He’s missing the sigh() function call at the start of the main body of the loop.
He’s missing the sigh() function call at the start of the main body of the loop.
That is exactly what happens. Encryption on the protocol doesn’t do anything but hide what you’re downloading from your ISP. It doesn’t prevent someone from downloading the same torrent and matching your IP to it. That’s why people recommend that you use VPNs if you’re going to do this from your house.
Most of the time I just copy/paste the terminal output and say ‘it didn’t work’ and it’ll come back with ‘I’m sorry, I meant [new command]’.
It isn’t something that I’d trust to run unattended terminal commands (yet) but it is very good when you’re just like ‘Hey, I want to try to install pihole today, how do I install and configure it’, or ‘Here’s my IP Tables entry, why can’t I connect to this service’ … ‘Ok give me the commands to update the entry to do whatever it was you just said’.
pihole, wireguard, qbittorrent, sonarr/radarr, Jellyfin, syncthing, NFS.
I’ve considered Airsonic but I haven’t found a good client that looks good and doesn’t behave weirdly. I had one launch about 500 threads trying to transcode the same song which ate up my CPU time on my server resulting in a stern e-mailing from my host.
Chatgpt is a camp for just YOLOing off into some new software. Unless it is after the knowledge cutoff it’s pretty accurate about configurations and such. It makes mistakes but it’ll get you started a lost faster.
I don’t believe ECC uses noticeably more power
In the 20 years that I’ve been running a home server I’ve never had anything more than a failed disk in the array which didn’t cause any data loss.
I do have backups since it’s a good practice and also because it familiarizes me with the software and processes as they change and update so my skillset is always fresh for work purposes.
ZFS array using striping and parity. Daily snapshots get backed up to another machine on the network. 2 external hard drives with mirrors of the backup rotate between my home and office weekly-ish.
I can lose 2 hard drives from the array at the same time without suffering data loss. Any accidentally deleted files can be restored from a snapshot if my house is hit by a meteor I lose maximum of 3-4 days of snapshots.
Great post, one of my few saved posts
Infinity is going subscription-only in a coming update. The dev is just eating the costs until then.
All of my invites come from people in a gaming community that I’m a part of.
I’ve been using qBittorrent to run an unrar command (which fails if there isn’t any rar files), it works MOST of the time but it usually extracts the sample first then Sonarr see an MKV and tries to import it, which fails because it doesn’t fit the file size requirements of my quality profile.
I’m using a managed host and they don’t offer unpackerr. I’ll probably end up writing a python script to handle it and all of the weird contingencies. It isn’t really annoying to me, since I can just SSH in and fix it in a few seconds but my family members that add things via Ombi will complain when S01E02 is missing from Season 1.
Wow, I haven’t used the old school P2P programs in over a decade. I honestly didn’t think they existed anymore for some reason.
I’m only using TorrentLeech, what’s some other good ones? I have a seedbox and procuring an invite or interview isn’t an issue. I don’t really have a problem with TorrentLeech except that sometimes movies or TV shows are uploaded as rar which chokes Sonarr and Radarr until I go and manually fix it.
There’s a browser plug-in that can help you too: https://drmikecrowe.github.io/mbfcext/
And, similar site: https://ground.news
It allows you to look at a story and see all of the different sites reporting it as well as including a factuality and bias rating for the site.
yt-dlp
It supports YouTube playlists also, so you can just give it a massive playlist and let it go
It’s pretty funny how much better the experience is on a PC than a Switch.
It’s been ages since I did IT. If I had a user who wanted to run Linux then I knew that, on average, they were going to cause me a lot less headaches with random user issues so I wouldn’t mind being flexible. Endpoint security will be different, but a lot of network security is handled through network devices that don’t care what the client is.
Noticing a lot of suspicious activity coming from there…
Tabs are just bookmarks for people who can afford RAM.