[-] [email protected] 5 points 3 days ago

Well, it's just a TS project with a very simple Dockerrile, you can just bun install && bun run prod.
The rest of the dependencies aren't included in the docker image.

[-] [email protected] 2 points 3 weeks ago

I also like local only with a similar set up as yours, rsync to and HDD and to an SSD.
But I also would recommend you to follow that suggestion, you need to have an external backup managed by someone else (encrypted, of course) so you can have options if anything happens to everything in your local.
It's up to you how much you're willing to pay to be sure to be able to retrieve your data.

I'm using iDrive e2, it says it has a limited offer, but it's been there for over a year.

Im basically paying $1.25 for 2TB per month (it's charged at once for 24 months) https://www.idrive.com/s3-storage-e2/pricing

[-] [email protected] 5 points 4 weeks ago

Since it'll be for you and not the project, why not go for a .dev or .me TLD?
I think .dev is usually used for "in development" projects, but I can also see it as "about a developer" (and that's why I bought mine)

[-] [email protected] 7 points 1 month ago

Found that also myself trying to do the same thing haha. I did the same process as OP, gparted took 2.5 hours in my 1TB HDD to create a new partition, then copying the data from old to new partition was painfully slow, so I went to copy it to another dive and into the new partition.
Afterwards I deleted the old partition and grew the new one, which took a bit more than 1.5 hours.

If I had the space I would have copied all the data out of the drive, formatted it and then copied back into. It would have been quicker.

19
submitted 1 month ago by [email protected] to c/[email protected]

cross-posted from: https://lemmy.pe1uca.dev/post/1137911

I need to help auditing a project from another team.
I got the pointers on what's expected to be checked, but I don't have like templates for documents for what's expected from an audit report which also means I'm not sure what's the usual process to conduct an internal audit.
I mean I might as well read the whole repo, but maybe that's too much?

Any help or pointers on what I need to investigate to get started would be great!

[-] [email protected] 1 points 1 month ago* (last edited 1 month ago)

Yesterday I started looking for mini pcs and found this post https://www.reddit.com/r/MiniPCs/comments/1afzkt5/2024_general_mini_pc_guide_usa/

They shared this link which contains data on 2.8k machines, it helped me compare some of the options I was looking for and find new ones.
https://docs.google.com/spreadsheets/d/1SWqLJ6tGmYHzqGaa4RZs54iw7C1uLcTU_rLTRHTOzaA/edit

Sadly it doesn't contain data bout the ThinkPad, but I might as well share in case you're willing to consider other brands.

Edit: Oh, wait, I was thinking about a ThinkCentre, not a ThinkPad :P
Well, I'll leave this around in case someone finds it useful, hehe.

[-] [email protected] 60 points 1 month ago

It's just a matter of time until all your messages on Discord, Twitter etc. are scraped, fed into a model and sold back to you

As if it didn't happen already

[-] [email protected] 1 points 1 month ago

I'd say it depends on your threat model, it could be a valid option.
Still, how are you going to manage them? A password manager? You'd still be posing the same question: should I keep my accounts in a single password manager?

Maybe what you can do is use aliases, that way you don't expose anywhere the actual account used see your inbox, only accounts to send you emails.
But I tries this and some service providers don't handle well custom email domains (specially government and banking which move slowly to adapt new technology)

[-] [email protected] 3 points 2 months ago

You can use GPSLogger to record it in local or send it to whatever service you want.
If you're into selfhosting you can use traccar which is focused into fleet management so it's easy to get reports on the trips made.

As for your second point, I wouldn't trust the GPS for this, it can say you weren't moving since it only checks every so often to record the data, or maybe it says you actually were speeding because the two points it used to calculate the data weren't the actual points you were at that time.
A dashcam would be better suited for this. I'm not sure how they work, but most probably they can be connected to read data from your car which would be more trust worthy to whoever might decide if you were actually speeding.

[-] [email protected] 4 points 9 months ago

Damn, I wanted to answer with that joke...

I'd say I still procrastinate but less. The main factor is it make me feel anxious of not finishing stuff so I wanted a solution.
The way I'm improving is to look at big tasks into smaller steps which are easier and quicker to accomplish, this way I feel better since there's something I finished even when the big task might be still a long way of being finished.

I remember something about 2 minute tasks or something like that, but also I saw this from my job, splitting projects into epics and each epic into tasks and even then you could split them into sub tasks (taken from the Jira types at my job)

[-] [email protected] 7 points 9 months ago

Is it really encrypted?

I'm guessing it's only for the account recovery to reset your password which should be hashed.

[-] [email protected] 2 points 9 months ago

hashtags as they can be seen on mastodon.

I haven't seen the federation content exchanged, in the UI I've only seen hashtags from mastodon as links inside the content of the post.
For the implementation in lemmy I'd guess they need to be included in the metedata (as in one of the examples in the rfc), does mastodon already does this so lemmy can properly display them in a separate section in the ui?
Also, how would mastodon handle not having the hashtag in the content but only in the metadata?

33
submitted 11 months ago by [email protected] to c/[email protected]

The bug allows attackers to swipe data from a CPU’s registers. […] the exploit doesn’t require physical hardware access and can be triggered by loading JavaScript on a malicious website.

9
submitted 11 months ago by [email protected] to c/[email protected]

The bug allows attackers to swipe data from a CPU's registers. [...] the exploit doesn't require physical hardware access and can be triggered by loading JavaScript on a malicious website.

0
submitted 11 months ago by [email protected] to c/[email protected]

I've been putting off having a local copy of the series and movies I watch because I still can access them quickly and cheaply enough in some streaming service, I think it's time to plan ramping up my selfhosted setup.

view more: next ›

pe1uca

joined 1 year ago