Therefore the laptop is the disk controller and if you gracefully shut down the OS it will take care of all the housekeeping tasks to prepare a disk for safe shutdown (flush cache to disk, park heads on spinning rust, etc) and then it will be safe to turn off the PSU.
- 1 Post
- 216 Comments
If you shut down the computer gracefully first before you power the disks off it should be ok more often than not, but you really should try to have everything on the same system so this can all be coordinated by the OS and the hardware.
As others have said, avoid powering the disks off before the OS has had a chance to shut down or your disks will NOT be in a recoverable state when everything comes back online.
I’m not even sure the setup you are describing would benefit at all from a different storage method, even “regular” writes could be in memory or controller buffers. External drives are not meant to have their power cut.
In the middle of some throes now
4am@lemm.eeto Mildly Infuriating@lemmy.world•My password is not accepted because it is too longEnglish01·2 months agoDon’t worry, pretty soon they will just block password managers from autofilling fields on their login page so that you HAVE to remember your password! Then you’ll be happy it can’t be that long, you can only fit so much on a post-it note on the side of your monitor
/s
EDIT: I think there should be a law against blocking password managers for filling in fields. Any brute force bots are going to submit HTTP requests directly anyway; no one is hitting the DOM to do that
4am@lemm.eeto 3DPrinting@lemmy.world•Philips debuts 3D printable components to repair productsEnglish6·2 months agoAvoids tariffs if you print them yourself
4am@lemm.eeto Linux@lemmy.ml•Linux kernel is leaving 486 CPUs behind, only 18 years after the last one made3·2 months agoProbably not a lot of space savings, but certainly a reduction in complexity, which helps programmers keep everything together and frees their time to work on the newer stuff
4am@lemm.eeto Linux@lemmy.ml•Gnome's new video player, Showtime, gets merged into the main branch. The new video player will replace Totem on Gnome 49.15·2 months agoTrademark suit from the premium cable channel in 5…4…
A lot of what Linux lacks is UI design, and at least 50+% of that is just because of what we got used to using other products.
Linux doesn’t work on TV
proceeds to name 3 distros that not only work but do gaming
My brother in Christ…
I had a double NAT setup like that. Run a firewall like OPNSense as a Proxmox VM, and give it a WAN interface on the ISP router’s IP range; then run everything else on a different subnet, using OPNSense as the gateway. On the ISP router, put OPNSense’s WAN IP in the DMZ. Then, do all your hardening using OPNSense’s firewall rules. Bonus points for setting up a VLAN on a physical switch to isolate the connection.
The ISP router will send everything to OPNSense’s WAN IP, and it will basically bypass the whole double NAT situation.
4am@lemm.eeto Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?23·3 months agoThat is absolutely not the reason ANYONE recommends it, unless you are a complete noob and entirely unfamiliar with computer security at all, and are just pulling assumptions out of your ass. Don’t fucking do that, don’t post with confidence when you’re just making shit up because you think you know better. Because you don’t.
If there is a vulnerability in SSH (and it’s happened before), attackers could use that to get into root directly, quickly, and easily. It’s an instant own.
If root login is disabled, it’s way less likely that whatever bug it is ALSO allows them to bypass root login being disabled. Now they have to yeah, find a user account, compromise that, try to key log or session hijack or whatever they set up, be successful, and elevate to root. That’s WAY more work, way more time to detect, to install patches.
If the effort is higher, then this kind of attack isn’t going to be used to own small fry servers; it’s only be worth it for bigger targets, even if they’re more well protected.
If you leave root enabled, you’re already burnt. You’re already a bot in the DDoS network.
And why? You couldn’t be bothered to type one extra command in your terminal? One extra word at the start of each command?
Sorry bitch, eat your fucking vegetables
4am@lemm.eeto Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?3·3 months agoThis is terrible advice.
“Just turn off your firewall bro, please bro, everyone just paranoid please bro enable remote root login bro 😢”
4am@lemm.eeto Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?35·3 months agoThen you can’t gain root privileges on your server. Are you really arguing for less security because it’s inconvenient?
This is end-user behavior and it’s honestly embarrassing. You should realize your security posture is much more important than “I left my phone on the other room”
The orange menace apparently just defunded it so we’ll see
Does Caddy use certbot to do the renewal? A long time ago DNS was a pain but now it seems like a lot of providers are supported.
4am@lemm.eeto Selfhosted@lemmy.world•How do I use HTTPS on a private LAN without self-signed certs?English9·3 months agoIf you are really looking for hassle-free this is it. LetsEncrypt root certificates are already trusted by most devices so when your friends come over and wanna control the media library or whatever you don’t need to install your locally hosted CA’s self-signed certificates on their phone.
Also certbot and a cron or systemd timer is all you need; people have rolled all these fancy solutions but I say keep it simple.
4am@lemm.eeto 3DPrinting@lemmy.world•The Enshittification of 3D Printers – Are We Losing What Made Them Great?English131·4 months agoCan’t wait for the thing I bought and own to suddenly cost $5 a month
4am@lemm.eeto Games@sh.itjust.works•Bam Margera will be in Tony Hawk 3+4 after all after Hawk intervened, it’s claimedEnglish15·4 months agoYeah but if you remake a game and don’t include all the original characters then it’s not really a remake now is it?
Bam’s a shitty little attention whore but he’s not like, molesting kids, is he? I’m not sure there’s enough of a reason to exclude him from a remake of a game he was originally in.
4am@lemm.eeto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Valve's DRM was inspired by an exec's nephew, who 'used a $500 check I'd sent him for school expenses and bought himself a CD-ROM replicator… he sent me a lovely thank you note'English21·4 months agoHehehehe yeah you put it on full blast in your buddy’s dorm when he’s down the hall in the bathroom
I wish there was one single unifying regex standard.
(obligatory xkcd in 3…2…)