

In the docker-compose.yml for the AIO, you can specify the port that the Apache server runs on with APACHE_PORT=XXXX
Then you set your reverse proxy to proxy to that port. If you need some pointers about how to use a reverse proxy, ask away.



In the docker-compose.yml for the AIO, you can specify the port that the Apache server runs on with APACHE_PORT=XXXX
Then you set your reverse proxy to proxy to that port. If you need some pointers about how to use a reverse proxy, ask away.


What’s your general self-hosting setup and what machines are you building for that? I’d like to have HA Proxmox running all the time on three nodes with a low power bill and lots of memory available (like 256GB) but space for memory seems to be difficult to find in a reasonable priced consumer board.


There were no doubt plenty of cameras recording them as they protested, all being fed into the facial recog servers. This picture isn’t getting anyone on a list they weren’t already on.
Besides, they’re braver than the larping cowards that have theirs covered as they disappear people into the concentration camps.


What gets me is the ones that you should be wearing ear protection when using. Some of them are ridiculously loud, I’ve come out of the can with my ears ringing afterwards.
Good to know, thanks for the PSA.


You can tell from how it’s all over your face, Bobby? Does Donny’s taste different from the young men you pay for?
OpenWebUI is pretty much exactly what you’re looking for. It can start up an ollama instance that you can use for your other applications over the network, and chat with it as you see fit. If you have an API key from an outside subscription like OpenRouter or Anthropic, you can enter it and use the models avaialable there if the local ones you’ve downloaded aren’t up to the task.


That I could accept as a good reason.


My threat model isn’t having someone take my computer and log into stuff so my concern when using 2FA is more about them having gotten hold of a password remotely. But a TOTP makes that password pretty hard to use, no matter where it’s stored. And my BW is also protected by a Yubi/password combo, so I guess I’m just vulnerable to having that beaten out of me.


Right under Password in the edit screen of an item: Authenticator Key. You put in the auth key the target site provides you when you enable TOTP and it will start generating timed tokens. Usually you’ll also get a one-time pad of backup keys, I usually toss those in the Notes of the edit screen there as well in case something goes wrong.



Yah, I can’t see a point to have another app/extension when Bitwarden has it built in, and it’s a great password manager.


userns-remap I remember seeing another method that was more manual that would have worked for Podman, but I can’t seem to find it now.


I’ve seen this done with namespaces as well. Which should work for podman.


So that’s where all the rPi’s got to…


Plus the FF extension is really full-featured. I can clip in different formats or even take a screenshot if the webpage makes clipping hard.


Man, I like Quillpad but I can’t use the sync. If I enable that, I have to go to NC to delete notes, if I delete them locally they just come back. I guess that’s fine, I only use it for temporary notes anyway, stuff I want to save and organize goes into Joplin.


Flashed some plugs with Tasmota.


At $21/can if you can believe it.


Leet
Just the 5-6 raid modes are shit. And its weird willingness to let you boot a failed raid without letting you know a drive is borked.