Maybe they are thinking of iVentoy which is not open source but is by the same dev
Maybe they are thinking of iVentoy which is not open source but is by the same dev
The article he linked specifically mentioned that the data is sent to matrix’s servers even when using a self hosted server though
What did you end up using?
No? I have an iPhone because Apple is definitely more trustworthy with my data than Google. The only other Apple product I have is an Apple Watch because I like the integration. Other than that every computer I have runs Linux.
You Google simps need to grow up and stop acting like Tesla fanboys lol
The first person to comment below likes little boys
I actually didn’t know that about addressing before your comment and so I found it very interesting, thanks
The article says that’s what the government is telling employees since there were several critical vulnerabilities found in chrome. It is very convenient that these vulnerabilities were patched in the same update that manifest v2 is removed though
You sweet summer child
How are they going to get past my firewall rules?
Ubuntu was my first Linux desktop distro and I’ve been using it for 4ish years. I really liked it but I no longer feel like I can trust canonical after the whole ‘secretly install Firefox snap when installed with apt cli’ thing. It wouldn’t have even been a big deal if they just said it was only available as a snap but the execution pissed me off to the point of switching
Yes it looks like it is included in the official docker image
Ya that just sounds like good practice for internal services.
@Kethal@lemmy.world Maybe see if you can use a FIDO2 device like yubikey for 2fa
You can watch rss feeds to follow all CVEs like Microsoft’s https://api.msrc.microsoft.com/update-guide/rss
NIST used to have an rss feed for CVEs but deprecated it recently. They still have other ways you can follow it though https://nvd.nist.gov/vuln/data-feeds
Or if you just want to follow CVEs for certain applications you can host/subscribe to something like https://www.opencve.io/welcome which allows you to filter CVEs from NIST’s National Vulnerability Database (NVD)
It looks like it should be possible as both your cpu and motherboard support Intel VT-d
https://download.asrock.com/Manual/Z690 Extreme.pdf
PCIe pass through isn’t enabled by default in Proxmox and requires some manual changes to the bootloader (grub or systemd-boot) as well as loading some kernel modules. You may also need to enable VT-d in your BIOS. You can read proxmox’ guide for enabling PCIe pass through here:
Thanks for the info! Looks pretty cool I’ll have to check it out
This is the first time I’ve heard of Victoria Metrics. It looks like it has a similar use case as Prometheus, is that correct? If so, what made you or your team choose one over the other?
You can always do both and expose some services outside your network and keep the others local only while still being able to access them yourself with a vpn.
I had to deal with the same thing in outlook. A user was complaining that their password manager wasn’t working when opening links from outlook and didn’t even notice it was opening in edge instead of chrome.
From what I read disk wear out on consumer drives is a concern when using ZFS for boot drives with proxmox. I don’t know if the issues are exaggerated, but to be safe I ended up picking up some used enterprise SSDs off eBay for that reason.
I just bought a few refurbished 12TB WD Ultrastars off Amazon and it actually says it’s sold by ServerPartDeals. Not sure if it’s the same people but interesting if they are