I don’t see any curtains/blinds or curtain rod/rail, did they forget that people need privacy when they were converting their garage into an overpriced studio flat?
Other accounts: @[email protected]
I don’t see any curtains/blinds or curtain rod/rail, did they forget that people need privacy when they were converting their garage into an overpriced studio flat?
The basic steps are:
I’m not going to write a full tutorial so if it sounds interesting I suggest you do more research. The email hosting is typically focused at businesses as they are most likely to be wanting to host email on a custom domain.
Arch is good for tinkering with to make it your own, but can sometimes require tinkering to do things other distros can do straight away, e.g. adding udev rules to use certain devices or setting up zeroconf to be able to discover printers on the network automatically
If you want to be able to roll back changes easily you could set up your root and home partitions as btrfs subvolumes and use snapper to take snapshots, which can be combined with pacman hooks to automatically take snapshots when updating/installing software and can even be set up to allow booting into the snapshots which could be useful if you break your system
It’s available in the Izzy on droid repo, you’ll have to add the repo to the f-droid app with the following URL:
https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
Or scan the QR code here: https://apt.izzysoft.de/fdroid/
If you wanted to try to make your original rubber band idea work, you could try moving the central dart up slightly so that the rubber band forms a triangle shape and adjust the contact points between the rubber band and the darts to be at each corner of that triangle
If you’re using BTRFS and know how to/are prepared to learn, just create separate sub volumes instead of multiple partitions. Means that you don’t need to decide how to split up space between different partitions and they are easy to delete without a live USB.
Infostealer malware is so popular currently that even Microsoft decided to release one
deleted by creator
For security disable password authentication - use public key instead, disable root login via ssh - use sudo or su from another user.
To reduce the number of attempts of others trying to get in change the ssh port and/or set-up fail2ban.
You could also set a firewall rule to only allow ssh from your IP address, if you have a static address at home and only need access from there, or have a way to VPN into your home network. Make sure you have a static address if you do this though, you don’t want your IP to change and be left locked out of your server.