They are already tagged as explicit/clean in the metadata as well as separated by folder with an [E] tag if explicit. I could manually rematch them but my library is large so I’d really rather not
They are already tagged as explicit/clean in the metadata as well as separated by folder with an [E] tag if explicit. I could manually rematch them but my library is large so I’d really rather not
I like Plexamp but there’s a couple of things to be aware of depending on your music library that took me a while to figure out:
These probably aren’t issues to the majority of users with just their favorite songs in mp3 or flac 16-44, but it’s something for people with larger hi-res/multichannel libraries to be aware of that I recently learned.
I just bought a few refurbished 12TB WD Ultrastars off Amazon and it actually says it’s sold by ServerPartDeals. Not sure if it’s the same people but interesting if they are
Maybe they are thinking of iVentoy which is not open source but is by the same dev
The article he linked specifically mentioned that the data is sent to matrix’s servers even when using a self hosted server though
What did you end up using?
No? I have an iPhone because Apple is definitely more trustworthy with my data than Google. The only other Apple product I have is an Apple Watch because I like the integration. Other than that every computer I have runs Linux.
You Google simps need to grow up and stop acting like Tesla fanboys lol
The first person to comment below likes little boys
I actually didn’t know that about addressing before your comment and so I found it very interesting, thanks
The article says that’s what the government is telling employees since there were several critical vulnerabilities found in chrome. It is very convenient that these vulnerabilities were patched in the same update that manifest v2 is removed though
You sweet summer child
How are they going to get past my firewall rules?
Yes it looks like it is included in the official docker image
Ya that just sounds like good practice for internal services.
@[email protected] Maybe see if you can use a FIDO2 device like yubikey for 2fa
You can watch rss feeds to follow all CVEs like Microsoft’s https://api.msrc.microsoft.com/update-guide/rss
NIST used to have an rss feed for CVEs but deprecated it recently. They still have other ways you can follow it though https://nvd.nist.gov/vuln/data-feeds
Or if you just want to follow CVEs for certain applications you can host/subscribe to something like https://www.opencve.io/welcome which allows you to filter CVEs from NIST’s National Vulnerability Database (NVD)
It looks like it should be possible as both your cpu and motherboard support Intel VT-d
https://download.asrock.com/Manual/Z690 Extreme.pdf
PCIe pass through isn’t enabled by default in Proxmox and requires some manual changes to the bootloader (grub or systemd-boot) as well as loading some kernel modules. You may also need to enable VT-d in your BIOS. You can read proxmox’ guide for enabling PCIe pass through here:
Thanks for the info! Looks pretty cool I’ll have to check it out
This is the first time I’ve heard of Victoria Metrics. It looks like it has a similar use case as Prometheus, is that correct? If so, what made you or your team choose one over the other?
It’s like getting mad at math because rich people use it to count money
You can always do both and expose some services outside your network and keep the others local only while still being able to access them yourself with a vpn.
I don’t know much about the situation but the article does say he runs a licensed animal rescue that he named after the squirrel
https://www.pnutsfreedomfarm.com