Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


evnafets

529 posts

Ultimate Geek

Lifetime subscriber

#197959 20-Jun-2016 09:59
Send private message

I was incidentally involved in a Cryptolocker attack over the weekend.  The encrypted files on the infected computer were transferred to mine via Shared Dropbox folder.  While I'm pretty sure there is no immediate direct threat, it was a reminder to revise my backup plan for if it ever DOES happen to me.  

 

I recently bought a Synology Disk Station DS216E, with a couple of Seagate 2TB hard drives to use as a media library, but figured I could also do some basic backups to it as well. 

 

Tried a couple of backup strategies: 

 

- Synology Cloud Station Backup (It had backup in the title, I thought it would be suitable)
- Easus Todo Backup Free version

 

My main issue right now:  Neither strategy seemed to get above 10-12MB/s transfer rate from computer to NAS.  And sometimes slower. 

 

It's going to take hours to do a backup at this rate.  

 

The Cloud Station Backup option was causing 100% CPU usage on the NAS, so I thought that might be the cause.  Also I discovered that this program is an "real time" backup which isn't really appropriate for protecting against Cryptolocker attacks :-)  Hence I tried the second option of the Easus Todo Backup.  The CPU usage went down, but it also seemed to hit the same speed limit of about 12MB/s. I left it for a few hours, but it failed midway for network related issues (not sure what, I wasn't home at the time) 

 

My setup: 

 

Have a standard Spark Router - Thompson TG585 ADSL Modem/Router - pretty sure this only supports 100MB/s network. 
Both Computer and NAS are connected to the router at 100MB/s (confirmed from control panels)
I was monitoring the transfer rate from the Synology NAS interface. 

 

I have found some good advice in this thread: http://www.geekzone.co.nz/forums.asp?forumid=50&topicid=195814 for a few things to try, but I thought I'd do a sanity check as well

 

Even given that I'm not on a Gigabit network, surely it should be able to transfer faster than the 12MB/s I am seeing? 

 

Any other backup strategy advice will be gratefully accepted if you want to pitch in with your opinions :-)

 

thanks,

 

evnafets


Filter this topic showing only the reply marked as answer Create new topic
shk292
2824 posts

Uber Geek

Lifetime subscriber

  #1576924 20-Jun-2016 10:09
Send private message

Part of the problem is you're mixing up bits per second (bps) and bytes per second (Bps)

 

A one hundred megabit per second LAN (100 Mbps) will only support 12 Megabytes per second (12 MBps) because there are 8 bits per byte


 
 
 

Shop now on AliExpress (affiliate link).
evnafets

529 posts

Ultimate Geek

Lifetime subscriber

  #1576932 20-Jun-2016 10:15
Send private message

And that would answer my question :-)

 

That capital B makes a big difference.  

 

 


1101
3120 posts

Uber Geek


  #1576940 20-Jun-2016 10:31
Send private message

evnafets:

 

I was incidentally involved in a Cryptolocker attack over the weekend.  The encrypted files on the infected computer were transferred to mine via Shared Dropbox folder.  While I'm pretty sure there is no immediate direct threat, it was a reminder to revise my backup plan for if it ever DOES happen to me.  

 

 

 

 

Crypto will also attack your backups & shares,syncs you have access to (network files, dropbox etc), if the NAS/backup etc is left connected to the PC .

So just plan/allow for that . You would want a backup that WILL be disconnected from the system : eg multiple USB HD's . Or a cloud backup/sync that keeps previous
versions of the files, so you can go back a week/month & restore those cloud synced files .




jnimmo
1093 posts

Uber Geek


  #1576947 20-Jun-2016 10:48
Send private message

I always make sure to setup separate credentials for NAS backups - i.e. setup a backup account which should be the only account with write access to your backup directory on the NAS.

 

Then put these credentials into whatever backup software. Sure it doesn't guarantee malware couldn't find these credentials and encrypt the backups on the NAS, but makes it much harder than just being able to connect to a mapped drives with the users default credentials.

 

 

 

 


evnafets

529 posts

Ultimate Geek

Lifetime subscriber

  #1577007 20-Jun-2016 11:50
Send private message

Good thoughts guys.

 

I actually have done exactly what jnimmo suggested - created a "backup" user who was the only one with write access to the share. 

 

I was thinking of creating a big backup (disk images or some such) to be stored offline as the "last resort", and then regularly doing smaller backups of just important/working files to the NAS.  Will have to look into options around keeping the "history" 

 

 

 

 


linw
2833 posts

Uber Geek


  #1577192 20-Jun-2016 15:28
Send private message

jnimmo:

 

I always make sure to setup separate credentials for NAS backups - i.e. setup a backup account which should be the only account with write access to your backup directory on the NAS.

 

Then put these credentials into whatever backup software. Sure it doesn't guarantee malware couldn't find these credentials and encrypt the backups on the NAS, but makes it much harder than just being able to connect to a mapped drives with the users default credentials.

 

 

 

 

 

 

Now, why didn't I think of that! Thanks for the nudge. Agreed, it is not perfect but it is better than using my main account.

 

I'm mindful of the ransomware threat after a friend got caught out. Macrium image files were encrypted on the USB drive.  

 

I have a separate USB drive in the safe to at least have a fallback of last resorts.

 

There needs to be a system available that can take a USB drive offline while it is still connected but still allow a backup program to start it up with a password or similar security feature. You might say, just switch the USB on before the backup but the great unwashed just can't be relied on to do this regularly. Certainly, my elderly friend who asked the ransomware onboard couldn't do this.

 

There is an opening here. Any bright ideas, folks?


MadEngineer
4191 posts

Uber Geek

Trusted

  #1577259 20-Jun-2016 16:44
Send private message

I have my nas box pulling data off my PC to backup with any file changes archived so I can revert any changes. Similar to time machine or file history. This is a must have feature of backups. Backups and archives/versions are not shared so can't be touched by viruses.




You're not on Atlantis anymore, Duncan Idaho.



jnimmo
1093 posts

Uber Geek


  #1577274 20-Jun-2016 16:59
Send private message

The key is to have another backup of the important stuff too, you could kick it down but still doesn't stop a fire or flood destroying it.. Upload all your photos to Flickr or use an online backup.. I don't think I have anything Id miss too much

I like the idea about the NAS pulling from the computer instead of pushing to the NAS, clever way to avoid tampering!

CYaBro
4517 posts

Uber Geek

ID Verified
Trusted

  #1577290 20-Jun-2016 17:29
Send private message

Veeam Endpoint backup has the option to "disconnect" a USB drive after the backup has completed, however it requires someone to physically unplug it and plug it back in again for the next backup to run.

 

But that does add some protection from the viruses as they won't see the USB drive once a backup has finished.

 

 





Opinions are my own and not the views of my employer.


linw
2833 posts

Uber Geek


  #1577529 21-Jun-2016 09:47
Send private message

Quote:- "however it requires someone to physically unplug it and plug it back in again for the next backup to run."

 

Therein lies the problem! Thanks for the input, though.

 

Yes, NAS pull rather than push is a great idea.


jnimmo
1093 posts

Uber Geek


  #1577531 21-Jun-2016 09:49
Send private message

You could have a wifi controlled relay on the USB drive power supply.. scheduled task to turn the drive off after backup job and on before it..

 

But if there was any malware on the system it would probably just see the drive get mounted at that stage and deal with it then, so might not be any safer.


Filter this topic showing only the reply marked as answer Create new topic





News and reviews »

Samsung 9100 Pro NVMe SSD Review
Posted 11-Apr-2025 13:11


Motorola Announces New Mid-tier Phones moto g05 and g15
Posted 4-Apr-2025 00:00


SoftMaker Releases Free PDF editor FreePDF 2025
Posted 3-Apr-2025 15:26


Moto G85 5G Review
Posted 30-Mar-2025 11:53


Ring Launches New AI-Powered Smart Video Search
Posted 27-Mar-2025 16:30


OPPO RENO13 Series Launches in New Zealand
Posted 27-Mar-2025 05:00


Sony Electronics Announces the WF-C710N Truly Wireless Noise Cancelling Earbuds
Posted 26-Mar-2025 20:37


New Harman Kardon Portable Home Speakers Bring Performance and Looks Together
Posted 26-Mar-2025 20:30


Data Insight Launches The Data Academy
Posted 26-Mar-2025 20:21


Oclean AirPump A10 Portable Water Flosser Wins iF Design Award 2025
Posted 20-Mar-2025 12:05


OPPO Find X8 Pro Review
Posted 14-Mar-2025 14:59


Samsung Galaxy Ring Now Available in New Zealand
Posted 14-Mar-2025 13:52


2degrees Announces Partnership With AST SpaceMobile and Plans for NZ Launch
Posted 11-Mar-2025 10:05


Samsung Introduces New Galaxy A56 5G, Galaxy A36 5G and Galaxy A26 5G
Posted 9-Mar-2025 12:18


Cricut Unveils the Next Generation of Smart Cutting Machines
Posted 9-Mar-2025 12:06









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.







Backblaze unlimited backup