TCB13

joined 2 years ago
[–] TCB13@lemmy.world 9 points 3 days ago

DNS0.eu is the new thing. Maybe also Control D Free DNS, Alternate DNS or if you want to go more hardcore LibreDNS. To be fair your biggest concern shouldn't be only where you get your DNS from BUT also if it supports DoT and DoH - encrypting the DNS is more important for a lot people than actually using something other than Cloudflare or some other big company.

[–] TCB13@lemmy.world 4 points 3 days ago (1 children)

Adguard is a very large data mining operation. You'll eventually figure that out.

[–] TCB13@lemmy.world 1 points 6 days ago

Yeah that extension should be shipped with the browser to make things easier.

[–] TCB13@lemmy.world 1 points 6 days ago (1 children)

That's not Ungoogled Chromium, at all. Not even close.

[–] TCB13@lemmy.world 9 points 6 days ago (8 children)

The only problem with Ungoogled that makes it "not ideal for a normal human" is that fact that it is still cumbersome af to download it. Regular people don't know github and how to click on "show all assets" and pick the right build.

[–] TCB13@lemmy.world 5 points 2 weeks ago (2 children)

Welcome to modern operating systems, apps, browsers, websites... just buy a high-dpi 30" screen :D

[–] TCB13@lemmy.world 1 points 2 weeks ago (1 children)

This isn't true, there are other features that "emit code", that includes: namespaces, decorators and some cases even async / await (when targeting ES5 or ES6).

[–] TCB13@lemmy.world 1 points 2 weeks ago

This isn't true, there are other features that "emit code", that includes: namespaces, decorators and some cases even async / await (when targeting ES5 or ES6).

[–] TCB13@lemmy.world 1 points 3 weeks ago (1 children)
 

cross-posted from: https://lemmy.world/post/28692919

uSentry is a lightweight, self-hosted Identity and Access Management (IAM) and Single Sign-On (SSO) solution designed for homelab and small-scale environments.

⚡ A single PHP file. < 400 lines of code. No database. No background processes. No cloud. Just works. ⚡

Most IAM and SSO solutions require databases, certificates and background services baked into a dozen containers. This is all fine but also also overkill for homelabs and impossible for low-power ARM devices. uSentry is different, it isn't pretty but it sucks less for a lot of use cases.

Enjoy!

 

uSentry is a lightweight, self-hosted Identity and Access Management (IAM) and Single Sign-On (SSO) solution designed for homelab and small-scale environments.

⚡ A single PHP file. < 400 lines of code. No database. No background processes. No cloud. Just works. ⚡

Most IAM and SSO solutions require databases, certificates and background services baked into a dozen containers. This is all fine but also also overkill for homelabs and impossible for low-power ARM devices. uSentry is different, it isn't pretty but it sucks less for a lot of use cases.

Enjoy!

 

Considering a lot of people here are self-hosting both private stuff, like a NAS and also some other is public like websites and whatnot, how do you approach segmentation in the context of virtual machines versus dedicated machines?

This is generally how I see the community action on this:

Scenario 1: Air-gapped, fully Isolated Machine for Public Stuff

Two servers one for the internal stuff (NAS) and another for the public stuff totally isolated from your LAN (websites, email etc). Preferably with a public IP that is not the same as your LAN and the traffic to that machines doesn't go through your main router. Eg. a switch between the ISP ONT and your router that also has a cable connected for the isolated machine. This way the machine is completely isolated from your network and not dependent on it.

Scenario 2: Single server with VM exposed

A single server hosting two VMs, one to host a NAS along with a few internal services running in containers, and another to host publicly exposed websites. Each website could have its own container inside the VM for added isolation, with a reverse proxy container managing traffic.

For networking, I typically see two main options:

  • Option A: Completely isolate the "public-facing" VM from the internal network by using a dedicated NIC in passthrough mode for the VM;
  • Option B: Use a switch to deliver two VLANs to the host—one for the internal network and one for public internet access. In this scenario, the host would have two VLAN-tagged interfaces (e.g., eth0.X) and bridge one of them with the "public" VM’s network interface. Here’s a diagram for reference: https://ibb.co/PTkQVBF

In the second option, a firewall would run inside the "public" VM to drop all inbound except for http traffic. The host would simply act as a bridge and would not participate in the network in any way.

Scenario 3: Exposed VM on a Windows/Linux Desktop Host

Windows/Linux desktop machine that runs KVM/VirtualBox/VMware to host a VM that is directly exposed to the internet with its own public IP assigned by the ISP. In this setup, a dedicated NIC would be passed through to the VM for isolation.

The host OS would be used as a personal desktop and contain sensitive information.

Scenario 4: Dual-Boot Between Desktop and Server

A dual-boot setup where the user switches between a OS for daily usage and another for hosting stuff when needed (with a public IP assigned by the ISP). The machine would have a single Ethernet interface and the user would manually switch network cables between: a) the router (NAT/internal network) when running the "personal" OS and b) a direct connection to the switch (and ISP) when running the "public/hosting" OS.

For increased security, each OS would be installed on a separate NVMe drive, and the "personal" one would use TPM with full disk encryption to protect sensitive data. If the "public/hosting" system were compromised.

The theory here is that, if properly done, the TPM doesn't release the keys to decrypt the "personal" disk OS when the user is booted into the "public/hosting" OS.

People also seem to combine both scenarios with Cloudflare tunnels or reverse proxies on cheap VPS.


What's your approach / paranoia level :D

Do you think using separate physical machines is really the only sensible way to go? How likely do you think VM escape attacks and VLAN hopping or other networking-based attacks are?

Let's discuss how secure these setups are, what pitfalls one should watch out for on each one, and what considerations need to be addressed.

 

The most severe restrictions to the general public are imposed within a 20-mile (32 km) radius of the Green Bank Observatory.[5] The Observatory polices the area actively for devices emitting excessive electromagnetic radiation such as microwave ovens, Wi-Fi access points and faulty electrical equipment and request citizens discontinue their usage. It does not have enforcement power[6] (although the FCC can impose a fine of $50 on violators[7]), but will work with residents to find solutions.

 

As a middle ground, we could implement a solution for the bottom tier: small to medium sites and blogs. These sites don’t necessarily need a full-fledged MySQL database.

SQLite seems to be the perfect fit:

  • It is the most widely used database worldwide
  • It is cross-platform and can run on any device
  • It is included by default on all PHP installations (unless explicitly disabled)
  • WordPress’s minimum requirements would be a simple PHP server, without the need for a separate database server.
  • SQLite support enables lower hosting costs, decreases energy consumption, and lowers performance costs on lower-end servers.

What would the benefits of SQLite be?

Officially supporting SQLite in WordPress could have many benefits. Some notable ones would include:

  • Increased performance on lower-end servers and environments.
  • Potential for WordPress growth in markets where we did not have access due to the system’s requirements.
  • Potential for growth in the hosting market using installation “scenarios”.
  • Reduced energy consumption – increased sustainability for the WordPress project.
  • Further WordPress’s mission to “democratize publishing” for everyone.
  • Easier to contribute to WordPress – download the files and run the built-in PHP server without any other setup required.
  • Easier to use automated tests suite.
  • Sites can be “portable” and self-contained.

Source and other links:

0
submitted 1 year ago* (last edited 1 year ago) by TCB13@lemmy.world to c/linux@lemmy.ml
 

New GNOME dialog on the right:

Apple's dialog:

They say GNOME isn't a copy of macOS but with time it has been getting really close. I don't think this is a bad thing however they should just admit it and then put some real effort into cloning macOS instead of the crap they're making right now.

Here's the thing: Apple's design you'll find that they carefully included an extra margin between the "Don't Save" and "Cancel" buttons. This avoid accidental clicks on the wrong button so that people don't lose their work when they just want to click "Cancel".

So much for the GNOME, vision and their expert usability team :P

0
submitted 2 years ago* (last edited 2 years ago) by TCB13@lemmy.world to c/selfhosted@lemmy.world
 

The Banana Pi BPI-M7 single board computer is equipped with up to 32GB RAM and 128GB eMMC flash, and features an M.2 2280 socket for one NVMe SSD, three display interfaces (HDMI, USB-C, MIPI DSI), two camera connectors, dual 2.5GbE, WiFi 6 and Bluetooth 5.2, a few USB ports, and a 40-pin GPIO header for expansion.

 

Yet another win for Systemd.

 

I've notice that posts in this community tend to get deleted, even ones with multiple comments and/or useful information. Even worse is when they get posted again by some other user a few days later.

What's going on? What's the policy around here?

 

cross-posted from: https://lemmy.world/post/7123708

In this article, you will discover the ISO images that Debian offers and learn where and how to download them. I’ll also provide some useful tips on how to use Jigdo to archive the complete Debian repository into ISO images.

1
submitted 2 years ago* (last edited 2 years ago) by TCB13@lemmy.world to c/diy@lemmy.world
 

Some years ago, before LEDs were a thing, I bought an Ultrafire WF-500 Flashlight that features a Xeon light bulb. As you might imagine the bulb reached its lifetime and burned away.

Now a replacement bulb is available here https://www.ebay.com/itm/321916301663 the thing is that it will cost me 35€ and for that price I could just buy a new LED flashlight.

Now I was considering trying to adapt a generic LED bulb like this one here https://www.aliexpress.com/item/1005002419159094.html?mp=1.

Anyone else with this model of flashlight succeed at a similar mod? Any LED bulb recommendations? Or... is there any other source for the original bulb at a lower cost?

Some photos:

Thank you.

 

Here is what I don't get about Wine. Even in 2023 it seems to fail to handle basic Windows software written in 1996-1995 like the classic convert.exe (https://joshmadison.com/convert-for-windows/). This program and others run flawless in ReactOS for instance, why not under Wine?

Another things I don't get include:

  • Why is Wine is still stuck on that Windows 98 style GUI instead of a more modern thing;
  • Flickering;
  • How can ReactOS, that shares code with Wine, run everything way more smoothly?

For reference I'm using Debian 12, Wine 8.0. Also tried with Soda 7.0, same results.

view more: next ›