Feeds
70%

Netgear Storage Central Turbo SC101T network storage box

SAN not NAS, OK 4 U?

Security for virtualized datacentres

We happened to have two hard drives handy: a 150GB model and a 400GB unit, both from Western Digital. The software allows you to mirror the contents of one drive on another for a modicum of data security - if one drive goes up the Suwannee, you still have the other, with all your files intact. Using the Netgear software, we split the 400GB drive into two partitions: one to mirror the contents of the 150GB drive and the other as un-mirrored space. Ideally, you'd use two drives of the same capacity for this kind of configuration, but the approach we took shows how flexible the set-up can be.

Netgear Storage Central Turbo SC101T software
Er... which drive is which, please?

We should point out that this wasn't our first configuration - initially, we formatted both drives as separate, single-partition entities. We mention this because changing the configuration was a little tricky, involving 'deleting' the drives first then setting up the 400GB drive before, mirroring one partition to the 150GB HDD, then establishing the second, unmirrored partition. There are several steps here that Netgear's software could perform automatically to make life easier for the person managing the SC101T.

Indeed, the management utility is the weakest part of the SC101T package. The Netgear unit is aimed at consumers, and it wouldn't take much work to make the utility much more consumer friendly. The Wizard could actually work like a wizard - in fact, it presents just a simplified sub-set of the settings listed under the "Advanced" option.

Netgear Storage Central Turbo SC101T software
The SC101T's 'Wizard' versus...

Netgear Storage Central Turbo SC101T software
...its Advanced settings

Recovery from a disk failure isn't automatic. If a drive gives up the ghost, the SC101T's LEDs will tell you which one it is. Powering down and removing the offending hardware is easy, but to get back to where you were, you have to duplicate the good half of the mirrored array, delete it, recreate the data store and its mirror on the two drives and then finally copy back all the data. Phew.

While that's better than losing all your files completely, and might be a run-of-the-mill activity for IT professionals, it's not exactly a consumer-friendly process. It assumes you have a third drive big enough to take all the data on the surviving drive, which, since the SC101T is likely to be your back-up system, you probably don't.

Protecting users from Firesheep and other Sidejacking attacks with SSL

Next page: Verdict

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.