

To be fair, it is slow on VPS with single core CPU and 2GB RAM. But that’s not normal…
To be fair, it is slow on VPS with single core CPU and 2GB RAM. But that’s not normal…
deleted by creator
Thanks, I am trying both paperless and calkbre and see which works better for which tasks.
What should I use for e.g. summarizing papers? Can I run it locally and have it good enough?
Indeed, I don’t get the post. Does OP genuinely think they could influence Affinity to support linux? Via freaking change.org?? Really, why is the post so well-received by community? Got so many questions.
I don’t think this community is a stronghold of linux, as you can see in the comments. We need to start from somewhere.
Thanks a lot! I will go with the blockinfile, sounds promising.
How do I keep some of the existing firewall rules (which is dependent on host) in the remote file, and change the other parts?
Thank you! Templating rules.v4 is a pretty attractive option. Though my VPS has some portions of the file which should be unmodified, so I would have to avoid this method.
Thanks, but I looked up and learned to prefer the idempotence to be handled by ansible. Ansible support iptables by default, while nftables need a plugin, so iptables it is for me.
Sorry, I prefer input |> then |> doThis |> lastly
Sounds almost like
lastly (doThis (then (first input)))
Not OP, but I experience difficulty articulating what I mean while staying formal. How to improve?
Being concerned about security while using free VPN sounds like an oxymoron.
Wait. I got the format warning in caddy, so does this mean it could contain substantial error? I gotta check
Thanks! I gotta get my hands on Ansible, was reluctant as I’ve heard it can be complicated. Should see myself!
Codeberg sounds like a good way! I was concerned about server config being stored on self-hosted forgejo (which is configured by the very server config), turns out that need not be the case.
Fortunately my VPS (oracle) has set SSH authentication to be default. Disallowing root login sounds good, gotta try that as well.
Thanks, I will try fail2ban. I am using ED25519 for ssh keys, it seems like it’s the best defense on the ssh side. Do you happen to know why this kind of attack is so prevalent?
I am wondering the opposite as a neurodivergent. Why aren’t all of them kind of fine? Like, one is going to be better than the other, but it seems like a hard pick.
Maybe I am too autistic to consider about forks.