![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
But use Airsonic instead, it’s a fork that’s free in both the beer and speech sense.
There’s also Navidrome, which is a unique backend, but works with existing Subsonic clients. Check out both, see which one you like better.
But use Airsonic instead, it’s a fork that’s free in both the beer and speech sense.
There’s also Navidrome, which is a unique backend, but works with existing Subsonic clients. Check out both, see which one you like better.
Being a terminal purist is wonderful for those of us who live our lives deep in the caverns of Linux, but in actual production use you very often find situations where less technical users have to interact with the systems that we build.
For my work, I need a way for low level tech support and technicians to go in and restart a container from time to time, and these people curl up in a ball and scream if you show them a command prompt. Having a UI removes a lot of friction.
To be fair, Dockge is very, very new. I imagine features like that will turn up soon enough.
Technically true, but if you actually try to interact with those compose files directly then shit gets really fucky.
We can’t get Congress to agree to anything right now, the ruling elite and external hostile governments have crippled them.
For the record, the house is currently controlled by the Republicans. Saying “gridlock in Congress” when its run by the party that most benefits from being obstructionist seems a bit disengenuous. It’s not “gridlock”, it’s Republicans doing what they went there to do.
Sorry but when you said “some people”, you didn’t explicitly specify the gender of the people you were referring to, so now I am confused and terrified. In future please use “some male people” or “some female people” to avoid inflicting your gender ideology on me.
Fair enough. Well, you definitely should be moving those over to Docker then, it’ll be much better for efficient use of resources.
Curious as to why you don’t just run those as separate games on the same server, since Foundry has the functionality for that?
Either way, running Foundry in docker is a solid idea. I’ll grab a link to the image I use when I get the chance.
Also, why two Foundry servers?
Polling in Ukraine consistently puts approval of Zelensky’s handling of the war at around 90%.
Please actually try listening to the people you’re speaking on behalf of before you speak.
In the analogy, I have a whole lot of their money. You never watch Heat? Like that, but I didn’t fuck it up thanks to my many years of watching heist movies and playing Payday 2.
Oh man, love this idea. I’m gonna try it on my bank. “Here’s the deal, I keep all the money that I’ve already stolen, and you have to agree not to call the cops or hire any additional security.” Brilliant.
Not sure what the bank is supposed to get out of it though.
Yeah, try to avoid using USB hard drives.
A refurbished business PC is an excellent choice (or, better yet, make friends with someone who works in an IT department and grab a few machines when they’re being thrown out; you’d be amazed how often companies dump perfectly good hardware). Don’t worry about the windows license, you’re not actually paying for it by the time you get to refurb prices.
You should easily be able to pick up something decent for under $200 (hopefully that fits your budget). If you go with a small form factor (not ultra small) you can probably get an SSD and two 3.5" drives in there (watch out for the small form factor Lenovos though, they only have one 3.5" slot). Alternatively, look for a larger desktop tower style that could have 3 or 4 drive bays if you want to do something like a RAID5.
Don’t sweat too much about buying older hardware. What’s old and busted for Windows is lightning fast when we’re talking about self-hosting a file server or a Pihole.
I love 1Password, they’re great (I personally use Bitwarden for my passwords, but would happily recommend either of them). But by putting both your authenticator codes and your passwords in the same place, you now have a single point of failure. What happens if someone finds an exploit in 1Password that gives them access to your account? The whole point of 2FA is to not have a single point of failure.
That’s still a single point of failure. What happens if someone finds an exploit that bypasses the login process entirely?
That seems like it defeats the “2” part of 2FA. If your password manager is compromised the attackers now how complete access.
Important note; some WD Reds are still SMR. You have to check which specific type.
Awsome resource. You win the Internet today.
For the record, so are a lot of 3.5s. Always read up on your drives before buying.
Same