The Post Ninja
The game is still actively developed, with the primary focus on bug-fixing. The price is one-time, and there is no intent to sell another expansion, as the game is pretty much at its technical limits as to what you can add to the game with the current expansion.
Also it has a ridiculously good mod repo and management system built into the game.
Meanwhile in Fedora:
…and I’m not sure about getting an A/C from someone that can’t grammar, either
Lower the postgre to 8GB and see what happens? Also, hard drives, ssds, or nvme ssds? Recent info suggests it is possible memcaching is actually slower than direct access to nvme ssd
The lack of VoLTE in Linux OS phones is a dealbreaker for me, but otherwise, I’ve run pmOS with Posh and it works reasonably well now as of 25.06
interesting use of character for “th”
Glad me and family are not on social media.
The install terminal app is for people that like to type in the console. The Mint Upgrader will present the option to upgrade when it’s ready.
Wasn’t this the plot of the Battlefield: Bad Company series?
copyparty
Let me go out on a limb and rec a cheap mini computer with 2 mini gigabit (or more) ethernets, and either pfsense or opnsense. Those two run on anything that has an x86_64 cpu and easily update. Not any harder to learn to setup than mikrotik, and has lots more capability.
I prefer Wayland Yutani
…and this is where sanitizing inputs becomes even more important…
Is there something you absolutely need root for? Or can you get away with not having root? It is always better to not have root capability, as that is a huge attack vector.
0/10 worst movie ever, no City Escape
When you put your server’s tailscale IP in the dns, anything that looks up that dns gets the tailscale IP. You only need to connect the devices you want to have connect to the server to the same tailscale network, and your system will handle the routing.
On your DNS provider, make an A record with your IP address, AAAA record with your IPv6 address. If these addresses change often, either setup a dyndns (your DNS provider needs to support this) or pay for a Static IP from your ISP. Firewall the hell out of your network, have a default deny (drop) new inbound rule, and only open ports for your service. Use an nginx reverse proxy if possible to keep direct connections out of your service, and use containers (docker?) for your service(s). Don’t forget to setup certbot and fail2ban. You need certbot to auto update your certs, and you need fail2ban to keep the automated login hacker bots from getting in.
That’s the minimum. You can do more with ip region blocking and such, as well as more advanced firewalling and isolation. Also possible to use Tailscale and point the DNS A record to the Tailscale IP, which will eliminate exposing your public IP to the internet.
paint.net