i_am_not_a_robot
@i_am_not_a_robot@discuss.tchncs.de
- Comment on [deleted] 2 weeks ago:
Is this a lost karma bot?
- Comment on [deleted] 2 weeks ago:
A less intrusive solution would be to just put your sensitive data in LUKS and configure services that use that data to depend on the partition being mounted. That doesn’t require modifying the normal system startup process. You’re less likely to mess up your startup process at the expense of needing to be more mindful about where you’re putting your files.
- Comment on [deleted] 2 weeks ago:
Tang and Clevis have already been mentioned as a way for one server to boot using another server.
You can also create an environment where the server boots into a phase 1 where it obtains network connectivity and then waits for you to provide it the key to continue booting. The first phase is unencrypted, so don’t put sensitive data in there.
- Comment on Someone Experimented With a 1997 Processor and Showed That Only 128 MB of Ram Were Needed to Run a Modern AI 2 weeks ago:
In the 2020s we have new active USB to PS2 dongles like HIDman.
- Comment on Version Dashboard 2 weeks ago:
It is bad practice because of point 2 and if you have multiple replicas you can probably get different versions running simultaneously (never tried it). Get Rennovate. It creates PRs to increment the version number and it tries to give you the release notes right in the PR.
- Comment on What is Docker? 3 weeks ago:
Borg / k8s / Docker are not the same thing. Borg is the predecessor of k8s, a serious tool for running production software. Docker is the predecessor of Podman. They all use containers, but Borg / k8s manage complete software deployments (usually featuring processes running in containers) while Docker / Podman only run containers. Docker / Podman are better for development or small temporary deployments. Docker is a company that has moved features from their free software into paid software. Podman is run by RedHat.
There are a lot of publicly available container images out there, and most of them are poorly constructed, obsolete, unreprodicible, unverifiable, vulnerable software, uploaded by some random stranger who at one point wanted to host something.
- Comment on Setting up a private network in shared apartment 4 weeks ago:
VLANs are lower than IP so you don’t need a router to have a VLAN, but you will need a router to get packets between the networks. I don’t think a WiFi repeater works. You likely need separate WiFi client and AP devices so you can put your WiFi on a different channel. Otherwise you’re probably halving your WiFi performance when connecting to the other network over the same airwaves.
Unless you can convince the other network to route your IP addresses, this setup will give you another layer of NAT and may cause problems with online games.
- Comment on How do I fit a network card with a physical x4 slot into an x1 slot? 1 month ago:
The ones on Amazon are intended to run GPUs for crypto farms, but they’re all brands you’ve never heard of with dubious claims and they’ve all got at least one review where either the device was defective or something was installed incorrectly and it caused damages.
- Comment on How do I fit a network card with a physical x4 slot into an x1 slot? 1 month ago:
I did this but buying these on Amazon is scary. Try to find one that won’t burn your house down.
- Comment on Plebbit is a peer-to-peer Reddit alternative that allows you to self host and own your own community 4 months ago:
This fixes the issue of hosting any nefarious content.
How does removing images change anything? Any file can be transmitted by text, as we used to do with e-mail, and you don’t need to use images to make illegal or just intentionally offensive content.