

For me his skyrim video back in the day had me crying. But I’m sure if I watched it now it wouldn’t be as magical.
For me his skyrim video back in the day had me crying. But I’m sure if I watched it now it wouldn’t be as magical.
Yes, it will count towards your bandwidth.
I typically don’t get anywhere close to this though.
The few times I did were due to initiating large backups between devices, upwards of 2TB. But I’ve since moved my backup system to a mesh network and haven’t hit bandwidth overages since.
I recommend it every time this question pops up and I’m surprised more people aren’t privy to it:
Rent a VPS as your public gateway. Connect the VPS to your server with a simple wireguard tunnel.
The only thing on the VPS should be a reverse proxy with SSL/TLS pass through.
Send the traffic at the VPS reverse proxy to a reverse proxy on the main server. Configure this proxy to use letsencrypt certs.
The benefit and importance of the SSL pass through reverse proxy, is that it allows all data in transit to remain encrypted until it reaches your physical server. Traditionally, most would suggest the one and only reverse proxy exist on the VPS but all traffic would then be decrypted on the VPS. This could obviously compromise your traffic if the VPS provider snoops or your VPS is compromised.
Cloudflare tunnels decrypt on their hardware as well, which is why I always recommend avoiding their services.
Backblaze deleted my project drive for a multimillion dollar project I was archiving through their desktop sync. It’s largely my fault for not noticing the drive had failed when considering their upfront policy about them deleting your backups after a month of inactivity. Luckily it didn’t have too big of an impact because the most important files were backed up elsewhere. I do wish their desktop app had better warnings about imminent deletions though.
This is encouraging. Thank you.
I use nginx for static websites and TLS passthrough servers.
I use traefik as a reverse proxy for sites with many services and SSO.
Nginx is definitely easier to configure for simple things. But I prefer traefik for more complex setups.
I’m not disagreeing that a Nazi salute is hate speech. Im disagreeing that it’s a sensible course of action to give the government the power to put a human being in a cage for doing it.
Using racial slurs is also hate speech, should a person be imprisoned for using the n-word?
Where it becomes punishable via government intervention to me should be a direct threat of violence on a group of people or call to action to do so.
I’m trying to comprehend what the intended outcome of this type of punishment is anyway. Out of sight, out of mind I guess?
Yes, stripping somebody of their freedom for using a hand gesture is dystopian. Maybe consider that you thinking otherwise makes you a radical on the other side of the spectrum.
There’s a reason fascism is becoming more popular across the globe and it’s accelerated by these overreactions. It feeds into right wing narratives and pushes people on the fence into becoming radical right more than just letting these idiots babble their bullshit and be seen for the fools they are.
I didn’t know that. Thanks for the info.
I’m sorry but why is this so heavily upvoted?
Anit-semitism and any other form of hate speech is abhorrent, but imprisonment for a gesture is absolutely dystopian.
I had similar concerns in the past. I decided to move all of my VPS hosted services to a physical server that I control. I then use a VPS as a portal, set to simply forward traffic without unencrypting the HTTPS. Look up SSL pass through.
Compressed air can spin the fans fast enough to cause damage unfortunately.
Did you use compressed air to clean out the fans?
It’s possible to fry circuitry if you artificially rotate the fans too fast, as this generates an electric field more powerful than the fans and their attached components are rated for.
Probably rare to cause damage with modern computers but an old PC might be more susceptible to this type of damage.
Am I understanding correctly that if users had 2FA, the vulnerability would be prevented from gaining access?
picard_facepalm.png. can you tell I just Tab through terminal?
Fixed it. Thanks
I guess what I’m getting at is now instead of them tracing your activity to one browser or device, they can more easily group multiple devices since they’re all using the same VPN IP.
I’ve been toying with this idea but with a mesh network, in my case nebula, after experiencing a similar frustration with limitations on most client devices when trying to connect to multiple VPNs.
One question I’ve been trying to answer is if routing all of these devices to a single vpn endpoint has any negative effects on privacy. Would cycling the IP randomly help to prevent trackers from putting together a profile of activity?
Try turning off the device, remove the battery, then take a safety pin and compressed air and scrape out any dust I’m the usb-c port then spray with air. I had a issue with my phone charging but not getting data. I spent a solid 15mins doing the above and it fixed it.
A good test is to see how firmly the usb-c sticks in the port. If it comes out pretty easy or feels seated sloppily then it probably just needs a good cleaning.