My 5 yo acer nitro 5 with nvidia 1050 mobile still gets support (driver update), but it’s true that they don’t care about their older cards as much. New features like the NVK driver would never support my card.
My 5 yo acer nitro 5 with nvidia 1050 mobile still gets support (driver update), but it’s true that they don’t care about their older cards as much. New features like the NVK driver would never support my card.
Why not just use an F-Droid repo?
For some reason the session network (oxen network) now blocks my Hetzner VPS connection (I use for VPN). Have been a session user for around 2 years now and now I have to reconsider Signal.
Most people only relate Linux to Ubuntu, Linux init system to SysVInit or SystemD, Containerisation to Docker or Kubernetes, Linux desktop to Gnome.
In some cases, it may be due to official support being available but most of the time it’s just that people are being taught Ubuntu first as “THE Linux” and that’s what they use since then.
Unlike Vanced, they don’t redistribute installation files, but rather just the patcher that includes the configurable patches. Revanced users have to already have YouTube apk whether it is from the installed YouTube app or just saved apk so that they could build a patched youtube “revanced” apk with the patcher.
However, I don’t know if redistribution of a patching tool to an app that’s against modification of its binaries is legal.
I am unsure if I can ELI5 those without also ELI5-ing about Computer Network, VPN and Firewall.
They are VPNs. Like a regular network, they connect your devices through their network. They may put Firewall rules to allow you to talk to X networks (any specified networks). That also means the VPN may not allow you to connect to the internet through their network. Now the difference between ZeroTier and Tailscale and other VPNs for accessing the internet is that ZeroTier and Tailscale only permit your traffic to your other devices that are bound to your account and not to the internet (your other internet data won’t go through zerotier/tailscale). This configuration is great because you have a virtual and secluded network that you can connect to from anywhere via the internet using ZeroTier/Tailscale networks (with your virtually local IP on ZeroTier/Tailscale).
I’m hosting an email server on a VPS that has fail2ban in it. A lot of ports are open but only wireguard and knockd are listening.
For remote server management, I would use wireguard for regular ssh access, but when I need to configure the wireguard I can just disable/reenable the wireguard-only ssh firewall rule using port knocking, there is also the option of using the serial console on the VPS web ui but it is slower.
Honestly, I’m not sure myself if my public facing services face a DoS attack. Well, there’s always an option of using Cloudflare. With that being said though, I think in your case you should just use a free “VPN” like Tailscale or ZeroTier.
One of the reasons why you want to keep a live-bootable operating system within one of your flashdrives or optical discs.
You probably need another device to securely boot up a live OS to recover your data. Don’t use Windows, because it might still be vulnerable to autoplay scripts when mounting your infected OS partition and I assume your infected OS is Windows, so the malwares are going to be compatible and unless you know what you’re doing, you probably don’t want to take that chance.