Cool! Any interesting things in the tech stack, OP? I’ve been meaning to set something like this up for my family, local only.
Cool! Any interesting things in the tech stack, OP? I’ve been meaning to set something like this up for my family, local only.
If you’re into minimalism, I quite like mLauncher from f-droid.
I host my own feed aggregator/reader using Fresh RSS. Easy install with docker, pretty good feature set. I don’t like the mental overhead of going to an app to get things so I use my browser to view the feeds on mobile and desktop.
It feels like waterboarding though.
Don’t use TP up your nose for a different reason: TP is designed to disintegrate when wet. You end up with toilet paper chunks stuck up there.
Same boat here, headphone jack is nonnegotiable.
Scanning isn’t a problem, it’s when someone gets in and sets up a c&c client that you’ve got issues. If you have open ports and out of date software, or bad password practices, it’s only a matter of time before someone turns automated port knocking into embedding malware in your printers and IOT devices.
As others have suggested I would stick to internal only until you’re comfortable. Dealing with automated port scanning from all over the globe is a nightmare if you aren’t running a tight ship, and a collasal headache to deal with if they get in. I started with pihole, jellyfin, and some other simple docker services. Check out linuxserver.io if you go the docker route, they have good prebuilt compose files for you to use and the community has good info on their forums. You don’t need a domain but it’s preferred if you want to host something public-facing. Make sure you have fail2ban configured if you open stuff up to the web, it makes dealing with the automated attacks easier.
I’ll do you one better, shoot a BFG to kill a docker container. https://github.com/gideonred/dockerdoomd
If you have more than one VPS to manage or multiple people that need access via SSH, you may want to look into using SSH certificates instead of keys. Keys get messy when you have to wrangle a lot of them and it’s a real pain in the but if you need to revoke multiple. It does require more than just generating a key pair and giving it to the server to trust though.
Same here. Professor was an absolute clown too, his example HTML boilerplate for some project we had to do had © 1996 professor dipshit This was early 2010s. He also took points off my midterm one semester for not surrounding my JS with comment tags since, otherwise it wouldn’t run on Netscape"
Doubt.