

The shitty part is taking features people already had access to and locking them away all while spying on you.
The shitty part is taking features people already had access to and locking them away all while spying on you.
No way, plex is completely enshitified.
Nothing wrong with that on ad block. Intro them to pipepipe if they watch it mostly on mobile.
The backup is a self hosted splunk.
Dozzle, log forge is a new one I’ve seen but not tried.
I have two large (8 Bay) Synology NAS. They backup certain data between each other and replicate internally and push to Back blaze. $6/mo.
They can’t rugpull them, they probably also want to own the transaction fees.
I dunno how fast they chop your access because the centre adds/removes you, hopefully you remember your credentials.
Just a warning, I found a bug while clicking an element in the docker container but the script runs in venv just fine.
I’m working to move what I have to Valkey, no more rugpull games tyvm.
That sounds like it needs its own community. “Hostile Architecture” I love it.
Edit: I googled the term and think it could be a sub. https://www.re-thinkingthefuture.com/designing-for-typologies/hostile-architecture-anti-homeless-architecture/
Bees need pollen. We need bees and you can self host them.
Mint or Ubuntu is like Windows but better.
It’s for developers to not switch dev machines from Windows. The average user would be far better served with Mint or Ubuntu versions of Linux for Windows like experience.
I get why they do this sort of thing but it didn’t stop us re-adding video station and h265 support back into our Synos.
Someone already made a script to overwrite the existing compatible drive checker so someone will write a new script to fix the new one.
This way my thought, I highly doubt they are getting none, just not looking at the proxy logs.
I’d rather not have them probing my website at all. I’m not Facebook, my data is not unlimited and free.
I’m trying to block the most likely attack vectors which is definitely VPS providers at this point in time. I just figure if I am blocking subnets plus additionals I identify it will force them out of these vectors to attack in ways I might be able to report better abuse.
Here check out my analysis.
How easy is it to configure?
My goal is to download some lists from github and generate one big ban list to feed into the WAF but the community lists of Crowdsec might negate the need.
Damn, I’ve got my wife at least using it on our Shield for the TV when putting stuff on for the kids.