

From what I’ve heard it’s someone who really doesn’t know what they’re doing making it, and it has a ton of obvious security issues that the dev refuses to acknowledge. It really isn’t something that people should actually use.
From what I’ve heard it’s someone who really doesn’t know what they’re doing making it, and it has a ton of obvious security issues that the dev refuses to acknowledge. It really isn’t something that people should actually use.
Considering my boot drive just died, backups. Also wanna get a fractal node 804 and cram tons of HDDs in it. Probably a new build with ecc as well. Perhaps transitioning current server to backup server. Also my directory structure for media is a jumbled mess of incomprehensible nonsense. I should fix that. Also I lost all my torrents that I was uploading but still have the media but can’t keep seeding after the drive failure.
I don’t like that all of the questions are mandatory. For some of them, I just haven’t done enough with whatever it is to have an opinion and would not be able to provide good data.
Sorry to see you got downvoted for saying something that Reddit did better than Lemmy. I think a lot (though probably not the majority) of lemmings as well as people invoiced in open source can’t take criticism, especially of an open source project they care about. It is unfortunate as it negates a lot of the benefits of open source / free software.
I’m on a new domain now anyway. I will be more careful on this one, but I suspect they just didn’t look into it. I do really appreciate that you seem to be both knowledgeable and not an asshole. That seems to be a rare combination to find in this thread.
It typically is, and I won’t comment on whether mine is, but that isn’t enough reason to take it down. I was quite careful about who I gave access to, as well as making sure people had secure passwords. It is highly unlikely that anyone got in and saw any copyright violation before reporting it.
I kept it up for more than a year. By friends I mean like 3 people I know in real fucking life, and I made them all set secure passwords. Way to assume the worst about people, it is a very healthy attitude to have.
I see people mentioning small office desktops, and they are good, but I will warn you that they use proprietary parts so upgrading and repairing them can be difficult. Also jellyfin.org has some good info under the hardware acceleration section for what to use.
Well it isn’t really CPU vs GPU. It is integrated vs dedicated GPU. A CPU certainly can transcode, but not well. A lot of CPUs have integrated graphics which can handle transcoding quite well. I went with an Intel arc a380 because I know quite a lot of people could hit it under some circumstances. For most people though, I would recommend an Intel CPU with quicksync. What you really should spend your budget on IMO is as much storage as you can.
I don’t have this problem exactly, but what I would recommend is putting it in a specific separate library. You could even set it up so only your mother’s account can access it, and you never have to see it, or you could have it visible but never go to it.
I know there are valid use cases for that much, I just always like to check that they didn’t just see an LTT video and think they need way more than they do.
Damn, what do you need that much RAM for?
I don’t like windows, so I don’t deploy any of this for real, but yesterday and the day before I set up a windows server, a few clients, and a Kali VM and manager to get in. I found out if you type “\\anything” into the windows bar it will send that user’s name and hash out very easily with llmnr poisoning on every keystroke. What’s worse is that is the default behavior. It is super fun to learn about all this though.
Edit: upon posting this comment it made the double backslash look like a single backslash so I changed it to a triple so it looks right on my end but just know I meant for it to be double.
If I were you I might try deploying a mini enterprise network with permissions and things. It would be fun to do it with active directory to try to practice pentesting, or it would also be fun to do with linux to try to learn more about deploying linux in enterprise environments.
I think they were referring to the UI which looks very similar to the pihole dashboard.
Did you use it to cook the pizza?
I believe it will result in like 10% additional overhead, which may be bad on metered connections, but I am not aware of any situation that results in decreased performance. I don’t really know much about this so if anyone would like to correct me, please do.
I don’t know if it is, but it is really as simple as adding to lines to a config file and restarting a service.
deleted by creator
Eh, I sometimes spin up a temporary docker container for some nonsense on a separate computer. I usually just go for it after checking no one is on and backing up necessary data.