MigratingtoLemmy

joined 1 year ago
MODERATOR OF
[–] MigratingtoLemmy 1 points 3 days ago

Please provide more of your criticisms for Kicksecure

[–] MigratingtoLemmy 1 points 3 days ago

People are fighting over Wayland vs X11? I thought X11 wasn't dropped specifically for compatibility?

[–] MigratingtoLemmy 2 points 3 days ago (2 children)

No I genuinely want to know

[–] MigratingtoLemmy 1 points 3 days ago

That is most unfortunate. Hikari no Akari has always been a favourite.

I'd like for piracy sites to move to the darknet from now to make like more difficult for pursuers

[–] MigratingtoLemmy 3 points 3 days ago (4 children)

Please, more details

[–] MigratingtoLemmy 3 points 3 days ago (1 children)
[–] MigratingtoLemmy 18 points 4 days ago (1 children)

Sit beside one and talk about the BSDs being the superior race LMAO

[–] MigratingtoLemmy 1 points 6 days ago

Time to run your own instance

[–] MigratingtoLemmy 2 points 1 week ago (1 children)

AWS Windows box

[–] MigratingtoLemmy 2 points 1 week ago

Yeah I probably should but the WiFi at work doesn't let wireguard through (I have a wireguard server running on a VPS)

[–] MigratingtoLemmy 12 points 1 week ago (2 children)

To everyone interested: Mullvad and IVPN accept XMR as payments and do not store logs.

Keep your bits going the way you want them lads

 

I don't have spare peripherals like a monitor and a keyboard. How do you suggest I do a bare-metal install of Debian on a computer (meant to be a server)?

 

Hi everyone,

This would seem to be a basic question (I've been on this for a few hours and can't seem to get it working).

This is my file for my pod:

$ cat backup.pod

[Unit]
Description=backup pod

[Pod]
Network=slirp4netns:port_handler=slirp4netns
PodmanArgs=--userns=auto:size=10000
PodName=backup

And this is the file for my container which is supposed to be part of the pod:

$ cat backup.container

[Unit]
Description=backup container

[Container]
Image=docker.io/debian/debian:latest
ContainerName=backup-container
Entrypoint=/bin/bash
Exec=/bin/bash -c "apt-get update -y && apt-get upgrade -y && apt-get install rclone vim -y && exec bash"
Pod=backup
GlobalArgs=-d -t

[Service]
Restart=always

[Install]
# Start by default on boot
WantedBy=multi-user.target default.target
  1. Podman's systemd-generator doesn't seem to create any service file for backup.pod in /run/user/$(id -u user). I do see a service file for backup.container, backup.service.
  2. Regardless, systemctl start backup.service errors out anyway.

I'm unable to understand how to use quadlet from the documentation. AFAIK I did everything they asked (https://docs.podman.io/en/latest/markdown/podman-systemd.unit.5.html).

The primary reason why I tried this was because I couldn't figure out how to create a pod using compose.yaml either. If someone has answers to these questions, they would be much appreciated!

Thanks!

 

publication croisée depuis : https://lemmy.world/post/16156662

To be completely open, this is not a question about XCP-ng vs Proxmox. I'm open to doing everything in the cli, comparing two platforms is not my intention here.

I'm very interested in the security benefits one has over the other though. AFAIK Xen has a dedicated for security? I'd like to think that both are reasonably secure by default, but I do not get many hits for "KVM hardening", for example, only OS-level hardening advice.

Do both protect equally against attacks that try to escape the VM? Is there anything in terms of security that one has and the other doesn't?

I know this is not the usual kind of question that is asked on this sub, any help is greatly appreciated!

 

To be completely open, this is not a question about XCP-ng vs Proxmox. I'm open to doing everything in the cli, comparing two platforms is not my intention here.

I'm very interested in the security benefits one has over the other though. AFAIK Xen has a dedicated for security? I'd like to think that both are reasonably secure by default, but I do not get many hits for "KVM hardening", for example, only OS-level hardening advice.

Do both protect equally against attacks that try to escape the VM? Is there anything in terms of security that one has and the other doesn't?

I know this is not the usual kind of question that is asked on this sub, any help is greatly appreciated!

 

cross-posted from: https://lemmy.world/post/15706364

Transparent compression layer on Linux?

My use-case: streaming video to a Linux mount and want compression of said video files on the fly.

Rclone has an experimental remote for compression but this stuff is important to me so that's no good. I know rsync can do it but will it work for video files, and how I get rsync to warch the virtual mount-point and automatically compress and move over each individual file to rclone for upload to the Cloud? This is mostly to save on upload bandwidth and storage costs.

Thanks!

14
submitted 2 months ago* (last edited 2 months ago) by MigratingtoLemmy to c/selfhosted
 

My use-case: streaming video to a Linux virtual mount and want compression of said video files on the fly.

Rclone has an experimental remote for compression but this stuff is important to me so that's no good. I know rsync can do it but will it work for video files, and how I get rsync to warch the virtual mount-point and automatically compress and move over each individual file to rclone for upload to the Cloud? This is mostly to save on upload bandwidth and storage costs.

Thanks!

Edit: I'm stupid for not mentioning this, but the problem I'm facing is that I don't have much local storage, which is why I wanted a transparent compression layer and directly push everything to the Cloud. This might not be worth it though since video files are already compressed. I will take a look at handbrake though, thanks!

 

Hi everyone,

As always, every time I look at the AWS Glacier egress fee calculator I get fairly irked at how much they charge. Was wondering if anyone knew of any alternatives for cold storage in the cloud without such egregious charges. I will likely not access it ever because I have another offset backup, but just in case I do, I wouldn't want to fork over thousands, really.

I don't know how reliable Scaleway's service is, and Cloudflare's R2 doesn't have a Archive offering. I would be interested in the Azure if anyone can convince me that I won't go bankrupt trying to retrieve my data from them. I don't want to go with Google with the recent stuff they have been doing with data on their servers.

Thanks!

 

Hi, I was planning to encrypt my files with GPG for safety before uploading them to the cloud. However, from what I understand GPG doesn't pad files/do much to prevent file fingerprinting. I was looking around for a way to reliably pad files and encrypt metadata for them but couldn't find anything. Haven't found any recommendations on the privacyguides website either. Any help would be appreciated!

Thanks

21
submitted 2 months ago* (last edited 2 months ago) by MigratingtoLemmy to c/[email protected]
 

LocalMonero is shutting down. How do you plan to do fiat<->XMR now? Do you just keep the addresses and accounts of traders on file and keep going? What about people who haven't started exchanging fiat for XMR yet?

Thanks

 

publication croisée depuis : https://lemmy.world/post/14573897

I'm asking this because I'm very new to the Yocto project. I'm going through the documentation but it's a bit overwhelming to me, looking at what Fishwaldo has achieved (link embedded in the title). I would like to learn how he did it and how I could create my own image based on a supported kernel with necessary drivers and boot the Star64 board.

From what I understand, he:

  1. Forked the kernel tree and created his own branch.
  2. Put in the necessary drivers (including OEM drivers) - I'm not really sure how he did it since I'm new to Linux (any tips would be appreciated!).
  3. I can't quite make out the layers he used to build the minimal image (I will study the guide more to figure this out).
  4. Finally, he compiled it, alongside compiling U-boot, partitioned the SD-card and booted the device.

Am I right? I'm missing a lot of steps in the middle, would really appreciate any help in understanding this. Thanks!

 

publication croisée depuis : https://lemmy.world/post/14573897

I'm asking this because I'm very new to the Yocto project. I'm going through the documentation but it's a bit overwhelming to me, looking at what Fishwaldo has achieved (link embedded in the title). I would like to learn how he did it and how I could create my own image based on a supported kernel with necessary drivers and boot the Star64 board.

From what I understand, he:

  1. Forked the kernel tree and created his own branch.
  2. Put in the necessary drivers (including OEM drivers) - I'm not really sure how he did it since I'm new to Linux (any tips would be appreciated!).
  3. I can't quite make out the layers he used to build the minimal image (I will study the guide more to figure this out).
  4. Finally, he compiled it, alongside compiling U-boot, partitioned the SD-card and booted the device.

Am I right? I'm missing a lot of steps in the middle, would really appreciate any help in understanding this. Thanks!

 

I'm asking this because I'm very new to the Yocto project. I'm going through the documentation but it's a bit overwhelming to me, looking at what Fishwaldo has achieved (link embedded in the title). I would like to learn how he did it and how I could create my own image based on a supported kernel with necessary drivers and boot the Star64 board.

From what I understand, he:

  1. Forked the kernel tree and created his own branch.
  2. Put in the necessary drivers (including OEM drivers) - I'm not really sure how he did it since I'm new to Linux (any tips would be appreciated!).
  3. I can't quite make out the layers he used to build the minimal image (I will study the guide more to figure this out).
  4. Finally, he compiled it, alongside compiling U-boot, partitioned the SD-card and booted the device.

Am I right? I'm missing a lot of steps in the middle, would really appreciate any help in understanding this. Thanks!

view more: next ›