The bmannconsulting.com website
1--- 2link: https://www.dlink.com/uk/en/products/dns-323-sharecenter-2-bay-network-storage-enclosure 3tags: 4 - homelab 5 - hardware 6 - product 7 - NAS 8 - D-Link 9--- 10An old D-Link product that I used to run a lot of things on my [[Home Lab]], an early home NAS that was hackable to run a few other things. 11 12![DLink NAS DNS 323 Front](/assets/2025/DNS_323_A1.png) 13 14![DLink NAS DNS 323 Back](/assets/2025/DNS_323_Back.png) 15 16Here's the [original product page](https://www.dlink.com/uk/en/products/dns-323-sharecenter-2-bay-network-storage-enclosure) and the [legacy product page](https://legacy.us.dlink.com/pages/product.aspx?id=dab7c4098c6a49789a2c7386fdfffd0b) showing May 2013 as its end of life date, and original [datasheet PDF](https://www.dlink.com/uk/en/-/media/consumer_products/dns/dns-323/datasheet/dns_323_datasheet_en_uk.pdf). 17 18I dragged it out for the [[Z-Space Electronics Bazaar]], but didn't get rid of it because I needed to hook it up and see what was on the drives / wipe the drives. It has two 2TB drives, setup as mirrored RAID1. 19 20Got it on the Z-Space network and it popped right up, and used my old-forever-password for the admin luckily! 21 22I guess i went pretty deep into this before, putting some custom boot loaders with [fun_plug](http://dns323.kood.org/howto:fun_plug) that I vaguely remember. The backup files have dates around [[2011]] - [[2012]] - [[2013]]. 23 24Also, looks like I was using "bare" SMTP user/pass for my old gmail account, which might be the vector for how that account was hacked.