It’s an SQLite database. Corruption is very unlikely. So, that’s not something I am worried about.
It’s an SQLite database. Corruption is very unlikely. So, that’s not something I am worried about.
I’ve recently introduced CrowdSec and crowdsec-bouncer-traefik-plugin into my setup and it’s really great to see it block all those spam bots and brute force attempts.
Some food for thought:
When I was looking to get my photos under control, in the end I decided to go all-in with Apple Photos. As I’m also using a Mac, the convenience can’t be beaten. Also, I can easily pull up any photo using Apple’s smart filters and can easily select photos from within apps without having to “share” them to the photos library first.
But this was only decided after I found out that Apple Photos keeps all photos in separate files in original quality and all metadata in a local SQLite database. Using the osxphotos tool, you can query this database and easily pull out any photo incl. metadata - even when running on other OSes, no need for Apple Photos. This also makes it easy to move everything to another system, if needed.
I’ve set my Mac to always keep original copies on disk and run a backup to my NAS every night. (Using CCC at the moment, but looking to switch to restic.) This way, all my photos are always off-site in iCloud, on my Mac and on my NAS.
You’d just need a tool to upload your Android photos to iCloud. From a quick search it seems Sync for iCloud might do the trick - albeit manually … if I read the reviews correctly.
I’d suggest /opt/docker/_compose/ for all the compose files. Or, if you keep all the config files for your containers on your NAS, maybe create a share there and put all yml files in it, then mount it on the host. This way everything is on your NAS and nothing is lost if the host freaks out.
And I’d add the NFS mounts to the compose files as well. When specifying volumes, you can use anything the host OS has a mount.xxx command for. Docker will take care of mounting everything.
It’s time you all got over how the Magic Mouse charges
Only a couple of minutes of charging should give you eight-to-nine hours of battery life.
If you have Netflix, you can play it for free on mobile.
But when you report obvious fake accounts that merely exist for 5 days, follow 5000 people already and only have 3 followers themselves but a nice spammy link in their profile, they allegedly don’t violate any terms of services…
Is that an AI photo at the top of the article? Or which Palm Pilot model is that?
I’m using UberSpace for 5€/month for a few small web projects and for emails. Unlimited mailboxes, unlimited aliases. However, you have to configure it using console commands via SSH. But it’s all explained in their documentation.
Yep, we have desks at work with a built in AC socket and USB-A and USB-C for charging phones. Guess what? The USB-C only delivers 5V and thus is unsuitable to power Apple’s travel charger for MagSafe and Apple Watch.
Same with our £600 Dyson lamps. They all come with an USB-C outlet. But, again, it’s only providing 5V, no PD.
Apart from that, I’m also pretty happy with USB-C everything. Even though I still think Lightning is the better design in terms of robustness of the socket. No thin plastic lip that can break apart.
Possibly a bit overkill, but I’m running Zabbix in 3 containers (Core, WebUI, database). Using its agent installed on all my machines, I can monitor basically anything. Of course, you can set limits, alerts, draw graphs, etc.
The fear of naked (intact) female bodies, i.e. censoring of even the slightest nudity, when at the same time, it’s totally fine to have minors play computer games where they can dissect other humans in great bloody detail.
Oh, and chocolate that tastes like somebody barfed into it during manufacturing.
The brown paper-bag thing with alcohol in public. I mean, everybody and their dog knows what’s in there, right?
And the fact that people ask if you need help if you decide to NOT take the car but instead walk the 5 minutes to somewhere.
Also: Microwave. Apparently, lots of people heat their water in the microwave. (See pinned comment here.)
Thing is, DMCA doesn’t apply all over the world. There are countries where whatever electronic device you buy is actually yours and you’re allowed to do whatever you want - including messing with the firmware. Also, I’d argue, the DMCA doesn’t apply if you dump the firmware/keys for yourself only without distributing it.
That being said, it’s unfortunate that these people are mostly in the US where the party with more money decides when a lawsuit is over and not some sane judge that just throws this case back at Nintendo. But after the stuff with Disney+ and the recent one with Uber, I’m not surprised at all anymore.
But nothing is circumvented. People have to provide their own keys, right? It’s like suing GnuPG b/c it can decrypt stuff…
I’ve only subscribed to the “Free proxies” blocklist. But these are only additional blocklists. The main attraction of CrowdSec is their “CAPI” (Central API) which has all the current malicious actors detected in the network of CrowdSec instances and is used automatically.