

I did this but buying these on Amazon is scary. Try to find one that won’t burn your house down.
I did this but buying these on Amazon is scary. Try to find one that won’t burn your house down.
Does Syncthing actually work with device IDs? It seems to work with encryption keys which should be stored in the user directory, at least if Syncthing is running as a user. Is the problem just that you have two machines with the same name in the same network? You can change the name.
Mediamtx will receive video from the camera using whatever protocol the camera supports and make it accessible over HTTP.
Make sure if you’re using an infinite file HTTP stream instead of DASH or HLS that you configure the timeouts on the reverse proxy appropriately or else your proxy might interrupt the video after some number of seconds. I’ve wasted a lot of troubleshooting time on proxy misconfiguration like that.
This fixes the issue of hosting any nefarious content.
How does removing images change anything? Any file can be transmitted by text, as we used to do with e-mail, and you don’t need to use images to make illegal or just intentionally offensive content.
It may or may not be a concern to you, but if you are hosting it from your home then people will be able to determine your IP and rough physical location.
If you’re on American cable internet and expecting a lot of traffic, your upload speed may become a problem.
Having a non-garbage domain provider can be a luxury. I used to work at a place where we were paying boatloads of money for certificates from Sectigo for internal services, and they were charging us extra per additional name and even more if we wanted a wildcard, even though it didn’t cost them anything to include those options. Getting IT to set up the DNS records for Let’s Encrypt DNS verification was never going to happen.
I’m pretty sure browsers stopped distinguishing EV certificates years ago.
A large percentage of those hosts with SSH enabled are cloud machines because it’s standard for cloud machines to be only accessible by SSH by default. I’ve never seen a serious security guide that says to set up a VPN and move SSH behind the VPN, although some cloud instances are inherently like this because they’re on a virtual private network managed by the hosting provider for other reasons.
SSH is much simpler and more universal than a VPN. You can often use SSH port forwarding to access services without configuring a VPN. Recommending everyone to set up a VPN for everything makes networking and remote access much more complicated for new users.
Shodan reports that 35,780,216 hosts have SSH exposed to the internet.
Moving SSH to ports other than 22 is not security. The bots trying port 22 on random addresses with random passwords don’t have a chance of getting in unless you’re using password authentication with weak passwords or your SSH is very old.
SSH security updates are very infrequent and it takes practically no effort to keep SSH up to date. If you’re using a stable distribution, just enable automatic security updates.
Having SSH open to the internet is normal. Don’t use password authentication with weak passwords.
It’s also ahead of gitea in some aspects: https://forgejo.org/faq/#is-there-a-roadmap-for-forgejo
intel’s WiDi software supported Miracast, which is a standard.
Or use Miracast, AKA WiDi, Smart View, SmartShare if you just want to mirror a screen.
You don’t need a static IP to have a domain name, and you don’t always need to pay for a domain name either.
That Pentum is a budget CPU from just over 10 years ago. It has PCIe 2.0. Maybe the “gigabit” ethernet is connected to the CPU by a single 500Mbit PCIe lane.
Docker Swarm encryption doesn’t work for your use case. The documentation says that the secret is stored encrypted but can be decrypted by the swarm manager nodes and nodes running services that use the service, which both apply to your single node. If you’re not having to unlock Docker Compose on startup, that means that the encrypted value and the decryption key live next to each other on the same computer and anyone who has access to the encrypted secrets can also decrypt them.
Aqara sells one that works with HomeKit and should work offline. They say it will get Matter support later, but Home Assistant can use it through HomeKit without having to buy any Apple devices.
Be careful with doing this. X-Real-IP and X-Forwarded-For are good for when the client is a trusted proxy, but can be easily faked if you don’t whitelist who’s allowed to use those headers. Somebody with IPv6 access could send “X-Real-IP: 127.0.0.1” or something and if the server believes it then you’ll see 127.0.0.1 in logs and depending on what you’re running the user may gain special permissions.
Also be careful with the opposite problem. If your server doesn’t trust the proxy, it will show the VPS IP in logs, and if you’re running something like fail2ban you’ll end up blocking your VPS and then nobody will be able to connect over IPv4.
If all you want is to break out the VLANs to NICs using a Linux PC instead of a managed switch, create six bridge interfaces and put in each bridge the VLAN interface and the NIC.
The ones on Amazon are intended to run GPUs for crypto farms, but they’re all brands you’ve never heard of with dubious claims and they’ve all got at least one review where either the device was defective or something was installed incorrectly and it caused damages.