavljeni v različna polja RAID (od tednom dni – 1,5 TB je šlo »rakom žvižgat«. zrcaljenja do RAID 5 ali celo 10), da jih lah- 09.12 I I 43 FOKUS I OMREŽNI DISKI NAS Podatkovne škatle Čeprav smo strežnike NAS preizkusili pred manj kot letom dni, se je že nabralo kar nekaj novosti. Tako smo se odločili za nov veliki preizkus in se prepričali, da so te naprave že zelo izpopolnjene in nadvse uporabne. Jure Forstnerič a te naprave poznamo v grobem vsaj doma, še premalo potrudi. Pregovor pra- Podatke moramo torej imeti shranjene na dve vrsti rabe. V osnovi lahko nanje vi, da sta dve vrsti uporabnikov – tisti, ki re- več različnih napravah oziroma krajih. To, le varnostno kopiramo in jih ima- dno izdelujejo varnostne kopije, in tisti, ki se da so v nekem NAS strežniku, pa četudi je mo po možnosti kje daleč stran od jim še ni pokvaril disk. Preveč ljudi je namreč na varnem pred krajo, požarom in podob- Zračunalnika. Uporabljamo pa jih lahko tudi prepričanih, da so podatki, ki jih imajo shra- nim, nam v nekaterih primerih prav nič ne kot velik prostor za shranjevanje vsega po njene na zunanjem disku, varni. Žal ni tako. pomaga. Še vedno se lahko okužimo z viru- vrsti – prav za to so zadnje čase pri domačih Tudi če gre za kopije podatkov, ki jih ima- som in nam ta uniči tudi podatke v napravi uporabnikih vedno bolj priljubljene. Podat- mo v računalniku, je še vedno preveliko NAS (če je seveda dosegljiva iz računalnika). kov je namreč veliko in hitro se množijo. tveganje, sploh če je disk v bližini računal- Enako velja tudi za datoteke, ki jih sami ne- Vse več uporabnikov ima doma digitalni nika (ali pa kar priključen nanj). Ob ropu bo namerno zbrišemo – RAID nam prav nič ne fotoaparat, ti modeli pa iz leta v leto izde- storilec pograbil oboje, tako računalnik kot pomaga, če datoteko izbrišemo tudi tam. lujejo večje fotografije (gledano v smislu disk. Podobno poguben je lahko za oboje Pri datotekah lahko pride tudi do program- pomnilniškega prostora). Že telefoni so udar strele. skih težav (korupcije). sposobni zajeti fotografijo, ki tehta več me- Naprave NAS resda povečajo varnost po- V vseh teh primerih bi potrebovali kopijo gabajtov, fotoaparati pa brez težav sežejo datkov, a tudi še ne predstavljajo zadovo- podatkov na kakem oddaljenem oziroma čez deset MB – da o fotografijah RAW, ki tudi ljive stopnje varnosti. RAID polja namreč odklopljenem kraju. NAS strežnik je torej pri cenejših DSLRjih obsegajo več kot 20 niso celovita rešitev za izdelavo varnostnih nadvse učinkovita prva stopnja, še vedno MB, niti ne govorimo. Vedno več posname- kopij. Z njimi iz enačbe pravzaprav izločimo pa moramo tu in tam poskrbeti tudi za var- mo tudi video gradiva. Ta res hitro odroma le eno ranljivost – možnost, da nam crkne nostno kopijo podatkov, ki so shranjeni v na YouTube, a praviloma obdržimo tudi ori- eden izmed diskov. Še vedno pa se lahko NASu. Vse preizkušene naprave imajo zato ginalni zapis. pokvari krmilnik naprave RAID ali pa nam, kak dodaten vmesnik za prenos podatkov, Za shranjevanje teh pomembnih datotek skupaj z računalnikom, ukradejo tudi na- cenejše imajo USB 2.0, dražje pa tudi USB oziroma podatkov se večina uporabnikov, pravo RAID. 3.0 ali celo eSata. Tako lahko podatke na hi- tro prekopiramo še na zunanji disk in ga po možnosti shranimo na kakem drugem kraju. Vse bolj priljubljena je tudi raba spletnih storitev, saj nam zagotovijo še dodatno sto- pnjo varnosti podatkov. Slabost teh storitev pa je cena (gledano na prostor). Najpo- membnejše podatke resda lahko shranimo na brezplačne storitve (Dropbox, Wuala, Skydrive, Gdrive ...), za fotografije in video pa bodo te kmalu premajhne oziroma pre- drage. Tu je seveda še vprašanje zasebnosti (marsikdo raje ne bi delil slik in dokumentov z neznanimi podjetji, četudi se pridušajo, da do datotek pravzaprav nimajo dostopa). To lahko rešimo s predhodnim kriptiranjem datotek, a zahteva kar nekaj znanja in časa. Strežniki NAS so vedno bolj priljubljeni tudi kot zbirališče vseh možnih večpred- stavnih datotek, ki jih lahko dosežemo z različnih domačih naprav. V njih imamo, re- cimo, shranjene vse filme, vso glasbo in vse fotografije, kar jih premore gospodinjstvo. Vzporedno lahko s pomočjo vgrajenega večpredstavnega strežnika predvajamo film na televizorju, vrtimo glasbo na računalniku in si ogledujemo fotografije na tablici. Tako si prihranimo nadležno kopiranje po raz- Kljub temu, da gre za dve napravi, namenjeni domačim uporabnikom, ličnih ključih USB in diskih – vse je zbrano ima Synologyjev DS-212j bistveno večji ventilator kot Qnapov TS-212, na enem mestu, ki ga dosežemo z vsemi v kar se pozna pri glasnosti delovanja. omrežje povezanimi napravami. 44 I I 09.12 OMREŽNI DISKI NAS Polja RAID šnji, julijski številki).
Recommended publications
  • Synology Router Rt2600ac Hardware Installation Guide
    Synology Router RT2600ac Hardware Installation Guide Table of Contents Chapter 1: Meet Your Synology Router Package Contents 3 Synology Router at a Glance 4 Safety Instructions 5 Chapter 2: Set up Your Synology Router Install Antennas 6 Position Your Synology Router 7 Connect to Your Synology Router 7 Set up Synology Router Manager (SRM) 9 Appendix A: Specifications Appendix B: LED Indicator Table Synology_HIG_RouterRT2600ac_20160930 2 Chapter Meet Your Synology Router 1 Thank you for purchasing this Synology product! Before setting up your new Synology Router, please check the package contents to verify that you have received all of the items below. Also, make sure to read the safety instructions carefully to avoid harming yourself or damaging your Synology Router. Note: All images below are for illustrative purposes only, and may differ from the actual product. Package Contents Main unit x 1 AC power adapter x 1 RJ-45 LAN cable x 1 Antenna x 4 3 Chapter 1: Meet Your Synology Router Synology Router at a Glance No. Article Name Location Description 1 Antenna Base Install the included antennas here. 2 Power Button Press to power on/off the Synology Router. 3 Power Port Connect the AC power adapter here. Press and hold for four seconds (Soft Reset) or for ten seconds (Hard 4 RESET Button Rear Panel Reset). Connect an external drive, USB printer, or other types of USB devices 5 USB 2.0 Port here. Connect a network cable from the ISP modem into this port to establish 6 WAN Port WAN connection. 7 LAN Port Connect network cables into these ports to establish LAN connection.
    [Show full text]
  • Synology Rackstation RS1221RP+ Hardware Installation Guide
    Synology NAS RS1221RP+ Hardware Installation Guide Table of Contents Chapter 1: Before You Start Package Contents 3 Synology RS1221RP+ at a Glance 4 System Modes and LED Indicators 6 Other LED Indicators 8 Hardware Specification 9 Spare Parts 10 Optional Accessories 10 Safety Instructions 11 Chapter 2: Hardware Setup Tools and Parts for Component Installation 12 Install Drives 12 Install Memory Modules 14 Install a PCle Add-in Card 17 Mount the Synology NAS to a 4-Post Rack 18 Start up Your Synology NAS 20 Chapter 3: System Maintenance Replace System Fan 21 Replace Power Supply Unit (PSU) 23 Chapter 4: Install DSM on Synology NAS Install DSM with Web Assistant 24 Learn More 24 Synology_HIG_RS1221RP+_20200928 2 Chapter Before You Start 1 Thank you for purchasing this Synology product! Before setting up your new Synology NAS, please check the package contents to verify that you have received the items below. Also, make sure to read the safety instructions carefully to avoid harming yourself or damaging your Synology NAS. Note: All images below are for illustrative purposes only, and may differ from the actual product. Package Contents Main unit x 1 AC power cord x 2 Screws for 3.5" drives x 36 Screws for 2.5" drives x 36 Drive tray key x 2 3 Synology RS1221RP+ at a Glance 1 23 4 5 6 7 7 8 9 10 11 12 13 8 14 15 No. Article Name Location Description Displays the power status of your Synology NAS. For more 1 POWER Indicator information, see "System Modes and LED Indicators".
    [Show full text]
  • News Announcement Announcement
    NEWS ANNOUNCEMENT DVBLogic , Synology and PCTV Systems Working Together to Bring Extended Freedom to TV at Home DVBLink Package Turns Synology NAS into Rich Featured Centre of Connected TV Experience Berlin, 12 September 2012 News Facts • DVBLink Package for up to four TV tuner s runs on most Synology NAS • Supports all popular DVB TV standards in parallel • Optimized for TV tuners from PCTV Systems • Live TV and recorded shows on DLNA enabled TVs and CE devices as well as computers (Windows, Mac and Linux) • Schedule and manage recordings via web interface and DVBLink Mobile Client Apps for iOS, Android and Win dows Phone • Electronic program guides (EPG) on all clients within the home network • DVBLink TV Server for Time-shift TV on all streaming clients Synology NAS turning the NAS • Stand-alone solution - works without a PC into a personal video recorder (PVR) and server for Live TV. Porting the DVBLink software into a Synology NAS package brings TV streaming, remote recording and EPG to NAS devices further freeing TV from being stuck on CE devices or in PC environments. Attached to any home network and equipped with a PCTV tuner, the NAS device becomes the central TV device at home. T he DVBLink App makes Live- TV and recorded content available on a number of clients throughout the house. Managing recordings and browsing the EPG is also available on mobile phones in the same Wi Fi thanks to the DVBLink Mobile Client Apps. All configuration and management of the Package is done via a web interface. A pure CE TV experience brings easy access to channels and programs on favourite TV device, needs no fiddling around with softwa re installations and only those devices up and running that are really necessary.
    [Show full text]
  • NAKIVO Backup & Replication V10.1
    What’s New NAKIVO Backup & Replication v10.1 What’s New www.nakivo.com 1 What’s New What’s New in Backup for Microsoft Office 365 With NAKIVO Backup & Replication, businesses can ensure that their Microsoft Office 365 data is always accessible and recoverable when they face data loss events and ransomware attacks. With version 10.1, NAKIVO expands the functionality of Backup for Microsoft Office 365 to include protection for OneDrive for Business in addition to Exchange Online. Now you can use NAKIVO Backup & Replication to back up Exchange mailboxes and OneDrive for Business data and perform granular recovery of emails, attachments, files and folders. NAKIVO Backup & Replication is an all-in-one data protection solution for virtual, physical, cloud and SaaS environments. Customers can improve recovery times, reduce storage costs, shrink backup windows and automate data protection with a range of backup and recovery features. See for yourself how well NAKIVO Backup & Replication works in your environment with the 15-day Free Trial. OneDrive for Business Backup Backup for Microsoft Office 365 with NAKIVO Backup & Replication helps businesses to mitigate the risk of data loss by offering cost-effective backup and instant recovery for OneDrive for Business. Customers can: • Perform incremental backups of OneDrive • Locate OneDrive objects quickly by searching for Business data backups by file or folder name • Instantly recover OneDrive files and folders • Protect up to thousands of OneDrive for back to the original OneDrive account or Business user accounts with a single software different accounts deployment 2 What’s New Improvements • Ability to use locking functionality on a Backup • The Director service can now be restarted Repository so it can be used by only one directly from the web interface.
    [Show full text]
  • Nass Big and Small
    superguide » network-attached storage NAS BOX OS All NASs REVIEWS big and small Nathan Taylor tests a bevy of the latest two-, six-, seven- and eight- bay network-attached storage boxes. ith all the stuff we’re USED IN: NETGEAR NAS BOXES USED IN: QNAP DEVICES downloading these days, most of us need a little extra storage capacity. WSure, you can crack your PC and Netgear install extra hard drives, or start attaching USB drives, but eventually ReadyNAS QNAP you run out of room. A NAS is frequently a better investment, making downloaded media, personal OS 6.2 QTS 4.1 photos and videos, and other shared media accessible to all. Given their etgear’s ReadyNAS OS sits TS remains hands down our inbuilt support for RAID, they also somewhere between the favourite NAS OS, rivalled only make excellent platforms for securing extreme flexibility of QNAP by Synology. It’s powerful and your data against drive failures. and the simple interface of feature-rich, but manageable Most NASs these days also offer a lot NSeagate. It uses a straightforward Qfor those with no networking experience. more than file sharing. They’re fully- tabbed interface, although it’s not as Running on Linux, QTS presents to the fledged server platforms, capable of accessible as these platforms. There’s user as an operating system within your transcoding video on the fly, serving an expectation that you know a little browser, with movable and resizable web sites, automatically managing and about networking and user and windows and all. Components are recording feeds from IP cameras and volume management, and it’s not the logically arranged into windows: one for even in some cases, being platforms for friendliest platform for new users.
    [Show full text]
  • German Cities Exposed a Shodan-Based Security Study on Exposed Cyber Assets in Germany
    German Cities Exposed A Shodan-based Security Study on Exposed Cyber Assets in Germany Natasha Hellberg and Rainer Vosseler Trend Micro Forward-Looking Threat Research (FTR) Team A TrendLabs Research Paper Contents TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and 4 should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Exposed Cyber Assets Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro 5 reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are Exposed Cities: intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise Germany related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or 12 enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro Exposed Cyber Assets makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree in Germany that access to and use of and reliance on this document and the content thereof is at your own risk.
    [Show full text]
  • Synology NAS DS920+ Guía De Instalación Del Hardware
    Synology NAS DS920+ Guía de instalación del hardware Contenido Capítulo 1: Antes de comenzar Contenido de la caja 3 Synology DS920+ de un vistazo 4 Tabla de indicadores LED 5 Especificaciones de hardware 6 Accesorios opcionales 7 Piezas de repuesto 7 Instrucciones de seguridad 8 Capítulo 2: Configuración del hardware Herramientas y piezas para la instalación de los componentes 9 Instalación de discos 9 Arrancar su Synology NAS 11 Agregar un módulo de memoria en Synology NAS 12 Agregar una SSD M.2 NVMe en Synology NAS 14 Capítulo 3: Mantenimiento del sistema Guía de solución de problemas iniciales 16 Capítulo 4: Instalar DSM en Synology NAS Instalar DSM con Web Assistant 17 Más información 17 Synology_HIG_DS920+_20200227 2 Capítulo Antes de comenzar 1 Gracias por comprar este producto Synology. Antes de configurar su nuevo Synology NAS, compruebe el contenido de la caja para asegurarse de que ha recibido los siguientes elementos. Asegúrese también de leer detenidamente las instrucciones de seguridad para evitar lesionarse o dañar su Synology NAS. Observación: Todas las imágenes siguientes se proporcionan solamente para fines ilustrativos y pueden no corresponderse con el producto real. Contenido de la caja Unidad principal x 1 Cable de alimentación de CA x 1 Adaptador de alimentación de CA x 1 Llave para la bandeja del Tornillos para discos de 2,5” x 18 Cable RJ-45 LAN x 2 disco duro x 2 3 Synology DS920+ de un vistazo 1 2 11 7 3 4 8 12 9 5 10 13 6 N. º Nombre del artículo Ubicación Descripción Muestra el estado del sistema.
    [Show full text]
  • Quantifying the Role of Iot Manufacturers in Device Infections
    Superspreaders: Quantifying the Role of IoT Manufacturers in Device Infections Elsa Rodríguez1 , Arman Noroozian1,2, Michel van Eeten1, and Carlos Gañán1 (1) Delft University of Technology, (2) University of Amsterdam {e.r.turciosrodriguez, a.noroozian, m.j.g.vaneeten, c.hernandezganan}@tudelft.nl Abstract their devices. Similarly, engaging with certain other actors, for instance ISPs who are in a position to mitigate part of The influx of insecure IoT devices into the consumer mar- this problem on a short-term basis, still leaves much to be ket can only be stemmed if manufacturers adopt more secure addressed [5]. A consensus is emerging that governmental practices. It is unlikely that this will happen without gov- interventions are required to overcome the incentive prob- ernment involvement. Developing effective regulation takes lem [6]. While governments are debating long-term solutions years. In the meantime, governments have an urgent need regulatory strategies like apportioning liability and setting to engage manufacturers directly to stop the damage from minimum security standards, and some liability frameworks getting worse. The problem is that there are many thousands are being proposed [7], there is a short-term need to engage of companies that produce IoT devices. Where to start? In this manufacturers to reduce the current influx of insecure devices. paper, we focus on identifying the most urgent class: the man- To illustrate: in 2016, the U.S. Federal Trade Commission ufacturers of IoT devices that get compromised in the wild. (FTC) lodged a complaint against ASUS because the com- To identify the manufacturers of infected IoT, we conducted pany “failed to take reasonable steps to secure the software active scanning of Mirai-infected devices.
    [Show full text]
  • Rank Downloads Q3-2017 Active Platforms Q3-2017 1 HP
    Rank Brand Downloads Q3-2017 Active platforms q3-2017 Downloads y-o-y 1 HP 303,669,763 2,219 99% 2 Lenovo 177,100,074 1,734 68% 3 Philips 148,066,292 1,507 -24% 4 Apple 103,652,437 829 224% 5 Acer 100,460,511 1,578 58% 6 Samsung 82,907,164 1,997 72% 7 ASUS 82,186,318 1,690 86% 8 DELL 80,294,620 1,473 77% 9 Fujitsu 57,577,946 1,099 94% 10 Hewlett Packard Enterprise 57,079,300 787 -10% 11 Toshiba 49,415,280 1,375 41% 12 Sony 42,057,231 1,354 37% 13 Canon 27,068,023 1,553 17% 14 Panasonic 25,311,684 601 34% 15 Hama 24,236,374 394 213% 15 BTI 23,297,816 178 338% 16 3M 20,262,236 712 722% 17 Microsoft 20,018,316 639 -11% 18 Bosch 20,015,141 516 170% 19 Lexmark 19,125,788 1,067 104% 20 MSI 18,004,192 545 74% 21 IBM 17,845,288 886 39% 22 LG 16,643,142 734 89% 23 Cisco 16,487,896 520 23% 24 Intel 16,425,029 1,289 73% 25 Epson 15,675,105 629 23% 26 Xerox 15,181,934 1,030 86% 27 C2G 14,827,411 568 167% 28 Belkin 14,129,899 440 43% 29 Empire 13,633,971 128 603% 30 AGI 13,208,149 189 345% 31 QNAP 12,507,977 823 207% 32 Siemens 10,992,227 390 183% 33 Adobe 10,947,315 285 -7% 34 APC 10,816,375 1,066 54% 35 StarTech.com 10,333,843 819 102% 36 TomTom 10,253,360 759 47% 37 Brother 10,246,577 1,344 39% 38 MusicSkins 10,246,462 76 231% 39 Wentronic 9,605,067 305 254% 40 Add-On Computer Peripherals (ACP) 9,360,340 140 334% 41 Logitech 8,822,469 1,318 115% 42 AEG 8,805,496 683 -16% 43 Crocfol 8,570,601 162 268% 44 Panduit 8,567,835 163 452% 45 Zebra 8,198,502 433 72% 46 Memory Solution 8,108,528 128 290% 47 Nokia 7,927,162 402 70% 48 Kingston Technology 7,924,495
    [Show full text]
  • PDF Document
    Nassau BOCES Bid Information Contact Information Ship to Information Bid Owner Joan Hoy Buyer Address 71 Clinton Road Address AS INDICATED ON PURCHASE Email [email protected] ORDERS ISSUED AS A RESULT OF Phone (516) 396-2418 Garden City, NY 11530-9195 THE AWARD OF THIS BID. Fax (516) 997-1053 Contact Michael R. Perina/Purchasing Agent Department NY Bid Number 19/20-028-Computer Hardware, Building Contact AS INDICATED ON PURCHASE Software, Supplies an Floor/Room ORDERS ISSUED AS A RESULT Title 19/20-028-Computer Hardware, Telephone (516) 396-2240 Department Software, Supplies and Fax (516) 997-1053 Building Parts-Supplemental Email [email protected] Floor/Room Bid Type ITB Telephone Issue Date 06/10/2019 Fax Close Date 7/2/2019 02:00:00 PM (ET) Email Supplier Information Supplier Notes Company Name Contact Name Address Telephone Fax Email By submitting your response, you certify that you are authorized to represent and bind your company. Signature Date / / Bid Notes This bid contains several document attachments that contain important information for potential bidders. Please review all of the attached documents carefully before responding to this bid opportunity. You may respond to this bid electronically by clicking the 'Respond' button. Click the 'Help' button in the upper right-hand corner of the screen to access the Suppliers Users Guide for more information on responding to bids electronically. Bid Activities Bid Messages Bid Attachments 19/20-028-Computer Hardware, Software, Supplies an - Page 1 of 266 The following attachments
    [Show full text]
  • Running Debian on Inexpensive Network Attached Storage Devices
    Running Debian on Inexpensive Network Attached Storage Devices Martin Michlmayr [email protected] This is my personal opinion; no recommendation implied FOSDEM Brussels, Belgium Martin Michlmayr Running Debian on Inexpensive Network Attached Storage Devices Network Attached Storage devices For most people, a Network Attached Storage device (NAS) is an external hard drive on steroids For geeks, a NAS is a complete computer Martin Michlmayr Running Debian on Inexpensive Network Attached Storage Devices Advantages of NAS Power efficient Quiet Cheap Makes a nice home server Martin Michlmayr Running Debian on Inexpensive Network Attached Storage Devices Linksys NSLU2, aka Slug Intel IXP42x, 133 or 266 MHz 32 MB RAM 8 MB flash no internal disk 1 10/100 Ethernet 2 USB Martin Michlmayr Running Debian on Inexpensive Network Attached Storage Devices Linksys NSLU2 Advantages: It’s cheap It’s quiet (no fan) Firmware can be upgraded via the network It can run on flash only Disadvantages: Ethernet needs proprietary microcode It’s slooow and doesn’t have much memory Martin Michlmayr Running Debian on Inexpensive Network Attached Storage Devices Linksys NSLU2 Feature complete, maintenance mode Packages nslu2-utils and ixp4xx-microcode Support for LEDs, beeper, Ethernet Ethernet driver: Krzysztof Halasa Some new ideas about improving d-i support (example: mounting ext3 as ext2) Gordon Farquharson, Joey Hess, NSLU2-Linux team Martin Michlmayr Running Debian on Inexpensive Network Attached Storage Devices Thecus N2100 Intel IOP 80219, 600 MHz 1 DDR400 slot (up
    [Show full text]
  • US Cities Exposed a Shodan-Based Security Study on Exposed Assets in the US
    US Cities Exposed A Shodan-Based Security Study on Exposed Assets in the US Numaan Huq, Stephen Hilt, and Natasha Hellberg Trend Micro Forward-Looking Threat Research (FTR) Team A TrendLabsSM Research Paper TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the 4 particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro Exposed Cyber Assets reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to 6 the original language official version of the document. Any discrepancies or differences created in the translation are Exposed Cities not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree 36 that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro Safeguarding Against disclaims all warranties of any kind, express or implied.
    [Show full text]