the config and databases or the media, you mean?
if so, the former, but I mount the meadia with a read only docker volume just to be sure, because chances are I would never notice it
the config and databases or the media, you mean?
if so, the former, but I mount the meadia with a read only docker volume just to be sure, because chances are I would never notice it
ok, but this does not help when the connector is vertical, like on the back of a PC, and often the front too. which side is “up”, left or right? on this particular product, of course.
and then comes when you cant see the connector while trying to plug it in.
I have a satellite tracker for when I want to contact radio sats,
which one do you use? can it show where is it on a camera background?
you must have lots of LoTs
wpa2, but password limited to 10 characters. letters and numbers only, trying anything else crashes it, and you have to figure this out yourself
ok, a backdoor then. can they overwrite any file with it?
with properly limited access the breach is much, much less likely, and an update bringing down an important service at the bad moment does not need to be a thing
it’ll still cause downtime, and they’ll probably have a hard time restoring from backup for the first few times it happens, if not for other reason then stress. especially when it updates the wrong moment, or wrong day.
they will leave vulnerable, un-updated containers exposed to the web
that’s the point. Services shouldn’t be exposed to the web, unless the person really knows what they are doing, took the precautions, and applies updates soon after release.
exposing it to the VPN and to tge LAN should be plenty for most. there’s still a risk, but much lower
“backups with Syncthing”
Consider warning the reader that it will not be obvious if backups have stopped, or if a sync folder on the backup pc is in an inconsistent state because of it, as errors are only shown on the web interface or third party tools
that’s horrible and funny at the same time.
I will assume they fixed that vuln later
that’s probably way too much for any sane Python algorithm. if they can’t run it, how do they even know how much is needed?
Probably they should only make a prototype in Python, and then reimplement it in a compiled language. it should reduce the resource usage massively
also competent assholes are less likely to change the world for the better
how do you know it’s working if you can’t connect?
if you run the server on your computer, did you set up the port forwarding? does it work if you just connect to localhost, or the local ip of that computer?
Edit: 🤔 what happens if I try to subscript a superscripted emoji?^
this:
Never thought of super/subscripting_an_emoji_😎_~👽~
but spaces break the superscript so you have to use something else for it
I guess this way people often just think that higher number is better, even if only subconsciously, and people will more often by a newer phone. but single increments like with the generation don’t have the same effect if the numbers are already large, and if they would use the release year maybe that wouldn’t have this effect on sales because people know it’s just the year. and a change from 2024 to 2025 does not seem to be so big as from 5 to 6
you can delete the calendaring and contacts apps
snapshots, clones, or automated setup with ansible or such
what do you mean by off network? on the wifi of a different home’s network, that has internet access?
the wireguard client on your laptop is supposed to give the laptop (and the laptop only) access to your home network, and the reverse proxy running on the laptop is supposed to give local devices access to services at home selectively, by listening on port 443 on the local network, and processing requests to services that you defined, by forwarding them through the vpn tunnel.
this requires that a machine at home runs a wireguard server, and that its port is forwarded in your router
or that yes, but I often don’t want to give the whole network access to my home network for security reasons, so that’s something to consider
I agree, but SSH is more secure than Jellyfin. it shouldn’t be exposed like that, others in the comments already pointed out why
how do you do that? are you just uploading the PDF?