

Same problem for CGNAT users
Same problem for CGNAT users
1U form factor, 4 disks, using 7w whilst idle, decent enough CPU to run 1 Linux VM
I bought an RS822+ for as a veeam Linux repo.
I can’t make that myself, or I don’t know how.
It was stupid expensive and if it wasn’t the business paying I would have probably put a bunch of disks into an HP elite desk.
I’ve not looked but if the video id is based on its path, then surely the path includes the filename no? You can’t split a hash into its separate original parts, you either guess the entire thing or not. So in that case, the hash is going to challenging to brute force.
Even 2 isn’t difficult. If they can set a price on the currency itself then they can set it on each item trivially.
Ah okay. When I used Plex it had hardware acceleration. But I’d been a Plex Pass lifetime pass user for years so forgot the distinction between that and non pass. Thanks
no local hardware accel
What do you mean by this?
If you want free, there are alternatives. Plex is a business, with employees. Plex pass is their business model.
I think locking remote play is entirely enshitification however, but I get it. Plex model has them provide authentication and relay services. They are now trying to push their own streaming services which I expect is a real money sink.
This is more about familiarity than difference in ease of use. I’ve used both, they are both super easy.
I have fextralife black listed. I don’t know what their game is but it feels fake. Long winded introductions with little substance and recently ai slop.
If you are the only user then use seafile pro. It’s free for up to 3 users.
I recently decommissioned my old poweredge T620. Beast of a thing, 5U heavy af. It had 8x10T drives and was the primary media server.
Now that it is replaced I bought 2x Synology RS822+ and filled them with the old disks. Using SHR2. They are mixed brands bought at different times so I’ve made sure each NAS has a mix of disks.
Lowest is 33k hours, highest is 83k.
Instances have a choice to enable a new Lemmy feature that will proxy all images through the local instance. Whilst your instance may not do that today it may do in the future. Or you could move to an instance that has this enabled. I don’t know how to list instances with it enabled but it should be obvious by the URL used by images when viewed from an instance.
I read that all the popular chat services provide similar information to law enforcement agencies. I don’t think telegram is special in this regard.
Isn’t your use case exactly what Ceph is for?
In 2010 I self hosted a Xen hypervisor and used it for everything I could. It was fun!
I had a drive failure in my main raid 5 array so bought a new disk. When it came to swap it out, I pulled the wrong disk.
It was hardware raid using an Adaptec card and the card threw the raid out and refused to bring it together again. I couldn’t afford recovery. I remember I just sat there, dumb founded, in disbelief. I went through all the stages of grief.
I was in the middle of a migration from OVH to Hetzner and it occurred at a time where I had yet to reconfigure remote backups.
I lost all my photos of our first child. Luckily some of them were digitised from developed physical media which we still had. But a lot was lost.
This was my lesson.
I now have veeam, proxmox backup server, backuppc and Borg. Backups are hosted in 2 online locations and a separate physical server elsewhere in the house.
Backups are super, SUPER important. I’ve lost count how many times I’ve logged into backuppc to restore a file or folder because I did a silly. And it’s always reassuring how easy it is to restore.
I like their ColorVu night vision technology so was going to buy a bunch of these for my next home.
Same as what I have done here, I put the cameras in their own isolated VLAN with no internet and they only rule is to allow the NVR to access those cameras streams.
Blasphemy!
https://demo.scrypted.app/ is the new kid on the block. Intuitive interface, easy to configure, not free, great system.
Not really the only reason. It would be better to just return “token invalid”.
It could occur by someone messing with the URL from the reset password email, like accidently adding an extra character before pressing enter
Or a poor email client that wraps the URL and doesn’t send the complete one when clicked.
Or someone attempting to find a weakness in the reset password system and sending junk as the token.
What were the benefits