And it was basically just Google and Microsoft that took away our ability to run our own mail servers.
I’m Hunter Perrin. I’m a software engineer.
I wrote an email service: https://port87.com
I write free software: https://github.com/sciactive
And it was basically just Google and Microsoft that took away our ability to run our own mail servers.
If you’re only looking for 1TB, go with an SSD. It’s about the same price. It’s only when you’re looking for >1TB that HDD starts to get substantially cheaper.
Isn’t it /dev/heart
?
Well I almost have a solution for you, but it’s not ready yet. I have a WebDAV server called Nephele, but I haven’t finished writing the CardDAV and CalDAV extensions for it. I should be done with it in a few months. (My priorities are on my commercial project right now, then back to open source stuff in a couple months.)
Because you have to manage it on your server and all your own machines, and it doesn’t provide any value if your server is hacked. It actually makes you less safe if your server is hacked, because then you can consider every machine that has that CA as compromised. There’s no reason to use HTTPS if you’re running your own CA. If you don’t trust your router, you shouldn’t trust anything you do on your network. Just use HTTP or use a port forward to localhost through ssh if you don’t trust your own network.
You don’t have to pay anyone to use HTTPS at home. Just use a free subdomain and HTTP validation for certbot.
For development, I just run node on my system. I use a library called Nymph.js (that I developed) that runs on SQLite in development, then either MySQL or Postgres in production. It’s nice because I can sync my dev db with rsync when I need to test on a cloud machine, and db backups are really small and easy to manage (literally just copying a few files).
Here’s an article on open source identity management solutions.
A reverse proxy makes setup a lot easier and more versatile, and can manage SSL certs for you.
The easiest way to do it is to do it the right way with LetsEncrypt. The hardest way to do it is the wrong way, where you create your own CA, import it as a root CA into all of the machines you’ll be accessing your servers from, then create and sign your own certs using your CA to use in your servers.
It’s because the same people who wrote the code usually write the docs, and people who are really good at writing code usually aren’t good at writing docs. It’s two different skill sets that usually don’t coincide.
Case in point: my own documentation for https://nymph.io
I know it’s bad, but I don’t know how to make it good. The code, however, is pretty good. It runs my email service.
Open source projects also aren’t very good at attracting people who both want to volunteer their time writing technical documentation and can.
So your “friend’s” unethical business hired unethical workers and now you’ve come here to ask for advice on running your unethical business without paying anyone. Got it.
I feel like a lot of the issue is that software engineers used to be subsidized by both investors propping up unsustainable business models and extremely invasive targeted advertising, and both of those things are either phasing out or being legislated away. A lot of the tracking and advertising practices that kept services like Facebook and Gmail free are illegal now (rightfully so), and investors are starting to realize that not everything is going to become profitable just by having an app.
I think the solution is probably two fold. First, I think the government should invest more into open source software. A lot of the work that keeps the internet running is done by unpaid volunteers. And second, I think we need to go back to paying for services. Giving away services for free because you use them to spy on your users is just an unethical business model. It’s profitable, but so is child labor.
You are not a good person if this is how you want to get through life.
Your “friend’s” business is very unethical. Maybe your friend should think about what they’re doing with their life, and quit doing this.
Maybe just write the academic works yourself, then they should pass.
He’s addicted to the Microsoft flavored kool-aid.
My setup is pretty safe. Every day it copies the root file system to its RAID. It copies them into folders named after the day of the week, so I always have 7 days of root fs backups. From there, I manually backup the RAID to a PC at my parents’ house every few days. This is started from the remote PC so that if any sort of malware infects my server, it can’t infect the backups.
Yeah, that could work if I could switch to zfs. I’m also using the built in backup feature on Crafty to do backups, and it just makes zip files in a directory. I like it because I can run commands inside the Minecraft server before the backup to tell anyone who’s on the server that a backup is happening, but I’m sure there’s a way to do that from a shell script too. It’s the need for putting in years worth of old backups that makes my use case need something very specific though.
In the future I’m planning on making this work with S3 as the blob storage rather than the file system, so that’s something else that would make this stand out compared to FS based deduplication strategies (but that’s not built yet, so I can’t say that’s a differentiating feature yet). My ultimate goal is to have all my Minecraft backups deduplicated and stored in something like Backblaze, so I’m not taking up any space on my home server.
If you put a moopsy and a tribble in a room together, who wins?