newbi Posted July 9, 2014 Share #451 Posted July 9, 2014 Hi. I have a N54L with No VGA monitor. Is there anyway to upgrade from gnoBoot to nanoboot blind? thanks Quote Link to comment Share on other sites More sharing options...
Schnapps Posted July 9, 2014 Share #452 Posted July 9, 2014 Can someone point me to instructions on how to upgrade Gnoboot with 4458U2 to Nanoboot 4493U2 without losing data on my array? I tried searching the forum threads but did not find anything. Thanks 1. Create a new USB stick with nanoboot 5.0.3.1 (you can use Rufus to write the ISO to the flash) 2. Download the latest .pat from Synology for your type of machine 3. Re-Boot from the new nanoboot USB flash 4. Select from the boot list Upgrade 5. Navigate to http//yournasip:5000 and follow the on-screen wizard but at a certain point use the MIGRATE MY FILES from the wizard. If you don't know he nas's IP address just use Synology Assistant to find it. After a successful migration, just use the update menu from DSM's Control Panel to update to Update 2 6. Good luck! Sent from my iPhone using Tapatalk Quote Link to comment Share on other sites More sharing options...
Schnapps Posted July 9, 2014 Share #453 Posted July 9, 2014 Can someone point me to instructions on how to upgrade Gnoboot with 4458U2 to Nanoboot 4493U2 without losing data on my array? I tried searching the forum threads but did not find anything. Thanks 1. Create a new USB stick with nanoboot 5.0.3.1 (you can use Rufus to write the ISO to the flash) 2. Download the latest .pat from Synology for your type of machine 3. Re-Boot from the new nanoboot USB flash 4. Select from the boot list Upgrade 5. Navigate to http//yournasip:5000 and follow the on-screen wizard but at a certain point use the MIGRATE MY FILES from the wizard. If you don't know he nas's IP address just use Synology Assistant to find it. After a successful migration, just use the update menu from DSM's Control Panel to update to Update 2 6. Good luck! Sent from my iPhone using Tapatalk Quote Link to comment Share on other sites More sharing options...
Xpeno_usr Posted July 10, 2014 Share #454 Posted July 10, 2014 I had asked you this question on another thread but didn't get a chance yet to upgrade. Now that there is a newer version of nanoboot, I would like to ask and confirm if I can use your steps to upgrade directly from Trantor 4.3 3810 ?? I hope migration will work on that as well. Is it safe to do so ?? Also which pat file do I need to download for this... Tx. 1. Create a new USB stick with nanoboot 5.0.3.1 (you can use Rufus to write the ISO to the flash) 2. Download the latest .pat from Synology for your type of machine 3. Re-Boot from the new nanoboot USB flash 4. Select from the boot list Upgrade 5. Navigate to http//yournasip:5000 and follow the on-screen wizard but at a certain point use the MIGRATE MY FILES from the wizard. If you don't know he nas's IP address just use Synology Assistant to find it. After a successful migration, just use the update menu from DSM's Control Panel to update to Update 2 6. Good luck! Sent from my iPhone using Tapatalk Quote Link to comment Share on other sites More sharing options...
Soorma Posted July 10, 2014 Share #455 Posted July 10, 2014 I had asked you this question on another thread but didn't get a chance yet to upgrade. Now that there is a newer version of nanoboot, I would like to ask and confirm if I can use your steps to upgrade directly from Trantor 4.3 3810 ?? I hope migration will work on that as well. Is it safe to do so ?? Also which pat file do I need to download for this...Tx. 1. Create a new USB stick with nanoboot 5.0.3.1 (you can use Rufus to write the ISO to the flash) 2. Download the latest .pat from Synology for your type of machine 3. Re-Boot from the new nanoboot USB flash 4. Select from the boot list Upgrade 5. Navigate to http//yournasip:5000 and follow the on-screen wizard but at a certain point use the MIGRATE MY FILES from the wizard. If you don't know he nas's IP address just use Synology Assistant to find it. After a successful migration, just use the update menu from DSM's Control Panel to update to Update 2 6. Good luck! Sent from my iPhone using Tapatalk Worked for me .. came from Trantor 4.3 XXXX So far nanoboot kick azz Quote Link to comment Share on other sites More sharing options...
Schnapps Posted July 10, 2014 Share #456 Posted July 10, 2014 Cobgrats! Sent from my iPhone using Tapatalk Quote Link to comment Share on other sites More sharing options...
Xpeno_usr Posted July 11, 2014 Share #457 Posted July 11, 2014 So which pat file do I need to download ? Cobgrats! Sent from my iPhone using Tapatalk Quote Link to comment Share on other sites More sharing options...
Schnapps Posted July 11, 2014 Share #458 Posted July 11, 2014 The ds 3612 pat Sent from my iPhone using Tapatalk Quote Link to comment Share on other sites More sharing options...
Mitt27 Posted July 11, 2014 Share #459 Posted July 11, 2014 Is it possible to use the pat file from a different synology nas? I am looking to use the deep sleep/system hibernation function which the DS413 has. Quote Link to comment Share on other sites More sharing options...
Schnapps Posted July 11, 2014 Share #460 Posted July 11, 2014 No Sent from my iPhone using Tapatalk Quote Link to comment Share on other sites More sharing options...
yabba235 Posted July 12, 2014 Share #461 Posted July 12, 2014 After upgrade my xpenology from gnoboot to nanoboot in my root folder there are two files: "ccmmdd" ( execute binary elf ) and 'task1" and log file from wget: --2014-06-28 15:46:19-- http://124.173.114.175:8080/task1 Connecting to 124.173.114.175:8080... connected. HTTP request sent, awaiting response... 200 OK Length: 5100983 (4.9M) [application/octet-stream] Saving to: `task1' ^M77% [=============================> ] 3,938,262 170K/s eta 15s $ 2014-06-28 15:47:15 (88.9 KB/s) - `task1' saved [5100983/5100983] This site http://124.173.114.175:8080 is from China and include several files: arm 968.02 KB 2014-6-15 18:51:54 3 ccmmdd 1.10 MB 2014-6-27 1:22:06 124 >>>>>>> this is in my root folder guchun24 4.86 MB 2014-6-16 6:35:58 3 guchun26 1.77 MB 2014-6-15 18:17:54 3 mips 1.10 MB 2014-6-15 18:57:54 3 server 4.86 MB 2014-6-26 2:58:16 1 server.exe 201.41 KB 2014-6-25 11:26:08 31 task1 4.86 MB 2014-6-28 19:34:01 9 >>>>>> and this file too Can anyone else confirm the download of these files, and if anyone knows what they are? I'm beginning to doubt the honest intentions of the developer nanoboot. Quote Link to comment Share on other sites More sharing options...
manfriday Posted July 12, 2014 Share #462 Posted July 12, 2014 thanks for the heads up. ...time to refresh Ole Faithful (Trantor 4.3-3810) with new TBs and power off the NANOBOT. I didn't need two of these things anyway. blocking the IP 124.173.114.175 is good for about 3 seconds. If NANOBOT has the same taste in Porn then he/she/they should be pretty pleased, I dare say there is not a torrent file NB doesn't already have. I have not and never will go Quick Connect whether I own a SYNOLGY box or XPENOLOGY, at least not until I have 2 separate networks in house. Good Luck and have fun storming the Castle MF Quote Link to comment Share on other sites More sharing options...
yabba235 Posted July 12, 2014 Share #463 Posted July 12, 2014 A little info this mysteriuos IP: Current IP Range: 124.173.114.0 - 124.173.114.255 IP Range Location: China, Guangdong, Guangzhou IP Owner: World Crossing Telecom(Guangzhou) Ltd Owner Full IP Range: 124.173.0.0 - 124.173.255.255 Owner Address: 17/fl, International Bank Center, 191# Dongfengxi Rd. Guang Zhou, China Owner Country: China Owner Phone: +86-20-81351813 Owner Website: www.gzidc.com, www.cnnic.cn All Owner IP Ranges: 124.172.0.0 - 124.175.255.255, 58.66.0.0 - 58.67.255.255, 203.88.208.0 - 203.88.223.255, 203.88.200.0 - 203.88.207.255, 59.107.0.0 - 59.107.255.255, 58.67.128 … … [see all] All Owner IP Reverse DNS (Host)s: 124.172.147.78, 58.66.176.122, 203.88.210.158, 203.88.202.138, 59.107.172.0, 58.67.197.39, 124.172.238.226, 124.173.145.88 Whois Record Updated: 28 Apr 2008 Quote Link to comment Share on other sites More sharing options...
sporti Posted July 12, 2014 Share #464 Posted July 12, 2014 Can anybody else confirm that ????? i can't´t find the two files.... where can i found the wget log ? Quote Link to comment Share on other sites More sharing options...
yabba235 Posted July 13, 2014 Share #465 Posted July 13, 2014 In /root folder, but if you don't have this files is fine, yours Nanoboot is safe Sent from my iPhone using Tapatalk Quote Link to comment Share on other sites More sharing options...
sporti Posted July 13, 2014 Share #466 Posted July 13, 2014 Are you sure that is a Nanoboot Problem ?? I think that isn't from Nanoboot, i think your System was hacked. It seems that is the classic Syno Hack Problem, because there were several security holes in the last Releases... Quote Link to comment Share on other sites More sharing options...
pr1me Posted July 13, 2014 Share #467 Posted July 13, 2014 Can anyone explain me please, what are these processes using memory? /usr/bin/httpd -DSSL -DSPDY -DHAVE_PHP php-fpm: pool www php-fpm: pool www php-fpm: pool www php-fpm: pool www /usr/bin/httpd -DSSL -DSPDY -DFrameOptions Quote Link to comment Share on other sites More sharing options...
yabba235 Posted July 13, 2014 Share #468 Posted July 13, 2014 Are you sure that is a Nanoboot Problem ??I think that isn't from Nanoboot, i think your System was hacked. It seems that is the classic Syno Hack Problem, because there were several security holes in the last Releases... My NAS is in local network, only public access is via ports 5001(gui web )and 8000(pyload) ssh is only route to router not nas, so explain me how could infect synology and about which vulnerabilities are writing ? Quote Link to comment Share on other sites More sharing options...
yabba235 Posted July 13, 2014 Share #469 Posted July 13, 2014 Can anyone explain me please, what are these processes using memory?/usr/bin/httpd -DSSL -DSPDY -DHAVE_PHP php-fpm: pool www php-fpm: pool www php-fpm: pool www php-fpm: pool www /usr/bin/httpd -DSSL -DSPDY -DFrameOptions I have only this process: /usr/bin/httpd -DSSL -DSPDY -f Quote Link to comment Share on other sites More sharing options...
manfriday Posted July 13, 2014 Share #470 Posted July 13, 2014 Not a Lunix guy so assistance or confirmation required. > Putty to DSM5 > Login is as Root > Enter ls -l /etc > Contents of Root displayed No suspect files or at least not the files as seen be yabba235 Cheers MF Quote Link to comment Share on other sites More sharing options...
Schnapps Posted July 13, 2014 Share #471 Posted July 13, 2014 DSPDY is the SPDY daemon. It's safe and used by the webserver on DSM (http://en.wikipedia.org/wiki/SPDY) Can anyone explain me please, what are these processes using memory?/usr/bin/httpd -DSSL -DSPDY -DHAVE_PHP php-fpm: pool www php-fpm: pool www php-fpm: pool www php-fpm: pool www /usr/bin/httpd -DSSL -DSPDY -DFrameOptions Quote Link to comment Share on other sites More sharing options...
Schnapps Posted July 13, 2014 Share #472 Posted July 13, 2014 probably because just yabba235's box was hacked Not a Lunix guy so assistance or confirmation required. > Putty to DSM5 > Login is as Root > Enter ls -l /etc > Contents of Root displayed No suspect files or at least not the files as seen be yabba235 Cheers MF Quote Link to comment Share on other sites More sharing options...
sporti Posted July 13, 2014 Share #473 Posted July 13, 2014 Look here: http://www.symantec.com/connect/blogs/r ... rabilities Same Problem with Port 5001... or here: http://www.cvedetails.com/vulnerability ... ology.html http://web.nvd.nist.gov/view/vuln/detai ... -2013-6955 It is/was EXTREMLY dangerous to connect any Syno Device to the Internet without the actual DSM Patches. There are so many Security Holes in the past Releases of DSM. Quote Link to comment Share on other sites More sharing options...
yabba235 Posted July 13, 2014 Share #474 Posted July 13, 2014 (edited) "It is/was EXTREMLY dangerous to connect any Syno Device to the Internet without the actual DSM Patches." Yes, I know and i use dsm 5 4493-update 2 so actual patches is it here. "There are so many Security Holes in the past Releases of DSM." Yes, but not in DSM 5 - you have provided links to threats to the previous version of DSM ( < 5, not DSM 5) BTW Nothing more I can do last update installed The only difference between the systems is that I'm using the hacked version of the DSM, so I am not surprised that I was hacked Edited July 13, 2014 by Guest Quote Link to comment Share on other sites More sharing options...
pr1me Posted July 13, 2014 Share #475 Posted July 13, 2014 DSPDY is the SPDY daemon. It's safe and used by the webserver on DSM (http://en.wikipedia.org/wiki/SPDY) thank you very much, and what is php-fpm: pool www? Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.