![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
Even if they do get the VBR encoding perfect, you’ll still get people on bad connections that will only have a buffer underrun when a dude shows up in a sparkly suit.
Even if they do get the VBR encoding perfect, you’ll still get people on bad connections that will only have a buffer underrun when a dude shows up in a sparkly suit.
That’s like, a million people’s wages. Absurd.
The longest outage I’ve had in a decade is when my primary SSD died a 2 months ago and I had to reinstall using config backups. It was down for around a day.
I’ve thrown a UPS on it and flown overseas for a week or two. It’s basically just email for me and the kids.
I’ve had longer outages on hosted services, TBH.
I host my own mail. When it’s down, the mail just gets delivered after I get online again. Almost all mail servers are configured to retry over a period of several days before giving up.
Once my health insurer sent me mail by post to tell me that my mail server was down. That was kinda funny.
TightVNC. Use TightVNC.
My company has build scripts that practically pull half an OS from an update mirror every time someone commits a code change.
It’s maddening how inefficient CI/CD setups are.
I have two Surface Pros that are BIOS locked so I can’t install Linux. They also don’t support Win11.
I’m not sure what I can do with them.
This new thunderbolt feature hilariously does what I once did with RS-232.
I already do.
There is one. It’s called “AirGuard” and it has been around for a while now. I’m using it on GrapheneOS.
GSF is where most of Google’s invasive user tracking happens. It’s proprietary, closed source and is not part of AOSP (Android Open Source Project). It is, by definition, spyware.
Google did not put it in Android. They put it in Google Services Framework. Ironically, GSF is the first part you rip out to protect your privacy.
I did have LUKS and a USB flash drive with a key to be inserted on boot. It was definitely difficult and caused performance issues. It was particularly difficult to add/remove drives from the array. These days I only encrypt my off-site backups that sit at the office where my coworkers potentially have physical access.
There have been recent advancements in TPM so disk encryption is easier to maintain and doesn’t affect performance. I’ll need to investigate this one day. My server/NAS is a 4th-gen i5, so it may not support the functions I would need. Full disk encryption will land in Ubuntu soon. I’m hanging out for that.
I personally would flick through the OpenWRT supported devices and pick the best supported device with 802.11ax.
Everything exposed except NFS, CUPS and Samba. They absolutely cannot be exposed.
Like, even my DNS server is public because I use DoT for AdBlock on my phone.
Nextcloud, IMAP, SMTP, Plex, SSH, NTP, WordPress, ZoneMinder are all public facing (and mostly passworded).
A fun note: All of it is dual-stacked except SSH. Fail2Ban comparatively picks up almost zero activity on IPv6.
Testdisk and photorec? It’s saved me heaps of times.
I bought 7 of those top 10 titles. One was from the Tokyo Nintendo store.
One day I will have time to play them.
I was thinking “she should be able to” … “ask one of my friends to figure it out”.
As long as she knows what the passwords are, a tach savvy friend will figure out the rest.
My backup solution is hard to setup and maintain, but shouldn’t be terrible for someone else to recover from.
All the phones sync to nextcloud when on wifi and charging. My server has alternating encrypted backups, and one is always off-site.
If I go, my wife can plug it in and punch in the password. Hopefully that’s enough.
Printers are always horrible to administer. Brother are typically the best on Linux. I wrote a massive instructional blog a few weeks ago because it took so much work to get my HL-3150CDN working over USB. I had to repackage a Frankenstein’s monster of a driver because my printer never got 64-bit CUPS filters.