

If you use the ISP one, you’ll rapidly find you can’t configure it to do what you want. Run your own, lock it down, and keep it up to date.
If you use the ISP one, you’ll rapidly find you can’t configure it to do what you want. Run your own, lock it down, and keep it up to date.
The apps you list need decent gpu and gpu doesn’t virtualize well.
That’s not really true any more. To actually get it working, especially sharing a GPU between multiple VMs, is finicky, especially if you’re not using the very narrow supported configuration and expensive enterprise hypervisor features. But it is possible, and you can find plenty of articles from people who have gotten it working.
But I still wouldn’t recommend it. I’d give one whole GPU to one VM with PCI passthrough, and let multiple users remote in. Hopefully the apps support that.
Depends on how you want to define “securely”. A sufficiently motivated attacker could attack the remaining encrypted data, either through brute force or exploiting a weakness in the algorithm.
Students, as in you’re a teacher? Talk with your school’s IT department first.
No idea, you’re the one that bought it. I did the same thing for a few years and never bought a plex pass.
What we should be asking is why “selling a product” is no longer a business model.
Because they’re not selling a product, they’re selling an ongoing service. They run the relay servers, and those cost money every month.
I don’t know why people ask for help and refuse to listen when it’s given.
https://docs.docker.com/engine/install/rhel/
You should be able to add the repo and install the packages anyway. If it doesn’t work, give a description of the behavior including errors or logs.
If you really access them that infrequently, are they actually worth keeping?
There are free tiers for some cloud providers, like Oracle (though personally I recommend against using anything Oracle ever).
Prove it with data, else you’ll just be blindly throwing money down the drain.
I think that would just be a different instance.
A quick web search suggests the native Art Mode function is probably the best.
I got one so I picked it apart. The link runs a script on the local system that downloads a kubernetes runtime. From there I assume it runs a Bitcoin miner or something, I didn’t go any further.
Pretty much all of them.
I didn’t know haproxy had a GUI, but the config files are very simple. I would just modify an example one and call it good.
I’ve only seen it for two so far, and after I blocked them it was fine.
Part of the problem was Sonarr trying to grab episodes that hadn’t aired yet. I think a fix for that is forthcoming. That should cut down on them. I don’t know if there is a fix to let you block extensions.
Yeah it doesn’t look at file extensions. Block the release group name. Those releases are malware.
You know you can just put your options in a config file, right? https://github.com/yt-dlp/yt-dlp?tab=readme-ov-file#configuration
Run a VPN server on your system and expose that. Then connect to it with the VPN client on the remote system.
I think that’s being amplified by the case. They do make more noise than most, but it’s not actually all that loud. I have four in the server in my bedroom, and the fan, even at quiet low speed, is louder than the drives.