Shop now Shop now Shop now  Up to 70% Off Fashion  Shop all Amazon Fashion Cloud Drive Photos Shop now Learn More Shop now Shop now Shop Fire Shop Kindle Shop now Shop now Shop now
Profile for Sergio Hernando > Reviews

Personal Profile

Content by Sergio Hernando
Top Reviewer Ranking: 4,719,525
Helpful Votes: 59

Learn more about Your Profile.

Reviews Written by
Sergio Hernando

Show:  
Page: 1
pixel
D-Link ShareCenter Pulse 2-bay Network Storage Enclosure
D-Link ShareCenter Pulse 2-bay Network Storage Enclosure
Offered by Alex Whyte

57 of 62 people found the following review helpful
3.0 out of 5 stars Good value for the money, 10 Jan. 2012
I have just bough this inexpensive NAS in order to replace a computer that was completely dedicated for NAS purposes. This computer was not used intensively (sporadic usage, not 24x7). Please note these remarks come after a setup process and partial usage of the device. Some of the features have not been tested.

PROS

- Small size, so it's easy to transport
- Easy to set up. No screws needed to remove the lid or to attach the drives
- Friendly GUI, ideal for inexperienced users. Comes with a decent help built-in the GUI
- Boots up fast
- Disk management functions are included, including S.M.A.R.T testing
- Allows standard volumes, JBOD and RAID 0/1 (with autorebuild in 1). Easy disk management
- Allows Web SSL login
- Gigabit Ethernet
- DHCP and fixed IP capable
- Firmware can be easilly upgraded
- Allows log dumping to syslog facilities. Mail and SMS alerts provided
- CIFS, FTP/S, UPnP AV, iTunes AFP and NFS
- Basic power management is possible, including power off scheduling and fan control settings
- Built in account management. User profiling, quotas and permission setting for services
- Local and network backups, with Amazon S3 support
- Built in torrent client and FTP/HTTP downloader

CONS

- Refrigeration fan seems to be small and does not look as reliable in the long run (prone to dust accumulation). I would not advise this device for 24x7 operation, non refrigerated or dusty environments. My device is around 50ºC in idle. Drives around 40ºC
- Noisy when fan is in operation (especially in high speed)
- Drives are not fixed with screws. Careful when moving it
- Quality build is acceptable, altought is mostly plastic, so careful when moving it
- Don't expect a lot of flexibility with filesystems. Does EXT3 only
- Disk testing seems to be unstable: it killed my RAID 1 configuration on first run when I cancelled the test. This happened with an old firmware, did not happen after upgrading
- Lacks from SSH capabilities
- CIFS and AFP are enabled by default, and can't be removed

Ideal if you're looking for a basic NAS with basic functionality, easy to set up and spending little money. If you require advanced capabilities, 24x7 operation outside a home environment, you may consider other models and/or manufacturers.
Comment Comment (1) | Permalink | Most recent comment: Nov 8, 2012 12:58 PM GMT


Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics
by Vic Winkler
Edition: Paperback
Price: £33.29

2.0 out of 5 stars Too much theory, too little practice, 25 Sept. 2011
When I buy Syngress books I expect the very cutting edge in knowledge. I bought "Securing the Cloud" expecting in-depth practical comments on how to architect cloud services, how to deal with security assessments in third party providers and how to cope with legal issues. What I found in this book is a theoretical framework for beginners.

I don't mean with this that the book is bad. As explained, if you are looking for a high level overview of cloud security, this may be a good starting point. If you want lots of practice and in-depth examples, this may not be your book.

The only contents I found useful were chapters 8 and 9, where the author discusses selection of cloud providers and evaluation of cloud security. Still the evaluation is merely done proposing checklist items and mentioning the different cloud security frameworks out there. No further comments on how to manage potential answers to the checklist items, or how to prioritize, or discussions of which framework is better for each scenario. If you are looking on details on how to contract and secure specific cloud products such as Microsoft, Google or Amazon, you will not find them in this book. Try reading it, and ask yourself later if you are ready to contract any of the existing providers based on the learned things.

You will also not find any practical references to security operations in the cloud beyond of mentions and basic references to SIEM, IDS, IPS and antivirus. Not a single mention to SSL traffic inspection, for instance, or how to deploy real operational management of services apart of repeating constantly the need of a CMDB. When it comes to tools, don't expect much more than comments to nmap and Nessus.

The legal aspects are covered very poorly and have almost no practical usage. There are no useful contents on how to cover forensics in cloud services, or practical tips and tricks for contract negotiation. The introduction is very well written, but again, if you already know about cloud services, you can skip the first 4 chapters and won't miss anything relevant. Quite disappointing finding, once again, the recommendation of SAS70 Type II reports to evaluate a provider security, as this is normally absolutely meaningless and does not provide with any security assurance at all. SAS70 IS NOT a security reporting framework!

The books constantly repeats the IaaS, PaaS and SaaS concepts, and I personally don't like the abuse of the term "depict", as well as calling "epic fails" the practical failure examples the author has witnessed, but this is just a personal opinion.


Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools
by Cory Altheide
Edition: Paperback
Price: £31.49

2 of 3 people found the following review helpful
4.0 out of 5 stars A must have in your digital forensics collection, 31 July 2011
I bought this book some time ago, and I've actually read it twice. It's permanently sitting close to me as a reference book. Given the amount of techniques, tools and procedures in digital investigations, it's quite an achievement to bring almost all of them togheter in just 264 pages.

It does not matter if you are a seasoned investigator or a newbie. You will always find something you didn't know, or a new tool you can try. The book is very well written and covers a very wide range of topics that you may use in your investigative process suiting all professional profiles. Clear language, everything is explained concisely and not abusing of the theory, giving relevance to the pratical aspects of digital forensics. Whenever the topics get wider, good bibliography references are provided to well known materials.

The book is well structured, covering the necessary introductions, how to build your platform, disk and file forensics, Windows, Linux and Mac systems and artifacts, Internet, files and automation in forensics. It also includes an appendix about free tools that are not open source. Each of the chapters includes detailed explanations of the fundamentals and tools to be used.

The authors don't abuse of technical procedures to install tools, instead of that they give installation hints that you can easilly follow. Console outputs are concise, and screenshots are legible. Almost all the examples of tool installation are Ubuntu related, which is the perfect entry point for those not directly used to Linux.

The only thing I miss in this book is memory forensics and malware related contents. Those are complex subjects, maybe a little bit out of the scope of the book, still achievable using open source tools and free tools. I'm sure the authors will consider these for the future. Because of this I'm not rating the book as 5 star, but it's definitively one of the best materials I've read lately.


Page: 1