Admiral Patrick

I’m surprisingly level-headed for being a walking knot of anxiety.

Ask me anything.

Special skills include: Knowing all the “na na na nah nah nah na” parts of the Three’s Company theme.

I also develop Tesseract UI for Lemmy/Sublinks

Avatar by @SatyrSack@feddit.org

  • 99 Posts
  • 767 Comments
Joined 3 years ago
cake
Cake day: June 6th, 2023

help-circle

  • EPUB (encrypted) means you have to use their reader app or maybe Adobe Digital Editions or some other walled-garden horseshit to read it. It seems to be up to either the author or the publisher on whether to offer it DRM-free. I haven’t found much rhyme or reason, but it looks like the ones from Simon and Schuster are available without DRM about 5 years after it’s been published.

    I only buy DRM-free since I like to read on multiple devices (Kobo, Phone, or CalibreWeb in a browser in a pinch) and get tired of jailbreaking them myself. I’d gladly pay more for DRM free than not be able to read it without asking for permission every time or being locked to specific reader apps.


  • The sign of a quality meme is me feeling both attacked and validated at the same time lol. Well done.

    I do a spam sweep every morning and follow that up with a look at the modlog from overnight. If an account is actioned a lot or for some egregious things, I’ll review its profile and modlog history to see what else they’re up to and decide if that’s someone that should be kept around or given the boot.

    Honestly all admins should do that.

    Hell, half of Tesseract’s feature set was built around making it easy to do that kind of cross checking without having a bunch of tabs open or losing your original place in the app. So if you’ve ever wondered why you can do so much from the modals when you click on a user, community, or whatever, that’s why.





  • I’ve been wanting to dive into the 10" rack space for a while now. Even saw there were some designs I could mostly 3D print. I recently decommissioned my last 19" rack appliance, so I guess I’m closer than ever now though I’d need to find a 16 port switch that would fit (would prefer that to linking two 8-port switches).

    Haven’t really hosted anything on a Pi (except Kiwix on a spare Pi Zero W2) since I have a bunch of thin clients that I got dirt cheap in a bulk drunk eBay purchase. They’re more capable (though the Pi 5 is close if not entirely surpassing them now) and a bit easier to shove together.

    How are the Orange Pis? I’ve not messed with them, but the specs look too good to be true.




  • It starts with one home server. Then you’re like “But if I just add another server, I can do this. Oh, well, this other thing really needs its own server, too, so what’s one more? Oh, I should separate the traffic from my home network, so I’ll need to get a managed switch. But now I need another server so I can do testing and maybe one more for development. And I can’t go without backups, so throw in a storage server. Ugh, what if the power goes out? Better get a couple of beefy UPSs to hold me over.”

    Before you know it, you have:

    • 12 terabytes of storage
    • 11 servers serving
    • 10 VLANs
    • 9 cron jobs running
    • 8 cables tangled
    • 7 things a beeping
    • 6 dead ports
    • 5 rats nests of coooords
    • 4 UPSs beeping
    • 3 failing drives
    • 2 loud switches
    • And a soaring electric bill











  • I’ve got bot detection setup in Nginx on my VPS which used to return 444 (Nginx for "close the connection and waste no more resources processing it), but I recently started piping that traffic to Nepenthes to return gibberish data for them to train on.

    I documented a rough guide in the comment here. Of relevance to you are the two .conf files at the bottom. In the deny-disallowed.conf, change the line for return 301 ... to return 444

    I also utilize firewall and fail2ban in the VPS to block bad actors, overly-aggressive scrapers, password brute forces, etc and the link between the VPS and my homelab equipment never sees that traffic.

    In the case of a DDoS, I’ve done the following:

    • Enable aggressive rate limits in Nginx (it may be slow for everyone but it’s still up)
    • Just stop either Wireguard or Nginx on the VPS until the storm blows over. (Crude but useful to avoid any bandwidth overages if you’re charged for inbound traffic).

    Granted, I’m not running anything mission-critical, just some services for friends and family, so I can deal with a little downtime.