- Joined
- Oct 9, 2007
- Messages
- 47,205 (7.55/day)
- Location
- Hyderabad, India
System Name | RBMK-1000 |
---|---|
Processor | AMD Ryzen 7 5700G |
Motherboard | ASUS ROG Strix B450-E Gaming |
Cooling | DeepCool Gammax L240 V2 |
Memory | 2x 8GB G.Skill Sniper X |
Video Card(s) | Palit GeForce RTX 2080 SUPER GameRock |
Storage | Western Digital Black NVMe 512GB |
Display(s) | BenQ 1440p 60 Hz 27-inch |
Case | Corsair Carbide 100R |
Audio Device(s) | ASUS SupremeFX S1220A |
Power Supply | Cooler Master MWE Gold 650W |
Mouse | ASUS ROG Strix Impact |
Keyboard | Gamdias Hermes E2 |
Software | Windows 11 Pro |
TerraMaster, a professional brand that specializes in providing innovative storage products for home, businesses and enterprises, presents the HyperLock-WORM File System, a unique security feature of TOS 5 that provides the utmost data protection for very important data files to prevent tampering. With TerraMaster HyperLock-WORM File System, data stored within the special file system can be locked within a specific period. Within this period, the data cannot be altered or deleted but can only be read. This unique file system is ideal for storage important data files such as medical cases, court case files, financial securities, company financial data, and other data files that must not be tampered with. WORM feature is based on a file system that not limited by the file service type. Thus, it is suitable for most common file services. Aside from tampering and deletion, the TerraMaster HyperLock-WORM File System also protects data from malicious attacks including ransomwares, viruses, and malwares.
HyperLock-WORM File System Key Features
Write Once Read Many
The WORM (Write Once Read Many) feature means that after the file is written, it is locked in a read-only state by removing the write permissions. In this state, the file can only be read, thus cannot be deleted, modified, or renamed.
HyperLock-WORM File System
TerraMaster HyperLock-WORM file system is a storage system with WORM characteristics. By applying write-once-read-many technology, the integrity, confidentiality, and accessibility of the original data in the storage medium are guaranteed, satisfying the stringent security needs of most enterprises with data security storage and legal supervision requirements.
Customized Protection
TerraMaster HyperLock-WORM file system only can be set up by an administrator. Administrators can assign read and write permissions to users and set a protection period. Protection period can be set for up to 70 years. Once configured, protection period cannot be shortened or extended.
Higher Data Security
With TerraMaster HyperLock-WORM file system, even administrators cannot delete or modify files, storage partition, or system background. As long as the storage device is safe in an isolated environment, anyone without access to the NAS device(s), whether employees with administrator privileges or hackers, cannot temper data.
View at TechPowerUp Main Site
HyperLock-WORM File System Key Features
Write Once Read Many
The WORM (Write Once Read Many) feature means that after the file is written, it is locked in a read-only state by removing the write permissions. In this state, the file can only be read, thus cannot be deleted, modified, or renamed.
HyperLock-WORM File System
TerraMaster HyperLock-WORM file system is a storage system with WORM characteristics. By applying write-once-read-many technology, the integrity, confidentiality, and accessibility of the original data in the storage medium are guaranteed, satisfying the stringent security needs of most enterprises with data security storage and legal supervision requirements.
Customized Protection
TerraMaster HyperLock-WORM file system only can be set up by an administrator. Administrators can assign read and write permissions to users and set a protection period. Protection period can be set for up to 70 years. Once configured, protection period cannot be shortened or extended.
Higher Data Security
With TerraMaster HyperLock-WORM file system, even administrators cannot delete or modify files, storage partition, or system background. As long as the storage device is safe in an isolated environment, anyone without access to the NAS device(s), whether employees with administrator privileges or hackers, cannot temper data.
View at TechPowerUp Main Site