
TerraMaster Unveils D9-320 9-Bay 10Gbps Storage Expansion Enclosure
Three Major Breakthroughs Set a New Industry Benchmark
9-Channel Independent Power Management
The D9-320 introduces an innovative design with nine physical power switches plus a master control switch for dual protection. Users can precisely shut down idle drives, reducing power consumption by up to 70%. Paired with a UPS intelligent power-off protection system, it automatically performs head parking and data cache protection during unexpected power outages, improving data safety by 300% compared to traditional enclosures.
10Gbps High-Speed Data Transmission Equipped with a USB 3.2 Gen2 interface, the D9-320 achieves transfer speeds of up to 10Gbps. Real-world tests show read/write speeds of 1016MB/s with nine parallel 8TB WD Red HDDs and 510MB/s for a single 1TB WD Red SSD, ensuring high-speed performance for both multi-drive and single-drive setups.
Massive Storage Capacity and Expansion
The D9-320 supports nine drives in single-disk mode, with a maximum single-drive capacity of 22TB, delivering up to 198TB of total storage. It seamlessly expands storage for NAS and PCs, including Windows, Mac OS, Linux, TerraMaster OS, Unraid, TrueNAS, and Proxmox systems.
Innovative Power Management and Data Protection
The D9-320 introduces a revolutionary power management system with nine independent drive power switches and a master power switch. Users can turn off idle drives to save energy and extend drive lifespan. Its intelligent power-off protection ensures safe drive ejection and head parking before shutdown, preventing damage from sudden power loss—a common issue affecting SMART metrics
in traditional enclosures. Additionally, the power recovery function either shuts down the device after a normal power-off or auto-restarts after an unexpected outage, making it ideal for unattended server and NAS setups.
Energy-Saving Smart Features
The D9-320 includes an intelligent sleep mode that syncs with a PC's sleep or shutdown state, reducing drive wear and energy consumption. It features a second-generation smart cooling system with four precise temperature sensors and adjustable fan speeds, maintaining optimal operating temperatures even under full load while minimizing noise. This ensures longevity and a quiet working environment.
Broad Cross-Platform and Device Compatibility
Designed for versatility, the D9-320 integrates seamlessly with multiple operating systems, including Windows, Mac OS, Linux, TerraMaster OS, Unraid, TrueNAS, and Proxmox. Its USB Type-C interface is
compatible with USB 3.0/3.1/3.2, USB4, Thunderbolt 3, and Thunderbolt 4 ports. It supports the mixed installation of 3.5″ and 2.5″ HDDs/SSDs.
NAS Storage Expansion
The D9-320 is deeply compatible with the TOS system, offering one-click expansion of TerraMaster NAS storage pools. It supports creating JBOD/RAID, TRAID, and TRAID+ array modes, effortlessly expanding NAS storage capacity.
Daisy-Chain Expansion
The device includes an additional 10Gbps USB Host expansion port, enabling multiple storage devices to be daisy-chained for further capacity expansion. When facing a shortage of USB ports on a computer, the D9-320's USB Host interface provides a perfect solution.
Durable All-Metal Build
The D9-320 features a robust all-metal chassis capable of withstanding high-intensity workloads. For PC users, it also offers the free TPC Backupper tool on Windows, providing scheduled backups with incremental and differential options to ensure data security.
The TerraMaster D9-320 is now available for purchase through the TerraMaster official store and authorized channels, with a 2-year warranty and lifetime technical support. 0 0

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Arabian Post
3 days ago
- Arabian Post
Mozilla VPN Lands on Every Linux Desk
Linux users can now install Mozilla VPN via Flatpak on Flathub, opening the way for seamless cross‑distribution deployment. The move elevates the privacy-centric VPN's reach beyond Debian-based systems, where it was previously limited by Debian packages, addressing long-standing accessibility challenges. Bringing Mozilla VPN to Flatpak aligns with growing demand for universal packaging solutions across diverse desktop environments. Previously, users on distros like Fedora, Arch and openSUSE had to compile the client from source if not on Ubuntu derivatives. The new Flatpak, officially published by Mozilla, offers an easier route for installation—even though Flathub's verification process is still underway, meaning some distributions will hide the unverified app until it's signed off. The Flatpak version harnesses the advantages of sandboxing—each application runs in an isolated environment, reducing the risk associated with vulnerabilities—though experts caution that no sandbox system is entirely impervious and emphasise the importance of reviewing permissions and verifying digital signatures. For administrators managing mixed-distro environments, the convenience of a single install method carries significant operational weight. ADVERTISEMENT Under the hood, Mozilla VPN continues to use WireGuard, delivering high-speed and efficient encryption with minimal latency compared to legacy protocols. These characteristics resonate with privacy-conscious consumers and IT teams across sectors, who prioritise both performance and data protection. Mozilla VPN is a subscription service, priced at $9.99 monthly or $4.99 on an annual plan, and it is powered by Mullvad's network infrastructure—itself well regarded for its commitment to privacy and minimal logging. Users can connect up to five devices simultaneously and access more than 500 servers across over 30 countries. The partnership with Mullvad preserves user anonymity to a large degree, although the reliance on an external provider underscores the trade-off compared with self-hosted WireGuard solutions. Linux community feedback has been supportive. One user noted the ease of use on Fedora thanks to RPM binaries, indicating the Flatpak route removes a barrier to entry for less technically inclined users. However, security‑focused users discussing the trade-offs between Mozilla VPN and Mullvad suggest the former offers user-friendly attribution and Mozilla‑aligned mission support, while direct Mullvad subscriptions might hold a marginal edge in anonymity. Despite some friction—such as the lack of full Flatpak verification and extra steps required on distributions with strict app policies—the rollout represents a milestone for Mozilla's open-source VPN strategy. With universal Linux support now achieved, the company is poised to penetrate enterprise and educational networks that rely on heterogeneous systems, even as self-hosted options like Algo VPN or private WireGuard servers remain preferred in high-security environments. Apart from cross-distro compatibility, Mozilla emphasizes that this Flatpak release ensures users encounter the same feature set across Windows, macOS and mobile platforms: device protection, multi-hop routing, malware and tracker blocking, and unthrottled bandwidth. For organisations deploying VPNs to staff, this experience consistency and a centralised subscription model can simplify onboarding and policy enforcement. Distribution maintainers are also responding. Fedora has long offered RPMs for Mozilla VPN via GitHub artefacts, while Ubuntu derivatives continue to support Debian packages from the official Mozilla APT repository—options that remain valid alongside Flatpak and aid users bound by corporate or regulatory compliance. The Flatpak release is likely to prompt further improvements in permissions handling, performance tuning and Flathub verification. That said, the package enables end-users to manage installations via both GUI and CLI, using commands such as flatpak install flathub org. mozilla. vpn, which is expected to significantly reduce friction for adoption.


Arabian Post
3 days ago
- Arabian Post
Crypto‑Looting Malware Masquerades as AI and Gaming Start‑ups
Cybersecurity firm Darktrace has revealed a sophisticated social engineering campaign targeting cryptocurrency users on Windows and macOS. The scheme employs fake start‑up companies themed around AI, gaming, Web3, video conferencing, and social media to trick individuals into downloading malware disguised as legitimate software. Darktrace's analysis shows threat actors are establishing plausible digital identities using compromised or spoofed X accounts—sometimes verified—for both companies and employees, hosted on platforms like Medium, Notion, GitHub and X to lend credibility. Notably, the group evolved from a December 2024 Web3 'Meeten' video‑call scam identified by Cado Security Labs into a broader and more enduring operation. Attackers initiate contact via Telegram, Discord or X, offering test access to new software in exchange for cryptocurrency payments. Victims receive a registration code to download tailored Windows Electron apps or macOS DMG files. Upon installation, the malware surreptitiously profiles the device, displays a fake Cloudflare verification, and initiates the payload: a stealer or drainer aimed at crypto wallets. ADVERTISEMENT On Windows, the malware utilizes stolen code‑signing certificates, installing an MSI payload that harvests credentials and wallet data. On macOS, variants include the Atomic macOS Stealer, capable of extracting browser cookies, documents, wallet credentials and maintaining persistence via Launch Agents. Darktrace's report highlights the extensive list of fake companies involved: BeeSync, Buzzu, Cloudsign, Dexis, KlastAI, Lunelior, NexLoop, NexoraCore, NexVoo, Pollens AI, Slax, Solune, Swox, Wasper, YondaAI, among others. Victims cross‑checked these brands against polished websites, whitepapers and employee profiles on Notion and GitHub that imitate authentic early‑stage tech companies. Darktrace notes the campaign bears hallmarks similar to that of the traffer group CrazyEvil, known for deploying StealC, AMOS and Angel Drainer malware. While attribution remains unconfirmed, shared evasion techniques and targeting broadly align. Experts have raised concerns about this tactic of 'legitimacy laundering'. The use of compromised X accounts—especially verified ones—with stolen certificates and AI‑generated content underscores a refinement in social engineering methods. Darktrace threat researcher Tara Gould emphasises that this illustrates 'the efforts that threat actors will go to make these fake companies look legitimate'. Emerging trends in the campaign include multi‑platform targeting and increasingly authentic deception. Windows versions show paranoia‑level evasion: they bundle obfuscation, sandbox‑avoidance checks and stolen signing certificates to bypass defences. On the macOS side, apart from AMOS, the infection employs staged shell or bash scripts to install launch‑agents and maintain persistence post‑reboot. This campaign also marks a shift from opportunistic blast‑campaigns to more tailored, lure‑based attacks. Actors undertake reconnaissance—observing target roles in Web3 and crypto—before approaching them via trusted‑looking channels. In some cases, attackers impersonated actual contacts and shared internal presentations to build trust. Security experts stress that safeguarding against such threats requires cautious validation of unsolicited software offers, robust code‑signing certificate vetting, and network segmentation. Users are urged to verify company legitimacy externally—checking domain registrations, team credentials and cross‑referencing claims. Defensive strategies recommended by Darktrace include enhanced telemetry on installation attempts, stricter code‑signing policies, and behavioural detection tuned to recognise post‑installation profiling and exfiltration patterns. For macOS, entry‑point monitoring and examination of Launch Agent activity provide early alerts.


Middle East Eye
6 days ago
- Middle East Eye
Israeli civilians paid thousands to demolish Gaza homes
Israeli civilians operating heavy machinery in Gaza can earn as much as $9,000 per month, TheMarker reported on Thursday. Since the start of the war on Gaza, the Israeli military has been systematically demolishing homes and civilian infrastructure across the Palestinian enclave. Heavy machinery has played a central role in this destruction, operated both by soldiers and civilians. According to TheMarker, a trained heavy equipment operator can earn approximately 1,200 shekels ($360) per day, drawn from the 5,000 shekels ($1,500) the Israeli Ministry of Defence pays daily to the equipment's owner. Private contractors can also choose to work at different rates. New MEE newsletter: Jerusalem Dispatch Sign up to get the latest insights and analysis on Israel-Palestine, alongside Turkey Unpacked and other MEE newsletters For demolishing a three-storey building, contractors receive 2,500 shekels ($750); for taller buildings, the rate rises to 5,000 shekels ($1,500). 'For a contractor to earn another 5,000 shekels by bringing down a house, it's considered acceptable to kill people who are just looking for food' - Israeli soldier 'At first I did it for the money. Then for revenge. The work there is very hard and unpleasant. The army doesn't operate smartly, it just wants to destroy as much as possible and doesn't care about anything,' one heavy equipment operator told TheMarker. 'I used to take home a salary of 30,000 shekels ($9,000) a month. I got a car, and they rented me a flat in Ashkelon,' he added. The military encourages rapid demolition in the enclave, according to TheMarker. 'The faster the buildings in Gaza are levelled, the higher the income for equipment owners,' the report said. There has also been a noticeable increase in online job advertisements for operators in recent months. The army's official website states: 'Today, every commander wants a skilled heavy equipment operator and a powerful bulldozer by his side on the battlefield.' While the Israeli military primarily uses the armoured D9 bulldozer, it has also deployed civilian machinery in Gaza to meet demand. 'These vehicles aren't armoured, and a private company is hired to protect them from missiles and snipers. But there's no real military purpose to their activity,' a reservist told TheMarker. Killing aid seekers for profit Contractors' eagerness for more demolition work in Gaza is also contributing to the mass killing of Palestinian aid seekers near US aid distribution points. According to soldiers who spoke to Haaretz last month, private contractors 'act like a kind of sheriff', demolishing wherever they choose along the Gaza Strip and requiring Israeli soldiers to stay with them for protection. When contractors get too close to unarmed Palestinians, soldiers open fire, claiming the civilians' proximity poses a danger. Gaza: Israeli soldiers admit to deliberately killing unarmed aid seekers Read More » 'They're making a fortune,' one soldier said. 'From their perspective, any moment where they don't demolish houses is a loss of money, and the forces have to secure their work.' He added that it is often the soldiers who move closer to Palestinian aid seekers, only to then declare them a threat. 'So, for a contractor to earn another 5,000 shekels by bringing down a house, it's considered acceptable to kill people who are just looking for food.' This week, during a demolition operation in Khan Younis, an Israeli soldier was killed by Hamas fighters after they decided against capturing him. The soldier, Avraham Azoulay, a settler from Yitzhar, was a heavy equipment operator. A chat group of hilltop youth, the armed militias of settlers in the occupied West Bank, said that Azoulay fell in battle "while destroying and demolishing the enemy's houses". Far-right MP Tzvi Sukkot of the Religious Zionist Party also eulogised Azoulay during a parliament debate. Azoulay "came to Rafah and destroyed many buildings in the name of the State of Israel, knowing that he might not return home, as really happened," Sukkot said. Hilltop youth recruitment In May, Sukkot eulogised David Libi, another settler who was killed in the Gaza Strip while working as a heavy equipment operator. Libi was "directly responsible for the greatest achievement of the war in wiping out tens of thousands of homes," Sukkot said. Shortly after Libi's death Sukkot highlighted that many of the operators come from settler communities. Rabbi Avraham Zarbib is the most famous operator. Zarbib, a settler from Beit El, has become a social media phenomenon due to videos he uploads, in which he is seen demolishing houses in Gaza. "We will defeat this damn village until the end, until the victory, until the settlement," Zarbib said in one of his latest videos taken in Khan Younis. 'We will not give up until this village is wiped out' - Israeli soldier and bulldozer operator "We will not give up until this village is wiped out." Last week, Israeli journalist Uri Misgav reported that two civilian setups operating under the umbrella of the Ministry of Defence are responsible for the heavy equipment operation in Gaza. Each setup includes dozens of heavy equipment, and their operators are recruited from among the hilltop youth. According to Misgav, the setups are divided between north and south. Golan Vach, a former senior army officer, oversees northern Gaza. Vach is the brother of Yehuda Vach, a division commander, who was labelled by the Hind Rajab Foundation as "The Executioner of Gaza" for his alleged role in the "establishment and enforcement of an unlawful 'kill zone' in the Netzarim Corridor". Last month, the foundation filed a complaint against the two brothers to the ICC for crimes committed in Gaza. The southern Gaza Strip is overseen by Bezalel Zini, the brother of David Zini, Prime Minister Benjamin Netanyahu's controversial candidate for head of the Shin Bet.