

Home Assistant hs communities to share exactly that
My similar script has a very different goal: at midnight if someone is still up, it dims the family room light and announces on speaker”hey kids, it’s time for bed”


Home Assistant hs communities to share exactly that
My similar script has a very different goal: at midnight if someone is still up, it dims the family room light and announces on speaker”hey kids, it’s time for bed”


Signing (intermediate) certs have been compromised before. That means a bad actor can issue fake certs that are validated up to your root ca certs
While you can invalidate that signing cert, without useful and ubiquitous revocation lists, there’s nothing you can do to propagate that.
A compromised signing certs, effectively means invalidating the ca cert, to limit the damage


Hosting email just saved the day! My ex got locked out of her email account and password resets were blocked. However she still had one “home” forwarding email configured as a recovery address, so we were able to redirect it somewhere accessible and unlock her email account!


deleted by creator


Hah, my lab is mostly a bunch of raspberry pi’s screwed to a wall


I always thought this was an argument for properly racking everything. If it takes more effort, more time to remove, maybe they won’t bother.
My understanding is that for most individuals, theft is mainly
I do have outside cameras but they’re not as useful as you’d think. Maybe they have some deterrent value but they’re not going to alert anyone fast enough unless they’re already in the house and you’re not going to identify anyone even if you catch a good shot of their face. If the do catch someone, perhaps the video is enough to say, yep


For my use case, I’m continually fiddling with my VM config. That’s my playground, not just the services hosted there. I want home assistant to always be available so it can’t be there.
I suppose I could have a “production “ vm server that I keep stable, separately from my “dev” vm server but that would be more effort. Maybe it’s simply that I don’t have many services I want to treat as production, so the physical hardware is the cheapest and easiest option


Same here. In particular I like small cheap hardware to act as appliances, and have several raspberry pi.
My example is home assistant. Deploying on its own hardware means an officially supported management layer, which makes my life easier. It is actually running containers but i don’t have to deal with that. It also needs to be always available so i use efficient “right sized” hardware and it works regardless whether im futzing with my “lab”
Something needed to happen here, we’ll see if even Torvalds has the power to kick massive telecom and consumer electronics conglomerates in the butt. It’s been too long.
The authors approach to not owning anything digital was to attempt self hosting. But the authors reaction to the amount of work was that he shouldn’t own the “self-hosting”? He does not even realize that he’s back to not owning anything
Yeah, jira is too customizable. I mean I wouldn’t give any of it up, but the one time someone let me have the reins, I mostly simplified. Removed workflows, removed customizations.
There needs to be better ways of defining standard projects and sticking to them. Currently everyone wants their little tweak and you can’t even pick out what’s consistent and what’s not until you run into problems


What’s your goal in using fake info? If it’s general privacy, it’s easy enough to register where your info is private to the registrar


My company only allows downloads from official sources, verified publishers, signed where we can. This is enforced by only allowing the repo server to download stuff and only from places we’ve configured. In general those go through a process to reduce the chances of problems and mitigate them quickly.
We also feed everything through a scanner to flag known vulnerabilities, unacceptable licenses
If it’s fully packaged installable software, we have security guys that take a look at I have no idea what they do and whether it’s an audit
I’m actually going round in circles with this one developer. He needs an open source package and we already cache it on the repo server in several form factors, from reputable sources …… but he wants to run a random GitHub component which downloads an unsigned tar file from an untrusted source
Then forget all that and just use
cd ~ or cd /


EVs are more likely to be made out of aluminum and generally have a well covered bottom. I have no idea yet whether they’ll last better, but it’s something to consider trying for a next vehicle …. Or I could let you know in 15 years
I’ve had better results by including “man” in my searches to find the man pages, but man that makes for some questionable looking searches
This is one of the reasons I need to set up Linux at home. I use it at work but who knows what the flavor of the week is?
At this point I can’t tell the difference between yum and rpm and apt and dnf
I’m not entirely sure why all the hate : Jenkins can do the most things the must ways. And yes, it’s so much nicer defining a pipeline with a fully functional language than an assortment of yaml files
Actually that was my response when my company wanted to start using Gitlab ci. It only has one way of doing things so you can probably get a faster start if you had no ci, were a small company, and had simple builds. However we’re over 4,000 builds in many languages from 12 year old monoliths to modern micro services and containers…… and way too much godawful JavaScript. Do you want the quick and simple tool great for a small startup or the all powerful kitchen sink of tools?