

but dozens a minute increase in the dawn hours?
but dozens a minute increase in the dawn hours?
the config and databases or the media, you mean?
if so, the former, but I mount the meadia with a read only docker volume just to be sure, because chances are I would never notice it
ok, but this does not help when the connector is vertical, like on the back of a PC, and often the front too. which side is “up”, left or right? on this particular product, of course.
and then comes when you cant see the connector while trying to plug it in.
you must have lots of LoTs
wpa2, but password limited to 10 characters. letters and numbers only, trying anything else crashes it, and you have to figure this out yourself
maybe the frontend is buggy. did you try with the default frontend?
we need to add cloud connected cameras! oh and AI detection, that prevents you turning it on even if it’s empty, but also if there’s no network or if you need to do your yearly password update
if it don’t complete under a Tiktok I ain’t waiting!
/s
ok, a backdoor then. can they overwrite any file with it?
with properly limited access the breach is much, much less likely, and an update bringing down an important service at the bad moment does not need to be a thing
it’ll still cause downtime, and they’ll probably have a hard time restoring from backup for the first few times it happens, if not for other reason then stress. especially when it updates the wrong moment, or wrong day.
they will leave vulnerable, un-updated containers exposed to the web
that’s the point. Services shouldn’t be exposed to the web, unless the person really knows what they are doing, took the precautions, and applies updates soon after release.
exposing it to the VPN and to tge LAN should be plenty for most. there’s still a risk, but much lower
“backups with Syncthing”
Consider warning the reader that it will not be obvious if backups have stopped, or if a sync folder on the backup pc is in an inconsistent state because of it, as errors are only shown on the web interface or third party tools
that’s horrible and funny at the same time.
I will assume they fixed that vuln later
that’s probably way too much for any sane Python algorithm. if they can’t run it, how do they even know how much is needed?
Probably they should only make a prototype in Python, and then reimplement it in a compiled language. it should reduce the resource usage massively
how do you know it’s working if you can’t connect?
if you run the server on your computer, did you set up the port forwarding? does it work if you just connect to localhost, or the local ip of that computer?
you can delete the calendaring and contacts apps
snapshots, clones, or automated setup with ansible or such
what do you mean by off network? on the wifi of a different home’s network, that has internet access?
the wireguard client on your laptop is supposed to give the laptop (and the laptop only) access to your home network, and the reverse proxy running on the laptop is supposed to give local devices access to services at home selectively, by listening on port 443 on the local network, and processing requests to services that you defined, by forwarding them through the vpn tunnel.
this requires that a machine at home runs a wireguard server, and that its port is forwarded in your router
or that yes, but I often don’t want to give the whole network access to my home network for security reasons, so that’s something to consider
I agree, but SSH is more secure than Jellyfin. it shouldn’t be exposed like that, others in the comments already pointed out why
as I heard that’s pretty common at oracle, but it’s good to spread the word