

Plus certbot and acme easily auto renew the certs.
Plus certbot and acme easily auto renew the certs.
She’ll make excuses for python inefficiencies. ‘But it has so many libraries available!’
No, it hasn’t. The US is waging a proxy war that requires the EU to bear the consequences. They even destroyed one of your pipelines, and caused one of the worst environmental disasters in history right off the coast, and Europe didn’t make a peep about it.
Then explain the shock coming from Europe.
Liberals are just as much reactionaries as conservatives. They simply disagree on which status quo they’d like to return to and who is acceptable to exploit.
There was never a point in US history that it was not a rogue state. If you believe there’s a period it wasn’t, you simply do not know enough history about the time period you’re referring to.
Or more likely, you believe white lives to be more valuable, and you take offense now that the US is directing their usual behavior towards white Europeans.
This Russiaphobia is so completely out of fucking control.
It’s wild that Linux stans are such masochists that they believe they can convert people to loving abuse, instead of just making the interface better to attract users.
This is why I’ve stuck with Emby.
I get why people switched, and I’m open to it eventually, but Emby is much more polished. That’s not to say the Emby clients don’t also crash from time to time.
I’m looking through my comment, and I can’t imagine what you would interpret as undue stress or emotion.
K. And what massive vulnerabilities have been introduced by that? I’ve seen no articles or sources backing that claim.
Sure. It risks introducing vulnerabilities. It needs to be implemented very carefully. I think a built in version, with security in mind, is a lower risk than relying on users to implement their own solution, and risk them picking the wrong one or setting it up incorrectly.
Every user convenience introduces vulnerabilities. The users are the weakest link in every system. It’s a balancing act, and one I don’t think Linux has ever balanced well for usability. But server core has shown there’s no reason for the service to be on by default. There’s much more dangerous Linux features that are switched on by default configs, like root logins and password authentication, so let’s not pretend Linux has ever taken a hard line on this.
I mean, it’s a tv app. I kinda feel like it’s on the developer of the app if their feature can’t be used without a touch interface or keyboard.
But my biggest reason for using Steam link is couch play from my computer in the other room. And Steam link allows you to emulate keyboard and mouse from the controller.
Yeah, I know suggesting UI and user experience improvements spooks Linux diehards.
The biggest issue for me was their tvOS app. If you can’t tap the screen with three fingers, you can’t bring up alternate controls when you run into a problem.
I’ve gotten it working plenty of times. Still doesn’t hold a candle to RDP.
I actually just tried moonlight/sunshine this past week for gaming, and I was disappointed. The interface is missing critical components that Steam link has. Makes it almost useless unless you have a keyboard attached in many cases.
But I hadn’t thought of using it for Remote Desktop into Linux. Sounds a lot better than No Machine. Thanks for the tip.
Yeah, I know. Same on Windows Server Core I believe, but the option is in there to enable it.
I admit I don’t know the technical details well enough. But I know the user experience difference is ridiculously bad trying to remote into Linux. My workflow now is mostly using my tablet and remoting. If Linux had better Remote Desktop protocol, it’d also be my go-to for a desktop experience. Right now, if I can’t use the terminal app for something, I’d rather just remote into a Windows box than feel like I’m using a computer from the 90’s with Linux Remote Desktop options.
That’s also my go-to on Linux, but it’s still clunky as hell compared to RDP.
Does it need to be exposed to the internet? Putting it behind a vpn would be best.
Besides that, just make sure only the users you need to have access to ssh logins, and use keys for extra hardening. Keep your system updated. Limit that system’s access to other systems on your network, so if it is compromised, they can’t use it as a pivot point for the rest of your setup.
The other commenter’s suggestion of fail2ban is also solid.