How to host a website on Synology NAS

Overview Web Station allows DiskStation to host up a dynamic, database-driven website or numerous third-party web applications with MySQL and PHP technologies, such as Content Management, Customer Relationship Management, and e-Commerce system. Go to this page to find the third-party web applications tested by Synology. DiskStation provides the following two ways to host a PHP web application:…

How do I make a warranty claim for my Synology product?

Hardware malfunction may occur because of a defect in materials or workmanship even though you are using your Synology product properly. If it should unfortunately occur, you can make a warranty claim for your Synology product to apply the RMA (return merchandise authorization) if your Synology product was purchased from a Synology-authorized local distributor or…

Why do I keep receiving the message “User [admin] from […] failed to log in via [DSM] due to authorization failure”?

Synology NAS features an auto-block mechanism, which not merely prevents user accounts from being broken into using brute-force attacks but also issues notifications about malicious login attempts. Once you receive a bunch of login failure logs in Log Center, we suggest adopting the following methods to safeguard your Synology NAS: Scan your DSM through Security…

Why can’t I delete my certificate?

If you cannot delete a certificate on your Synology device, please check whether it has been set as a default certificate. If so, this certificate cannot be deleted. To delete a default certificate, it is necessary to set another certificate as the new default certificate. After the configuration, the deletion of the certificate originally configured…

ทำอย่างไรถ้ามีบุคคลอื่นล็อกอินเข้าใช้ DSM โดยใช้ Account ของฉัน?

[vc_row][vc_column][vc_column_text]หากคุณได้รับการแจ้งเตือนจาก Security Advisor เกี่ยวกับ กิจกรรมการเข้าสู่ระบบที่ไม่ใช่คุณ เราขอแนะนำให้คุณดำเนินการดังต่อไปนี้

How can I protect my Synology NAS against WannaCry?

What is WannaCry? WannaCry is a ransomware program that targets Microsoft Windows and encrypts victims’ files, making them inaccessible, and demands a ransom payment to decrypt them. It is also called Wanna Decryptor 2.0, WCry 2, WannaCry 2, and Wanna Decryptor 2. Victims can only restore their systems by paying 300 dollars worth of bitcoin…

How to choose a suitable UPS

To prevent any disruptions to the continuous operation and service of data systems in case of power outage, we recommend using an uninterrupted power supply (UPS) as a backup power source. This article will guide you through how to choose a suitable UPS and set it up. Calculate the total wattage of all devices Choose…