@petaqui I tried pretty much all the self-hosting for newbies solutions out there (except for Runtipi - haven't had time yet) and YunoHost really shines in terms of security, disabling root access during the installation and automatically installing Fail2Ban. I have nothing but amazing things to say about it.
Now for new things, I am pacing myself because I don't want too many things on a VPS... I need to simplify my digital life 😅 I have set up Matomo on a second VPS and I may try Monica
The color of carrots is actually fascinating bit of history. I suspect human selection is the cause of the colour and they are normally very dark purple or white.
David! Where are Carrot's brother and sisters? Also carrots, different colours. 😸
@davidrevoy Grok reminds me of this one Swedish childrens movie I saw as a kid where for complicated childrens story reason a poor family decides to pool all their money together and send the dad of the family to the circus, and it's very much implied that he took the money and fucked off to the pub, cus when he gets back he tells them all wonderous tales of all the fantastic things he saw at the circus and the whole ruse comes to a crashing halt when breathlessly describe the air acrobats as actually flying, like levitating off the ground, cus he was very clearly just bullshitting.
@_elena thanks! I use @Internxt and Mega for my data, but, I was thinking about other apps, like Journiv (it looks dope!), or AdventureLog. Have you thought about those things? Have you read about security and privacy using #Yunohost and what's your idea? Thank you so much!
🐧 Linus Torvalds contro il supporto Big Endian per RISC-V nel kernel Linux:“È una follia. Non complichiamo ulteriormente un’architettura già frammentata.”Torvalds boccia l’idea di introdurre BE per motivi accademici o per compensare mancanze hardware. Il kernel Linux non supporterà RISC-V BE, almeno per ora.🔗 https://www.phoronix.com/news/Torvalds-No-RISC-V-BE@linux #Linux #RISC_V #Torvalds #BigEndian #Kernel #OpenSource
Hey #Proxmox community! I would like to hear your thoughts on how you usually update your Proxmox nodes and clusters. How do you handle minor Proxmox and #Debian package upgrades with #APT?What would you think about a new API endpoint that lets you run unattended upgrades with a simple call like:/nodes/{node_name}/apt/upgradeAt the moment you need to use the node’s HTML5 console to perform upgrades. Other methods exist such as running unattended Debian upgrade scripts, using patch management tools like #Spacewalk or #QualvoSec, or automating the process with #Ansible over SSH. My idea is to have an API based solution that relies on Proxmox authentication and authorization. This would also allow third party tools such as #ProxLB to provide automated patch management and even handle guest rebalancing in a way that is similar to DRS without requiring direct SSH access.I have already been running this approach on several internal clusters since the release of PVE 8 without issues. Now I am interested to hear if you would use unattended upgrades in general or if you are already running them today.#Linux #OpenSource #PatchManagement #Security #DevOps #Automation #Ansible #PVE #PVE8 #PVE9