My book world edition II has 4 drive. Already pressed reset button for 4 seconds and got myself into the same situation. i did (reset button at the back, unplug->power up + reset for 40 sec) did not help. Hi, I downloadd last week WD MBL 2Tb drive. Initially, I had a lot of problems but after uploading new firmware, new WD Smartware etc, I am. I got a new World book a few weeks back, I have never logged onto but the default user name and password (admin/) does not work!.

My Book World Er Default Password

Language:English, Portuguese, German
Genre:Children & Youth
Published (Last):15.06.2016
ePub File Size:15.46 MB
PDF File Size:12.49 MB
Distribution:Free* [*Register to download]
Uploaded by: TWANA

my book world edition user manual about your wd product – 3 updating your Wd My Book World Edition Default Ip Address - wd my .. badenw ??rttemberg mathematik m. cdrom, was denkt der hund?: wie er die welt wahrnimmt. How to Reset the Wd Sharespace or the Wd My Book World (White Light) Drive Im por t ant:The User Manual f or t he My Book World (Whit e Light) incorrect Drive Com patibility Guide | Reviews | Regist er your WD Drive. Hello, My WD My Book World drive has crapped out on me. According to the manual, the MyBook supports both the CIFS/SMB and the NFS protocols. nor could I delete anything using any dos based hard drive zero-er.

I took the hard drive out of the case and put it into my desktop.

I am now trying to access the drive with the only purpose of recovering data and if the drive is still good, wiping it clean and formatting it to work in windows. After reading countless threads, I believe that the file system is xfs. However, trying to mount gives me "Can't read superblock". Any ideas? Sorry, I've been driving myself crazy with this that I missed some important info!

I am using a ubuntu live cd created a couple of months ago for doing all of this. I know my way around a computer, but my linux knowledge is very limited.

I will check on that tomorrow. Some people said it was ext3, some said it was a raid stup, bt trying to mount as an ext3 or 2 gave the error that the FS was wrong.


I also tried to follow directions for using mdadm with no luck the drive shows 4 partitions. Using the disk utility I think that was the name it shows it correctly with the right overall size, but says "unknown" for each partition.

Used Disk Utility. Partition types are all listed as unknown. Partitioning is "Unknown Scheme" Tried the dumpe2fs from the link you provided. Response was "Couldn't find valid filesystem superblock. Following the suggestion of another website, I tried the command dmesg grep "[sh]da" a ton of similar results popped up. A typical one looked like: Read Not looking promising Adv Reply.

Join Date Oct Beans Access by the NFS protocol is not enabled by default; you have first to enable it in the "Advanced" tab of the MyBook storage manager, then you can mount the disk shares via NFS with: Distro Xubuntu. No offense but I think you are missing the point.

This drive is probably toast, has a messed up boot sector and the user can't mount it at all. In the first post OP states that the drive is not in an external box anymore but in the computer so, as informative as your post is, it is redundant. To me that means that the drive is fully toast.

Thanks for all of your help, and you too cprofitt. At first, that is. The hacker just lurked, reading all her messages and getting to know her. He learned where she banked and that she had an accountant who handled her finances.

He even learned her electronic mannerisms, the phrases and salutations she used. An even more sinister means of stealing passwords is to use malware: hidden programs that burrow into your computer and secretly send your data to other people. According to a Verizon report, malware attacks accounted for 69 percent of data breaches in They are epidemic on Windows and, increasingly, Android. Malware works most commonly by installing a keylogger or some other form of spyware that watches what you type or see.

Its targets are often large organizations, where the goal is not to steal one password or a thousand passwords but to access an entire system.

He Perfected a Password-Hacking Tool—Then the Russians Came Calling

One devastating example is ZeuS, a piece of malware that first appeared in Clicking a rogue link, usually from a phishing email, installs it on your computer. Then, like a good human hacker, it sits and waits for you to log in to an online banking account somewhere.

As soon as you do, ZeuS grabs your password and sends it back to a server accessible to the hacker. Targeting such companies is actually typical. Essentially, he's the guy in charge of figuring out how to get us past the current password regime. DON'T Reuse passwords.

If you do, a hacker who gets just one of your accounts will own them all. Use a dictionary word as your password. If you must, then string several together into a pass phrase. Use standard number substitutions. Think "Pw0rd" is a good password? Cracking tools now have those built in. Use a short password—no matter how weird. Today's processing speeds mean that even passwords like "h6! Your best defense is the longest possible password.

DO Enable two-factor authentication when offered. When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it's better than nothing. Give bogus answers to security questions.

Think of them as a secondary password. Just keep your answers memorable. My first car? One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages. Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that's a line of attack.

So create a special account you never use for communications. If our problems with passwords ended there, we could probably save the system. We could ban dumb passwords and discourage reuse. We could train people to outsmart phishing attempts. Just look closely at the URL of any site that asks for a password. We could use antivirus software to root out malware. But we'd be left with the weakest link of all: human memory.

Passwords need to be hard in order not to be routinely cracked or guessed. So if your password is any good at all, there's a very good chance you'll forget it—especially if you follow the prevailing wisdom and don't write it down.

Because of that, every password-based system needs a mechanism to reset your account. And the inevitable trade-offs security versus privacy versus convenience mean that recovering a forgotten password can't be too onerous. That's precisely what opens your account to being easily overtaken via social engineering.

Although "socialing" was responsible for just 7 percent of the hacking cases that government agencies tracked last year, it raked in 37 percent of the total data stolen. Socialing is how my Apple ID was stolen this past summer. The hackers persuaded Apple to reset my password by calling with details about my address and the last four digits of my credit card.

Because I had designated my Apple mailbox as a backup address for my Gmail account, the hackers could reset that too, deleting my entire account—eight years' worth of email and documents—in the process.

They also posed as me on Twitter and posted racist and antigay diatribes there. After my story set off a wave of publicity, Apple changed its practices: It temporarily quit issuing password resets over the phone. But you could still get one online.

And so a month later, a different exploit was used against New York Times technology columnist David Pogue. This time the hackers were able to reset his password online by getting past his "security questions.

To reset a lost login, you need to supply answers to questions that supposedly only you know. Answers to the first two were available on Google: He had written that a Corolla had been his first car, and had recently sung the praises of his Toyota Prius. The hackers just took a wild guess on the third question. It turns out that at the dawn of the new millennium, David Pogue, like the rest of the world, was at a "party.

They dove into his address book he's pals with magician David Blaine! OK, you might think, but that could never happen to me: David Pogue is Internet- famous, a prolific writer for the major media whose every brain wave goes online. But have you thought about your LinkedIn account? Your Facebook page? Your kids' pages or your friends' or family's? If you have a serious web presence, your answers to the standard questions—still often the only options available—are trivial to root out.

Your mother's maiden name is on Ancestry. The ultimate problem with the password is that it's a single point of failure, open to many avenues of attack. We can't possibly have a password-based security system that's memorable enough to allow mobile logins, nimble enough to vary from site to site, convenient enough to be easily reset, and yet also secure against brute-force hacking. But today that's exactly what we're banking on—literally.

Who is doing this? Who wants to work that hard to destroy your life? The answer tends to break down into two groups, both of them equally scary: overseas syndicates and bored kids.

The syndicates are scary because they're efficient and wildly prolific. Malware and virus-writing used to be something hobbyist hackers did for fun, as proofs of concept. Not anymore. Sometime around the mids, organized crime took over.

Today's virus writer is more likely to be a member of the professional criminal class operating out of the former Soviet Union than some kid in a Boston dorm room. There's a good reason for that: money. Moreover, they are targeting not just businesses and financial institutions but individuals too. Russian cybercriminals, many of whom have ties to the traditional Russian mafia, took in tens of millions of dollars from individuals last year, largely by harvesting online banking passwords through phishing and malware schemes.

In other words, when someone steals your Citibank password, there's a good chance it's the mob.

But teenagers are, if anything, scarier, because they're so innovative. The groups that hacked David Pogue and me shared a common member: a year-old kid who goes by the handle "Dictate. He's just calling companies or chatting with them online and asking for password resets. But that does not make him any less effective.


He and others like him start by looking for information about you that's publicly available: your name, email, and home address, for example, which are easy to get from sites like Spokeo and WhitePages.

Then he uses that data to reset your password in places like Hulu and Netflix, where billing information, including the last four digits of your credit card number, is kept visibly on file. Once he has those four digits, he can get into AOL, Microsoft, and other crucial sites. Soon, through patience and trial and error, he'll have your email, your photos, your files—just as he had mine.

The Best Password Managers

Why do kids like Dictate do it? Mostly just for lulz: to fuck shit up and watch it burn. One favorite goal is merely to piss off people by posting racist or otherwise offensive messages on their personal accounts. As Dictate explains, "Racism invokes a funnier reaction in people. Hacking, people don't care too much. When we jacked jennarose3xo"—aka Jenna Rose, an unfortunate teen singer whose videos got widely hate-watched in —"I got no reaction from just tweeting that I jacked her stuff.

We got a reaction when we uploaded a video of some black guys and pretended to be them. A lot of these kids came out of the Xbox hacking scene, where the networked competition of gamers encouraged kids to learn cheats to get what they wanted.Hacker: Can you send it to "toe aol.

Done, dusted and 'Solved'. We can't possibly have a password-based security system that's memorable enough to allow mobile logins, nimble enough to vary from site to site, convenient enough to be easily reset, and yet also secure against brute-force hacking.

Wait until the system restore process is completed. And along with Mimikatz, they added up to a tag-team approach that maximizes those automated infections. I'm wondering if restoring the boot sector would remedy this?