NC is kind of a pain to run and tries to do far to much. I’d pick different software to run than adding addons to nextcloud.
That being said, I add contacts and calendar and use it to sync to my PC/Phone
NC is kind of a pain to run and tries to do far to much. I’d pick different software to run than adding addons to nextcloud.
That being said, I add contacts and calendar and use it to sync to my PC/Phone
Thanks, I removed the pic but left the link for context.
Edit: apparently this is really bad google translation.
https://lemmy.ca/pictrs/image/0811d5be-daba-4383-bd34-f8eb3b9f2dd1.png
I have a gen 5 with 1TB storage and a larger battery. My only complaint is the connector. I’ll replace it with USB-C eventually.


Do you test public WiFi with ZeroTier at all?
I ask because there’s a few public networks where WG won’t connect and I’m trying to find ways around it. I could always use cell data but this is more fun to me.


I know this doesn’t answer your question but I’ve never had this kind of problem with Usenet. I pay $35 USD a year and bought a couple “lifetime” memberships 6 years ago.
What others have said should help solve the problem with torrents. If you can, it might be worth getting an account with a private site.


If I didn’t do anything wrong I’d ignore anyone I didn’t want to talk to and keep doing my own thing. Continue shopping or whatever it was.
Other things that happen would be unrelated (even if it’s related, I’d deal with it as a separate event). Next thing that happens is a security guard hits me, call the cops. I did nothing wrong. If they try to stop me I’d ignore them and wlk away. Physically hold me, I’d call the cops.
If I was scared for my safety I’d do everything and and anything to get out of the situation and deal with the consequences once I was safe.

I wonder if they could mod the OG switch, backup the nand, then run software to find files without inodes on the backup. One of these should be the save file, right? It’d be a lot of work but possible.


“Wow, you’re the worst part of both your parents”
Who’s to say ¯\(ツ)/¯
He already took my wife. Watch out.
This is how it worked for me. Followed by just fucking get up. Tired? Slept like shit? Don’t want to go? Just fucking get up and go, I don’t want to be late or lose my job, I’ll be homeless. I don’t recommend this attitude as you’ll burn yourself out but it’s how I get up.
My problem is everything else. Where do you find time to tidy the house, clean, do laundry, shower, brush your teeth, now the lawn, etc, etc and then have energy for hobbies?


Canadian here, it’d take a LOT more than 1 million USD for me to want to be the 51st state. I’d bet most people in Greenland feel similar.
Okay, so, You’re going to need to pretend like I’m 5 years old here.
The end goal is for me to give this my email creds, it will then monitor my email and when I get a match it’ll run the API call, right?
However, right now, you don’t want to take usernames and passwords so you generate random emails as an example to show what it COULD do.
If I’m correct it might be a little early to give people access as there’s nothing I can really do. I created an account on your site but there’s nothing there explaining what I’m doing just a couple input boxes with a one word label.
I would use this for email -> matrix but I’d have to self host it. I’m sure others would use it if you had some built in API calls that less techy people could use.
Do you allow users to matched regex from the email and use it the API Call?
I don’t understand what you’re doing here. I use your website to what?
Monitor my email and when I get one that matches the regex it’ll make an API call?
Or is your website the API endpoint?
The video didn’t help me understand.
It’s not so much about the ports, its about what you’re running that’s accessible to the public.
If you have a single website on 443 and SSH on 22 (or a non-standard port like 6543) you’re generally considered safe. This is 2 services and someone would need to attack one of the two to get in.
If you have a VPN on 4567 and everything behind the VPN then someone would need to hack the VPN to get in.
If you have 100 different things behind 443 then someone just needs to find a hole in one to get in.
Generally ssh, nginx, a VPN are all safe and they should be on their own ports.