![](https://midwest.social/pictrs/image/65c9e5ff-cae5-4de5-ac1e-f6f1bf4537e9.jpeg)
![](https://lemmy.world/pictrs/image/0d5e3a0e-e79d-4062-a7bc-ccc1e7baacf1.png)
For sure take the case if it’s affordable! It’ll look much nicer afterwards too
For sure take the case if it’s affordable! It’ll look much nicer afterwards too
JB weld epoxy might be a good choice if you either don’t plan on replacing the screen again, or to recreate the holes and patch the cracks if you pull it all the way apart again. I did it to the back of a tv when the vesa screw mounts ripped and it held for another 5 years.
That’s weird destiny 2 has never given me issue, though I don’t play super frequently so maybe I’m just lucky
Which games do that? Running pasthrough gpu on windows for destiny and halo at least gave me 0 issues for years
This might be a change due to that new Microsoft recall program
GitHub has the option of emailing you on releases etc. by email.
Glad we got to the root issue! As others have said this is a learning process and you picked one of the more complicated ones to start with. Once this is done e everything else will start to feel much easier!
If you are on the raspberry pi with a physical screen/keyboard and mouse you can also try accessing with the ip address “localhost:80” and see if there’s a connection that way as well.
We can get the port list another way. From the terminal on the raspberry pi run the command “nmap localhost”. Let us know what that shows, but I would expect to see either 80, 443, or both.
As a side note, if you did not give the nextcloud container a certificate when you made it, you cannot use https:// on the browser, as it has no way to talk using that security mechanism. It is only capable in that case of using http:// and port 80. You will need to disable forced https to access the site (this is fine on the local network if every device is trusted, and only encrypted vpn service in like zerotier is used imo). This might be your problem here, especially if you are seeing both ports listed as open on the pi.
You would be given a safety risk warning page by your browser if you did the self signed certificate that you’d need to tell it to connect anyway, so that likely isn’t the issue. Looking at ports, how are you trying to connect to the server? If you did not assign a certificate at all, you would want to use port 80, port 443 if you did install a certificate.
For instance, my Nextcloud is on ip 192.168.50.30 With that in mind I would be using:
No certificate: http://192.168.50.30:80 Certificate: https://192.168.50.30:443
Does this look like what you are typing in?
As two additional questions, what is the output of “docker container ls” typed into the terminal? And what operating system did you install on the pi, was it raspbian?
At a glance your first issue is finding the correct ip address, you should only have one local ip address to access it with (inside your home network).
To find your local ip, type “ip a” into the terminal, and look for the address under “eth0“ for a wired connection, or “wlan0” for wireless. This will allow you to connect using the ip and port while on your home network to test the connection and make sure it works right.
After that, I highly recommend the vpn option, it will simplify connecting to it while not at home without creating security issues like setting it up with a domain. I personally use zerotier, that guide will help you get it set up on the raspberry pi. Not the last bit about a “managed ip.” That will be the address to tell your phone to connect too once you have the vpn set up on the phone as well.
About a year ago now, it is possible they’ve changed things since.
The one time i published on the play store I just skipped that part and hit publish. I think it took several days to go live the first time but otherwise didn’t seem to matter.
This appears to be correct. See:
EncoderAppPath was simply not present at all in encoding.xml! There was only the display value: <EncoderAppPathDisplay /> My own installation was completely fixed by adding <EncoderAppPath>/usr/local/bin/ffmpeg</EncoderAppPath>
From the page
There’s a similar software called zerotier that only routes traffic you want across. You select an IP range (for instance 10.144..) and it gives your computer a new address. For my main computer let’s say it’s 10.144.168.128. The only traffic routed over the vpn is traffic addressed to that address. You can append the port to web traffic like https://10.144.168.128:8010/zm/index.php (zoneminder used as an example) and it would use the vpn for that connection but nothing else.
I would want a FreeBSD type of packaging system where system libraries and apps are different. Their binary packages are separated into quarterly and latest so you get a very stable OS but either Debian or arch style package updates.
Docker on its own won’t think to look at that interface unless you tie it to it. Assuming you want to listen to both interfaces an external watchdog would be the call. You’d set the watchdog to look for iptables issues and then run commands if it went down (ie to restart iptables and then restart your containers).
Second the key-password combo. It keeps the keys you have on the flash drive but adds a password component that thieves would need to figure out as well. Just make sure to pick a good password!
There is a project looking to do this kind of, known as elks that has images for 80286 chips. I have no idea why you’d want to do that to yourself though.
It’s not impossible lol. All a company would need to do is keep track of where they were getting content. If I use a script to download as much of the internet as possible and end up with a bunch of copyrighted content I could still get in trouble, hell there was even a guy arrested for downloading jstor without authorization.. Stop letting these guys get away with crimes just because you like the idea of the end product