• 0 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: November 14th, 2023

help-circle

  • As others gave said, the solution is a VM but once setup correctly, you won’t notice.

    If Windows is your primary computer, install HyperV, the built in VM manager for Windows. Then create a Linux VM for your NAS.

    Once setup, you won’t even notice. HyperV auto saves and reloads the VM whenever you reboot. You don’t even need a window open for the VM, it runs in the background until you run the manager to connect to the VM and see it in a window.

    If Linux is your primary OS, do the reverse and put Windows in a Linux VM.

    Don’t hassle with Proxmox, etc. That’s for running lots of VM’s and toggling between them.


  • You might want to consider that backups only protect very old data from ransomware.

    Ransomware works by getting on a machine and sitting for several months before activating. During that time, your data is encrypted but you don’t know because when you open a file, your computer decrypts it and shows you what you expect to see. So your backups are working but are saving files that will be lost once the ransom ware activates.

    The only solution is to frequently manually verify the backup from a known safe computer. Years ago I looked for something to automate this but didn’t find it. (Something like a raspberry pi with no Internet that can only see the PC it’s testing, compares a known file, then touches the file so it gets backed up again.)



  • Used servers/workstations are likely more reliable than new consumer.

    They were very likely kept temperature controlled, have ECC, and are actually known working instead of something like Asus. If I remember correctly, PC mortality is very high the first 6 months, goes down to near zero for 5 years, then starts going back up.

    Replace the SSD/hard drive and you are good. You might not even have to do that. I checked the stats on the SSD that came with my used Lenovo workstation and it had like 20 hours on it.