Cluster them and do something funny.
Cluster them and do something funny.
I’ve been using it for a little while and it’s been great so far. Configuration is a real PITA but that’s all email, I think.
I don’t disagree but the idea being that the law is made by supposedly moral men and that law is at least moral within the perspective and context of society at the time.
Then die. I don’t know what else to tell you.
If your business model is predicated on breaking the law then you don’t deserve to exist.
You can’t send people to prison for 5 years and charge them $100,000 for downloading a movie and then turn around and let big business do it for free because they need to “train their AI model” and call one of thief but not the other…
This is categorically untrue. The kernel includes most open source drivers however it does not include proprietary drivers (or even all open source drivers) which require recompiling the kernel itself or installing secondary headers…
I’ve used many networking cards in the past that required you to recompile the kernel for them to work properly…
Does the Proxmox host have the driver installed for your 2.5Gb NIC? Can’t use it if it’s not installed. Connect to the host and run ethtool <device>
. Should show the link speed as Speed:
.
I have roughly 40TB of media to transfer and 8MB/s isn’t going to cut it.
If you need ultra-speed data, why not do a 100GbE switch with JBOD? 40TB isn’t a small amount of data. Generally no matter what setup you have it’s going to take a significant amount of time to swap data here.
It also supports DoH out of the box
This is why I choose AdGuard Home, too.
It’s mostly about the setup. Adguard you run via a container, and you’re done–it starts working as soon as you change your DNS settings. Pi-Hole takes some setup to get working.
May I ask about difference between Adguard Home and Pi-Hole in terms of “setup once and forget”?
To put a fine point on it, its about usability. AdGuard is just a simple DNS stub resolver which acts as a middle-man between your network, and an upstream DNS resolver. Basically, your device makes a DNS request to your AdGuard instance, and it either gets filtered out by your blacklists (and never leaves your network), or its forwarded to an upstream DNS resolver (a real DNS server) and then back again. Pi-Hole does the same thing, and many many many more things. So while they would both do what you want, Pi-Hole (in my experience) is dozens of times more complicated and difficult to setup. Which is awesome–if you need all those other features.
I can give you an example. Searching through my logs while writing up my first reply to you, I saw these two entries: https://x0.at/nO3I.png
One is for Skype, which I do not use. I don’t even have it installed on my PC, and the other is for QQ, which is a popular Chinese WhatsApp type service from Tencent, the same parent company as TikTok. Not only is it known for being an arm of the CCP, but why are they operating from within my network? No one uses QQ… So it’s ultra suspicious. The contact was blocked, but if I wanted to investigate further, I can–because now I know its there.
Two things. 1, unless you specifically need to run the software on a Pi, I recommend using AdGuard Home over Pi-Hole. It’s more actively maintained (not to imply that Pi-Hole isn’t actively maintained), and is going to be more of a setup once and forget type of solution.
2, the value in running a software like this is to be able to monitor your network traffic for suspicious activity, block ads, and access to malware, porn, warez, gambling, crypto, etc (especially if you have children). You can use custom blocklists like Hagezi’s threat intelligence feeds (TIF) which instantly decreases your attack vector while interfacing with the clear-net. The TIF blacklists block malware, cryptojacking, scam, spam and phishing. Blocks domains known to spread malware, launch phishing attacks and host command-and-control servers.
I very highly recommend using the Hagezi TIF lists. You can setup AdGuard very easily (mine runs off my Synology NAS), and you can easily force your entire network to use it by changing your DNS server in your router configuration page to your AdGuard Home instance IP (in my case, it’s my Synology NAS IP from within my network).
Takes a few minutes to setup, and you’re done. From there you can use the web-ui to change settings, update blacklists, and even see what your network traffic looks like: https://x0.at/D-aY.png and you can even block access to services directly: https://x0.at/QlbJ.png
You’re making just enough to cover the cost of the new GPU when they break due to being used as a heat source. 👍
So they do this for all apps. Every single app that is in the Android ecosystem. But in your mind they’re specifically targeting firefox with this to make people “scared” huh?
Must be nice to live in denial.
So you’re advocating that Google shouldn’t broadcast that firefox is broadcasting your current location? Even though they do this for every other app available on Android, you’re saying they shouldn’t do this for firefox?
Why?
I was a super early adopter for firefox. I started using it back in 2005-2006. I’m pretty sure it was still in beta when I started using it.
Over the past 20 years I’ve watched while firefox users have formed a goddamn cult around a software. It’s insane to me, especially because I’m seeing exactly the same things from Mozilla that I was seeing from Microsoft (and later Google) at the time I decided to switch from IE to firefox to begin with…
Firefox isn’t special. It’s falling for all the cloud-based privacy invasive enshittification that Chrome has so far. It’s just getting there slower.
So cool your jets. Especially considering uBlock Origin Lite is uBlock Origin. It’s just compatible with the Manifest V3 standard.
Agreed. I haven’t even found anything that it doesn’t block that UbOrigin did.
https://chromewebstore.google.com/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh
Doesn’t cover 100% of what uBO did, but it still works just as good IMO with DNS based ad-blocking on top.
I hurt myself in confusion.