Yes, it’s perfectly safe. Keep it patched, use strong ciphers, use key authentication, and set up an IDS like Fail2Ban or CrowdSec.
- 0 Posts
- 4 Comments
Joined 3 years ago
Cake day: October 1st, 2023
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
jerwong@alien.topBtoSelf-Hosted Main@selfhosted.forum•What scenarios does a home server need a GPU?English
1·2 years agoI use Jellyfin which is similar to Plex. I have it on a Raspberry Pi 4 8 GB. It’s perfectly fine if I’m sending H264 but most modern browsers do not support H265 so it forces the server to transcode. That will consume almost all processing power if it’s CPU-only and is a very slow process.
jerwong@alien.topBtoSelf-Hosted Main@selfhosted.forum•What is the best duplicate file finder, that preserves my source of truth?English
1·2 years agoI think you need a \ in front of the ;
i.e.: find . -type f -exec md5sum {} \; >> /tmp/foo
I do work for multiple organizations and got tired of having to disconnect/reconnect VPN tunnels each time.
Solution: Raspberry Pi. It’s got a single Ethernet port on it which makes it perfect. I used Openconnect since it was compatible with Cisco and PulseSecure (at the time). When you establish a tunnel, the routes come in as “kernel routes” assuming you have a split tunnel. I configured IPTables to NAT masquerade out each interface and I set up Quagga, a routing daemon to talk to my main gateway and redistributed my kernel routes into OSPF. That way, any of my devices can now access any networks they need. I did also have to configure my own DNS server since I needed to resolve the different private networks.