Also Doctorow’s novella “Unauthorized Bread”.
Also Doctorow’s novella “Unauthorized Bread”.
At least Oracle Weblogic is being useful for someone.
Rather than creating a custom terminal app, could you create a user that only had permission to run the restricted commands, with a profile script that gets run at login and offers a menu of common tasks?
Does it need to be accessible via API (e.g. SQL) or just a spreadsheet-style web interface?
You can use any port for SSH—or you can use something like Cockpit with a browser-based terminal instead of SSH.
If you didn’t map a local config file into the container, it’s using the default version inside the container at /app/public/conf.yml (and any changes will get overwritten when you rebuild the container). If you want to make changes to the configuration for the widget, you’ll want to use the -v option with a local config file so the changes you make will persist.
“I like it when companies game search engines by titling their promotional pages to mimic search query results.”
The Mac keyboard layout was largely inherited from the Apple ][ and pre-OSX systems, which were non-Unix. The original Unix keyboard layout differs from both Mac and Windows layouts.
For anyone confused by “Nextcloud” in the title, it’s just the blog attribution—Nextcloud isn’t involved in the acquisition.
Weakness and risk are distinct things, though—and while security-through-obscurity is dubious, “strength-through-obscurity” is outright false.
Conflating the two implies that software weaknesses are caused by attackers instead of just exploited by them, and suggests they can be addressed by restricting the external environment rather than by better software audits.
Interpreting “a previously-unrecognized weakness in X was just found” as “X just got weaker” is dangerously bad tech writing.
As a casual self-hoster for twenty years, I ran into a consistent pattern: I would install things to try them out and they’d work great at first; but after installing/uninstalling other services, updating libraries, etc, the conflicts would accumulate until I’d eventually give up and re-install the whole system from scratch. And by then I’d have lost track of how I installed things the first time, and have to reconfigure everything by trial and error.
Docker has eliminated that cycle—and once you learn the basics of Docker, most software is easier to install as a container than it is on a bare system. And Docker makes it more consistent to keep track of which ports, local directories, and other local resources each service is using, and of what steps are needed to install or reinstall.
For software that’s currently available on both Windows and MacOS, how does the performance of the Windows version under Wine compare to the MacOS version under Darling?
So it’s more like a customizable installer than a separate distro?
DIdn’t Intel stop making NUCs?
Was it RAID 0 (striped), or RAID 1 (mirrored)?
In general, a mirrored RAID is best for minimizing data loss and downtime due to drive failure, while separate volumes and periodic backups is best for recovering from accidental file deletion or malware. (I.e., if a RAID gets told to write bad data, it’ll overwrite the good data on both drives at once.)
If you want the best of both worlds with just two drives, try zfs—you can mirror the drives to protect against drive failure, and make snapshots to protect against accidental data loss. (This still won’t protect against everything—for that you should have some kind of off-site backup as well.)
Sharks with laser beams!
I’ve been using Ubuntu for a long time for its out-of-the-box zfs support, but the snap annoyances are getting harder to ignore.
A typical use case is to forward a single port to the proxy, then set the proxy to map different subdomains to different machines/ports on your internal network. Anything not explicitly mapped by the reverse proxy isn’t visible externally.