Why custom? There’s 6.17 in trixie-backports.
- 0 Posts
- 13 Comments
What is n8n?
I mean not much difference in hardware support.
Ubuntu is the wrong choice for any server.
In general, I agree. But I don’t want do participate in holy wars.
Don’t expect much difference between Debian and Ubuntu. I guess you just need to install a newer kernel package from backports.
I’ve read the article you pointed to. What is written there and what you wrote here are absolutely different things. Docker does integrate with firewalld and creates a zone. Have you tried configuring filters for that zone? Ufw is just too dumb because it is suited for workstations that do not forward packets at all, so it cannot be integrated with docker by design.
What does
dpkg --print-foreign-architecturessay?
bizdelnick@lemmy.mlto
Linux@lemmy.ml•Confession: I don't know what passwords in Linux are for
8·1 month agoWhat are passwordless solutions in Windows for remote access, disk/filesystem encryption, keyrings?
BTW in all that cases a password can be replaced with a hardware token, for instance. It is just the simplest, most widely used and one of the less secure options.
Install updates regularly. Don’t install software from unofficial sources. If you see a recommendation like run
curl something | sudo bash, ignore it. And, in general, don’t run anything as root unless you understand what you are doing and why this cannot be done without root privileges.
bizdelnick@lemmy.mlto
Selfhosted@lemmy.world•Pdf to odt/docx conversion has me weeping!English
2·6 months agoThere’s no any solution. It is impossible to convert from PDF to any editable format correctly. The exception is a “hybrid PDF” that has an embedded editable document. If you need to edit PDFs that you created yourself, store them in hybrid format.
DevOps, not programmer.
bizdelnick@lemmy.mlto
Selfhosted@lemmy.world•How to harden against SSH brute-forcing?English
1·9 months agoThe best way is to disable password login and use SSH keys only. Any further steps are not required, but you may additionally install fail2ban or sshguard.
bizdelnick@lemmy.mlto
Linux@lemmy.ml•Is there any way to emulate aegis authenticator (fdroid) on an ubuntu based computer?
1·2 years agoThere’s nothing special, it can be replaced with any TOTP/HOTP implementation. In particular,
oathtoolis supplied in most distros (it has only command line interface, probably there are also some GUI tools in your repos). However it does not support JSON key format that is provided as QR code for mobile 2FA apps. You have to copy and paste values from it manually.However this will likely violate your employer’s security policy. The point of 2FA is that secret key is stored on a separate device, so that it cannot be stealed together with your password.
I recommend to try other Android apps on your phone. I use FreeOTP+ and have no problems with font readability. Some of my collegues use AndOTP and like it.

Your family will hate you if you’ll change their distro and DE every time you visit them. Distro hopping is normal for the first couple of years, but do it on your own machine.