

Just make sure any power saving features are disabled. That is, if the 3000km journey to wiggle the mouse is not on your bucket list.
Global namespace extremist. Defragment your communities!
Just make sure any power saving features are disabled. That is, if the 3000km journey to wiggle the mouse is not on your bucket list.
Every time I feel like I finally get kubernetes, somebody surprises me by talking about very specific, complex modern technologies being used to do basically the same thing we’ve been doing for decades by simple tools.
And I always experience the same urge to re-grow a tail and climb a tree.
I use miscale 1 with gadgetbridge. Homeassistant has also autodiscivered it, but I’m hessitant to pair it with 2 different devices so no idea if it actually works.
… is the most upvoted stackoverflow answer.
Gmail offers imap amd smtp access. You have to enable 2FA, and then it will allow you to create account for so called “less secure apps”.
In your place, I’d either continue using gmail directly, or finish the configuration of the self hosted mail server and just use that with any smtp/imap client. I suggest getting a separate domain for testing first, before moving your primary inbox there.
you still need good security configuration of the exposed service.
In a sense that security comes in layers, yes. But in practice, this setup will prevent 100% of bots scanning the internet for exposed services, and absolute majority of possible targeted attacks as well. It’s like using any other 3rd party VPN, except there’s not a central point for the traffic to flow through.
From the attackers point of view, nothing is listening there.
I’ve used a similar setup in the past to access a device behind a NAT (possibly multiple NATs) and a dynamic IPv4. Looking back, that ISP was a pure nightmare.
This is not a guide to hide from the government or ISP. Just a way to tunnel to your home server without publishing the sshd for random strangers. Personally, I’d just publish the ssh and be done with it.
I would rather live without the correlation attacks
The more people using Tor, the less useful targeted disconnects become.
Which is still just as open, but also a massive calling card for anyone trolling around the TOR network
Luckily, it is no longer possible to easily sniff the new v3 addresses by deploying a malicious relay. Any attack to even reveal the existence of a hidden service would require a very specialized setup. And we’re just talking discovery, not the ability to connect and attack the actual service running there.
just connecting to Tor is very much a huge exposure imho
Exposure of what, to whom?
Of course security comes with layers, and if you’re not comfortable hosting services publically, use a VPN.
However, 3 simple rules go a long way:
Treat any machine or service on a local network as if they were publically accesible. That will prevent you from accidentally leaving the auth off, or leaving the weak/default passwords in place.
Install services in a way that they are easy to patch. For example, prefer phpmyadmin from debian repo instead of just copy pasting the latest official release in the www folder. If you absolutely need the latest release, try a container maintained by a reasonable adult. (No offense to the handful of kids I’ve known providing a solid code, knowledge and bugreports for the general public!)
Use unattended-upgrades, or an alternative auto update mechanism on rhel based distros, if you don’t want to become a fulltime sysadmin. The increased security is absolutely worth the very occasional breakage.
You and your hardware are your worst enemies. There are tons of giudes on what a proper backup should look like, but don’t let that discourage you. Some backup is always better than NO backup. Even if it’s just a copy of critical files on an external usb drive. You can always go crazy later, and use snapshotting abilities of your filesystem (btrfs, zfs), build a separate backupserver, move it to a different physical location… sky really is the limit here.
If you come from IT, you never really quit. A little parser bug here, a small race condition there, or a fucking baking oven refusing to bake until you tell it what time it is. No hope, no escape.
I’m not exactly sure what it is that I’ve just seen, but I am mildly aroused.
more checkboxes == more better
Isn’t that mainly a problem with recursive DNS servers? The authoritative servers are only aware of the few domains they’re hosting.
What’s wrong with miracast? Almost every device sold these days has some kind of radio, but no way to talk to each other. Releasing a new standard every few years won’t help much.
Groups multiple tokens together and creates a capture group for extracting a substring or using a backreference
With an explanation like this, I thing I’ll take the AI.
Running for 6 days, save_pieces: false
My database is currently 184 GB
Back in the windows 2012 era, we knew every time a major windows update was pushed, because the same set of customers would always create a ticket, complaining about inaccessible RDP. Windows firewall is just opinionated like that.
If it does not help, try limiting the maximum number of active connections in qbittorrent.