

When I got into the space I had to find a private tracker, but since then I’ve had no issues with Readarr aside from some series being slow to get their metadata updated, but that’s not a Readarr issue.
Nice. Software developer, gamer, occasionally 3d printing, coffee lover.
When I got into the space I had to find a private tracker, but since then I’ve had no issues with Readarr aside from some series being slow to get their metadata updated, but that’s not a Readarr issue.
If I’m using Bluetooth earbuds I can receive a call from Signal or WhatsApp. So it stands to reason it’s possible a Bluetooth device exists to act like earbuds but for a landline phone. I found a few (cell2jack and XLink BT HD) but could not verify if they’d work for anything other than normal phone calls.
The fundraising was for the development of Pixelfed’s source code. e.g. adding new features, bug fixing, etc. - not for currently hosted servers and their infrastructure. So it went to @dansup.
I mean it sounds like a removable mesh pool fence is what you need. The holes might be permanent, but properly installed inserts would make them less conspicuous.
My first impression from the adhesion issue (which doesn’t appear to be the main issue of this post) is that you may need to clean your build plate. But considering it was relatively good as it is, I assume you did and the few spots may just be accidental touches to the surface. In either case, their guide is here: https://wiki.bambulab.com/en/filament-acc/acc/pei-plate-clean-guide
As for the extrusion issue - considering the apparent randomness of it my guess would be either an issue with the filament or a partial clog.
Yup, with PIA the port is random but yes, there should be scripts out there to leverage PIAs forwarding with your torrent software. And yeah, if you were to port forward through your router that could lead to accidentally exposing your actual IP.
incompatible with port forwarding with any VPN
I’m not sure if there is a misunderstanding here, but port forwarding through a VPN is generally agnostic of most network setups. It’s a tunnel, doesn’t require your network to have port forwarding setup or even for it to be capable of it.
A VPN is still a good choice, in fact if you setup your own VPN on a VPS that is an even safer choice because then you (sorta) control the certificate used for encryption. True, your hosting provider could still obtain that cert if they really wanted to, and they still have the data on your IP using it and for how long / how much, but it would make obtaining your data a targeted attack.
But there are cons to setting up your own, such as misconfiguration exposing you, or just the setup time in general.
A VPN introduces a new party who can harvest your data. It doesn’t avoid IP tracking, it just shifts it from your ISP to another entity.
You have to trust that your VPN provider’s claims of no logging/tracking are accurate, you can usually get fairly confident with research but it’s never 100%.
There are quite a few text equivalents. text-generation-webui looks and feels like Automatic1111, and supports a few backends to run the LLMs. My personal favorite is open-webui for that look and feel, and then there is Silly Tavern for RP stuff.
For generation backends I prefer ollama due to how simple it is, but there are other options.
Are you copying it to a locally mounted ext4 or is it a network share of an ext4 drive, and if so - what type of network share?
It’s been a while since I’ve been reminded Teletubbies exist.
Incoming based on the code here:
60C is when PLA starts to warp, but even lower is when it starts to degrade. 6 years is more than enough for this level of degradation even in a less volatile environment.
It’s either woefully incomplete or behind a paywall so someone in the company has access to be you can’t figure out who and eventually just give up.
I’ve seen it a few times in passing and always assumed it was like, a tech demo or proof of concept.
I’ve had bad tinkering break my system before, but never had an update break it irreversibly. The closest would actually be on Silverblue itself, when an update to the kernel was using different signing keys that cause the system not to boot. Fortunately it was simple, I selected the previous deployment and I was in (on a non versioned OS I would have selected the previous kernel which most are configured to retain the last few). A quick Google revealed Ublue had a whole kerfuffle and after verifying it was legit, I enrolled the new certs into my MOK.
Although one time on Arch I had installed an experimental version of Gnome from one of their repos, and was pleasantly surprised when that version finally released and I removed the experiment repo and did an update absolutely nothing at all broke. Nothing.
LUKS, or anything that relies on the server encrypting, is highly vulnerable (see [email protected]’s response).
Your best bet would be encrypting client side before it arrives on the server using a solution like rclone, restic, borg, etc.
MaM.