

Ah good this means I can continue to safely ignore it when I migrate.
Ah good this means I can continue to safely ignore it when I migrate.
The folding at home folks have been going for a very long time now and that’s contributed a lot to various fields of medicine over the years.
Can you mount SMB shares in unprivliged containers? I thought that was blocked.
Can the host itself write to the file share? You can check this by trying to create a file in it via the host’s shell. If it can’t write to it the container won’t be able to either.
Yup I’ve got a box in my mum’s house that all my off site backups go to and it’s a damn site cheaper just to give her some money for the electricity cost of it each month than pay for any cloud service.
You can pry my gen8 hp microserver from my cold, dead hands.
Ah fair didn’t realise that. I assumed it would.
Can’t users just block entire instances themselves now? So the trick would be to join one that broadly follows your interests and cut down as required.
Either ignore like I do or add a self signed cert to trusted root and use that for your services. Will work fine unless you’re letting external folks access your self hosted stuff.
If you’re running mostly Linux vms proxmix us really good. It’s based on kvm and has a really nice feature set.
I find mine useful as both a learning process and as a thing need. I don’t like using cloud services where possible so I can set things up to replace having to rely on those such as next loud for storage, plex and some *arr servers for media etc. And I think once you put the hardware and power costs vs what I’d pay for all the subs (particularly cloud storage costs) it comes out cheaper at least with hardware I’m using.
I mean if you’re uu hang aorund at a pride parade these are very really things that might happen.
Reverse proxies can be useful for hiding your IP if you do something like host it in a VPS and tunnel the traffic back to your self hosted service. There’s also a lot of documentation on attaching things like fail2ban or crowd sec which can be helpful in reducing the threat from attacks. if you’re running lots of services it can reduce the risk of two apps using the same ports as ultimately everything will go through ports 80 and 443 on the public facing side. Finally again if you’re hosting several services having a central place to manage and deal with cert from can save a lot of time rather than having to wrangle it per service/ server.