• 0 Posts
  • 21 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle
  • Should be fine, just don’t cheap out on the external drive / cable you will be using. And when you’re using something like smartctl you’ll know right away if SMART info is passing through your USB for proper testing.

    I’ve done a lot of these type of scans via USB drives, honestly the more annoying part is that some USB drives do wonky things like go into sleep mode within 1-5 minutes which will disrupt any sort of scanning you had going. So with USB drive scanning I usually implement something to keep the drive alive and awake e.g. a simple infinite loop script to write a file every x seconds, or if you’re on windows you can also use KeepAliveHD.


  • is there anything you would recommend?

    You’d need to donate via whatever means they accept donations, it’s not something you get to choose yourself. Unless you meant that you are going to keep contacting FOSS projects to ask them to set up new donation methods?

    Personally I donate via crypto or other means that they allow donations via credit card (Liberapay / Ko-Fi work well IMO) . No Paypal/Venmo since I can’t use those services - some FOSS projects I don’t donate at all if they only accept Paypal.


  • True, wouldn’t be too different vs just using a VPN. You’re choosing to trust the Tribler tech and the Tribler exit node operator vs choosing to trust the VPN provider. Granted most VPN connections are going to have much better performance vs anything Tribler related.

    There is a nice side effect of running an *arr stack against Tribler, even in 1 hop mode - Your Tribler node is much more easily pulling in new content into the Tribler network for other users to access afterwards without needing an exit node. Ideally it’s just one Tribler node/user needing to pull data through the exit nodes while the rest would just pull it from you and share with other nodes in-network.

    Torrents over I2P work the same way. If the torrent data isn’t found within I2P and you have outproxies configured you could pull torrents from the clearnet & afterwards other I2P users just share amongst the I2P network.


  • That’s pretty cool, thanks for sharing! Been a while since I tried it out but last I looked Tribler’s own automation features were quite lacking so something like this helps a lot.

    I was not able to download anything with more than 1 hops in between - ie it does hide your real IP address, but only uses one relay in between.

    Hmm I don’t think there’s any relays at all in that configuration, unless you’re counting the exit node itself?

    https://github.com/Tribler/tribler/issues/3067#issuecomment-325367047

    One thing to keep in mind is that to download torrents from outside Tribler’s own network you would need to download through an exit node… not sure on the exact stats but last I tested exit nodes were only like 5-10% of the Tribler user base. For a while I tried volunteering my own VPN connection as an exit node for Tribler just to see how it went but the Tribler client kept locking up/crashing after a few days so the experiment did not go well… hopefully works better nowadays.



  • Brickfrog@lemmy.dbzer0.comtoSelfhosted@lemmy.worldCustom Domain Email
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    2 months ago

    If you’re using Google Workspace, Google will give you the appropriate DMARC, DKIM and SPF records to add to your DNS. The NS themselves should resolve the records and provide the recipient server with the values you’ve entered, thereby ensuring delivery.

    Sure. But why would that matter when you’re dealing with hostile 3rd party email providers that intentionally want to blackhole all email domains at Namecheap? But yes, just to clarify I do configure DMARC/DKIM/SPF and that works great for most cases.

    I’m just describing what worked for me though in truth I don’t know exactly how these hostile email providers actually determine the domain is hosted at Namecheap. My hunch is that they are using a lookup & finding the nameserver for the domain & have already blacklisted Namecheap’s default free nameserver IP addresses. For whatever reason those same hostile email providers don’t seem to be blacklisting Namecheap’s paid nameserver but I think that sort of makes sense…

    The larger issue is that Namecheap is known for cheap domains that scammers/spammers tend to buy in bulk & then use to spam with. Those same scammers/spammers aren’t trying to spend extra money so they only ever use the default free Namecheap nameservers.


  • Brickfrog@lemmy.dbzer0.comtoSelfhosted@lemmy.worldCustom Domain Email
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    edit-2
    2 months ago

    If you use Namecheap for email domain(s) you may want to consider also splurging for their PremiumDNS to keep your domain(s) off spam blocks at other email providers.

    I help maintain some emails at Gmail/Google Workspace but the domains themselves are at Namecheap. For a while there were complaints that some emails never landed in other people’s inboxes… this led me to talk about the issue with one of the email provider recipients based in the UK & apparently they were null routing anything coming from Namecheap since they felt a lot of spam came from them. But after some experimenting I figured out their system (& probably others) were figuring out they were Namecheap domains via the default FreeDNS they use. On a hunch I switched those domains over to PremiumDNS and after that all our emails were landing in other inboxes correctly. I guess maybe it makes sense, a typical spammer buying a cheap domain at Namecheap isn’t going to splurge for the higher end DNS service for it.

    I’m not saying all email providers treat Namecheap domains as spam but just be warned there definitely ones out there that do.





  • Syncthing, Resilio Sync, or one of those browser based p2p file sends e.g. https://file.pizza or similar.

    If both p2p ends know how to use torrents then creating a simple torrent to share to the other peer would work fine. But that requires slightly more IT competence especially if someone needs to open a port forward (ideally you would make sure you have your own port forwarded so the other party doesn’t have to worry about this).

    If you’re doing this more than once it might be worth setting up a simple server e.g. HFS is a nice open source/free HTTP file server, been a while since I used it but it still seems to be active https://www.rejetto.com/hfs/


  • Brickfrog@lemmy.dbzer0.comtoNew Communities@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    4 months ago

    Yikes. I already unsubscribed from there, overall I get the vibe that the new mod is acting in bad faith & stirring up drama when none was needed. It’s also clear the new mod doesn’t particularly care for the existing community members, they are mainly just moderating for themselves it seems.

    TBH someone could just create a lemmyapps @ any other Lemmy instance. I haven’t spent too much time to figure out if that already exists.




  • and opened port 587 in my router

    Agreed with the other comment, you definitely don’t need or want to do that on your end. Note that your self hosted instance is trying to establish an outgoing connection with a random port to port 587 at wherever your hosted email is e.g. yourdockeripaddress:randomport --> mydomain.com.au:587

    I don’t have Bitwarden self hosted so can’t offer much advice on a solution but…

    I’ve also tried to connect with my gmail but no luck. When I try to verify my email I just get “An unhandled server error has occurred”

    This makes me think there’s something off with your environment, or the Bitwarden instance itself. Is there a way for you to verify that you can actually use those SMTP servers outside of Bitwarden? This sounds silly but in the past I’ve done a test installation of an email client with ability to connect to 3rd party SMTP servers e.g. Thunderbird just to verify my own internet connection can actually initiate an SMTP connection to an external server. You want to at least rule out that the hosted email server isn’t blocking you and/or have some over-active firewall on your end blocking things.

    This is all in the absence of more verbose logging (not sure if Docker or Bitwarden can give you that, something worth checking).


  • However, the server doesn’t have the best power consumption, so I’d like to use WoL to remotely turn it on.

    When you say remotely you mean over the internet, right? Or did you mean remotely within the same LAN e.g. from your living room or wherever.

    By default WOL doesn’t work over the internet AFAIK. The wikipedia page mentions it a bit https://en.wikipedia.org/wiki/Wake-on-LAN#Subnet_directed_broadcasts

    Like others said you may be able to get that going with a VPN or anything VPN-like that allows broadcasts between connected systems. Or if your motherboard supports IPMI / IMM you should be able to connect to the system & perform power functions that way.

    In my case my motherboard doesn’t have those sort of management functions so in the end I settled on logging into my router remotely & initiated WOL through there. That could be another option for you if your network router is capable of sending WOL packets to the LAN.

    However, the server doesn’t have the best power consumption, so I’d like to use WoL to remotely turn it on.