brownmustardminion

joined 2 years ago
[–] brownmustardminion@lemmy.ml 5 points 3 months ago

Yeah since the unit is easily accessible I imagine they could just read the MAC address off the sticker and spoof it.

[–] brownmustardminion@lemmy.ml 0 points 4 months ago (4 children)

Damn I wish I would've known sooner. Isn't there a concern of not matching the same drive similar to how you can't mix and match RAM sticks?

[–] brownmustardminion@lemmy.ml 3 points 4 months ago

+1. Resolve is leaps and bounds ahead of Premiere and even After Effects when you consider Resolve has Fusion built in. I work on high level projects and often run into huge issues trying to work with Premiere projects. Most editors still use it simply because it was the first NLE they picked up. It lacks proper color management and its ability to export out to other software whether for post audio, color, or VFX is abysmal. I switched to Resolve about 5 years ago and while it isn’t without its faults, I’ll take it over Adobe bullshit any day. Sometimes I have to open editors premiere files to troubleshoot and I want to blow my brains out. Easily can wipe out an entire day just troubleshooting premiere projects. It’s funny because when I first got into the industry I was using Premiere and they were trying to push me to use Avid. I felt the same way about Avid as I currently feel about premiere.

[–] brownmustardminion@lemmy.ml 10 points 4 months ago (1 children)

For my own understanding, what potential dangers are there using a Yubikey as opposed to an open source key?

[–] brownmustardminion@lemmy.ml 2 points 4 months ago

I guess what I'm getting at is now instead of them tracing your activity to one browser or device, they can more easily group multiple devices since they're all using the same VPN IP.

[–] brownmustardminion@lemmy.ml 2 points 4 months ago (2 children)

I’ve been toying with this idea but with a mesh network, in my case nebula, after experiencing a similar frustration with limitations on most client devices when trying to connect to multiple VPNs.

One question I’ve been trying to answer is if routing all of these devices to a single vpn endpoint has any negative effects on privacy. Would cycling the IP randomly help to prevent trackers from putting together a profile of activity?

[–] brownmustardminion@lemmy.ml 1 points 4 months ago

I use Joplin and it works great for this exact thing. Anytime I discover a new command that fixes something I’ll throw it into my Joplin notebook. “New Server Cheatsheet” goes to list in order common operations and commands for setting up SSH, UfW, making a non-root user, configuring wireguard, etc. I have hundreds of notes by now and they’re easily found via search bar.

[–] brownmustardminion@lemmy.ml 7 points 4 months ago (2 children)

I always wonder what legal risks hosting something like this comes with. If you host a public server and uploads are client side encrypted, seems like it would be a magnet for illegal file transfer and CSAM, no?

[–] brownmustardminion@lemmy.ml 1 points 4 months ago (3 children)

Yeah I think we’re talking about the same thing. Got any guidance on how you set that up?

[–] brownmustardminion@lemmy.ml 1 points 4 months ago* (last edited 4 months ago)

I would say pretty secure. Of course, I would ensure all of the proper firewall, app pins, 2FA are in place in case my phone was ever compromised.

I'm already accessing all of the services now over the web with authentication. This new configuration would shift thos services from being public to only devices on my private mesh network with the proper certificates.

[–] brownmustardminion@lemmy.ml 1 points 4 months ago

Yep. The models I have don’t have motion detection.

[–] brownmustardminion@lemmy.ml 2 points 4 months ago (2 children)

You can probably find a visual walkthrough of the GUI by searching youtube.

There's a login page. After you authenticate, there's a live view page, a review/recordings page if you are recording to SD card in camera, and a few settings pages.

I'd say you could absolutely access the camera standalone, but at least the cameras I have don't do any detection or notifications. That's where the NVR comes in. I know reolink has cameras that do all of the above including AI detection.

 

I had sound working fine with one problem: the center and rear right channel were swapped.

I generated an /etc/asound.conf to work on the channel swap and reloaded and now I can see the audio in pulse audio monitor, but nothing from the speakers. I deleted asound.conf and rebooted and it's now back to the previous settings but still having an issue with no sound from the speakers.

Any help is appreciated. I'm still also trying to figure out how to rearrange the surround channels so they are assigned to the correct speakers. Changing them from the hardware isn't an option unfortunately.

 

Hey folks. I’m fairly new to web dev but was wondering if you all could give me some quick advice.

I’m looking to make and selfhost some fairly simple but visually interesting portfolio static websites. I’ll be posting some creative projects I’ve worked on as well as contact info and such. I’m trying to keep a minimalist design but visually interesting and artistic.

My current research led me towards ReactJS and Tailwind CSS to accomplish this task.

Is this a good framework or do you recommend an alternative?

 

So I selfhost a number of servers in various locations and utilize a DigitalOcean VPS as a hub/gateway to transmit data between these nodes.

I have a consistent issue when running large backups or transfers in which DigitalOcean flags my server for a DDOS attack and sends traffic to a black hole for 3-4 hours.

Customer support has been the absolute worst and does fuck all to help remedy the situation in any way. These events have been consistent over the past 8 months.

Does anybody have recommendations for a solid VPS provider?

Price isn’t too much of a factor. I was running a $8/month server but I don’t mind something more expensive if the company has a good reputation for reliability and privacy.

As mentioned, I primarily use a VPS as a gateway/hub for file transfer services. I’m also hoping to spin up another VPS for static websites.

 

Some background:

  • have a poweredge r320 on battery backup (basic APC unit)
  • have unifi dream machine
  • poweredge powers down automatically if power goes out

What's the safest way to allow myself to power on the server in the event it shuts down while I'm not home?

I figure since I have remote access to my UDM, perhaps there's a command I can execute from there to power it on?

My fear is using a method that provides more than just poweron commands remotely. I want to keep the server attack vectors down.

 

Hey guys,

I'm planning on putting together an esp32 with esphome to receive the inputs of various reed sensors I have throughout my condo on doors and windows.

I've been doing lots of research and could use some guidance.

  1. How many GPIO pins are actually usable as reed sensor inputs on your typical esp32 board?
  2. I'm aware of expansion boards that connect via I2C to the esp32 and this allows for a max of around 128 sensor inputs. Would this route work with Esphome without too much headache?

I appreciate any input you might have (as long as I have a GPIO to spare).

 

I have a handful of NodeJS websites that are almost ready to be deployed publicly. All of them are very simple sites which I don't expect to get much traffic.

I'm thinking I could make a docker container for each website using the NodeJS docker image, then route them using traefik or nginx. This way there's a good degree of separation between the sites and everything will be organized and easy to backup/transfer around if needed.

Is it a decent plan? Got any better ideas or tips?

1
submitted 1 year ago* (last edited 1 year ago) by brownmustardminion@lemmy.ml to c/selfhost@lemmy.ml
 

I self host all of my services but utilize a VPS as a gateway for access. Primarily to allow access to a media server and file storage for friends and family.

Recently I’ve been shut down by my VPS provider on multiple occasions because they claim my server was DDoS’d at 2gigabits/s. I don’t see any evidence of this in my logs.

Regardless, I set up Traefik proxy to geoblock any IPs outside of my country. Literally a few mins after doing so and confirming via VPN that it was working I got shut down and received an email that my network was severed temporarily due to a DDoS Blackhole event.

The questionable nature of their detection system aside, it’s got me wondering…does ip blocking actually help mitigate DDoS attacks?

The server still needs to process the incoming connection before it filters it, so I’m assuming the attack is still accomplishing it’s intent which is to overload the server. Can somebody more knowledgeable provide some insight?

 

I know cloudlfare and other cloud providers often provide geoblocking features if you host with them.

Does anybody know of any similar foss packages for us self-hosters?

I know I don't have any need for somebody outside of my country to access my server, so geoblocking IPs would be a great security feature.

 

Is it possible/practical to host multiple websites from the same VPS server?

I have a number of domains (for example): bilbobaggins.com, rx4free.com, mypersonalblog.com

I don’t get much traffic and I’m not interested in paying for separate servers for each domain. But I still want https certificates to work properly.

Now I’m familiar with setting up wildcard subdomains with traefik and letsencrypt. But can I do the same or similar with completely different domains such as listed above?

 

Consider a wireguard network of many clients which all interact with each other through a central hub server on a cloud VPS. One of the clients is a desktop used for SSHing into the other various clients--again, through the central hub. If the "terminal" client connects to another client through the wireguard hub using SSH public/private key authentication, what if any information within that SSH tunnel gets exposed or leaked to the "hub" server?

My threat model is if the VPS was to ever get compromised. I previously SSH'd into the hub VPS server and from there I would SSH into any of the other clients with a password. Horrible security, I know.

My new setup is as mentioned above. Only the single desktop client has key authentication to SSH into the various clients. But I want to be sure none of that data gets exposed to the VPS hub just in case.

 

Can anybody lead me down the right path on this...?

I run a jellyfin server and I'd like to utilize a raspberry pi as the equivalent of a roku box / fire stick but for my jellyfin server.

I'm setting this up for a friend as a gift. He isn't very tech savvy so I wanted to make it user-friendly. I'm looking into buying a usb remote control as well.

I love the jellyin UI so it would be cool to stick with that.

What are my options? It would be ideal if the pi boots up right into the browser/player app and can be accessed/controlled via the remote like roku or similar.

EDIT: I wanted to specify that I already have a media server. This pi would serve as a client for viewing only. It will stream from the main server.

 

My use case is I’m transferring large already encrypted files between two servers connected via wireguard.

Is there any benefit to SFTP over FTP in this case?

view more: ‹ prev next ›