Get an email every time there is a new post added on this page (tag)!

How to Install and Setup Tailscale on a QNAP NAS

How to Install Tailscale on a QNAP NAS Keeping the data as secure as possible is probably one of the most paramount concerns of any NAS owner. Everyone wants to make sure that their data cannot be accessed by unauthorized individuals, but at the same time want to make sure that their hardware can communicate […]

Cannot Install Plex on DS223 or DS423

Cannot Install Plex on DS223 or DS423

The Plex app is no not the AppCenter. Using the package centre to manually install the DSM 7 ARMv8 version of plex, I get the package not supported error. Where I am going wrong?   Yes, there is still no package available from Plex for the RTD1619B CPU. If this was TS-233 with that particular […]

How to install & set up UNRAID NAS server (SMB, Tailscale VPN and plex)

How to install & set up UNRAID NAS server (SMB, Tailscale VPN and plex)

How to Install and Set Up an unRAID NAS Server (with SMB, Tailscale VPN, and Plex) Go to unraid.net/download and download the USB creator app for your Windows or Mac computer. Connect the USB drive or data drives or M.2 drives that you want to use for the unRAID OS to boot from. Connect the […]

Speed vs Security: Choosing the Right Remote Access Method for Your NAS on Internet

Speed vs Security: Choosing the Right Remote Access Method for Your NAS on Internet

Network Attached Storage (NAS) devices are an essential part of any home or office network. They provide a central storage location for all your digital files, making it easy to access and share them across multiple devices. However, connecting to a NAS device can be complicated, and choosing the right connectivity option can make all […]

How to access your NAS remotely? A Comparison of NKN nConnect and Tailscale

How to access your NAS remotely? A Comparison of NKN nConnect and Tailscale

Introduction Brief overview of VPN technology VPN (Virtual Private Network) technology allows users to securely access the internet by encrypting their internet connection and routing it through a remote server. This creates a virtual “tunnel” between the user and the internet, effectively hiding the user’s internet activity and location. VPNs are commonly used by individuals […]