Incessant tinkerer since the 70’s. Staunch privacy advocate. SelfHoster. Musician of mediocre talent. https://soundcloud.com/hood-poet-608190196

  • 1 Post
  • 26 Comments
Joined 1 year ago
cake
Cake day: March 24th, 2025

help-circle
  • Backblaze quietly stopped backing up OneDrive and Dropbox folders

    The article doesn’t really say if the OneDrive or DropBoxe folders were on the physical drive that was being backed up. Backblaze has a restriction on how the backup operates. The drives must be physically connected to the computer being backed up. I have no experience with backing up Git but to date, all my back ups are what they should be. I know there is software that ‘tricks’ BackBlaze into thinking NAS drives are connected, but not sure what the actual names of the software are.












  • Interesting. My method for finding new or similar music to what I have in my library is to use TasteDive. Crowd-Sourced, so you get a ‘real world’ recommendation. It can be a little bit of work, but I find it quite effective. TasteDive also works for movies and a lot of other things. It does have an API tho I’ve never explored that side. I’m not sure what software would interface with their API.





  • change the default SSH port

    I run most everything on a nonstandard port if I can get away with it. However, a bot scan of your server will reveal everything about the ports on your server.

    There are literally tons of ways to skin the security cat and you’ll probably hear a ton of them mentioned. Personally, I use the evil Cloudflare Tunnels/Zero Trust with Tailscale as an overlay on the server and on the standalone pFsense firewall. Cloudflare Tunnels/Zero Trust there is no need to fiddle with NAT, closing/opening ports, etc. Install it on the server, and it takes care of the rest. You will need a FQDN which you can change the nameservers to the ones Cloudflare will assign. The free tier is more than generous and covers a lot of ground as far as security.

    Disable root ssh access completely

    You can, and this ties in with nonstandard ssh port, use key pairs.

    Scan your machine and ensure no extra ports are open

    Lynis is a great way to get a handle on what needs to be done to your server as far as hardening it. Run a scan, in a few minutes it will spit out a list of things that need attention. Not all of the recommendations will be applicable to your server.

    You can always use host allow/host deny to really tighten things up. The only users that will have critical access are the ones you assign in the config.

    Fail2ban is effective, along with Crowdsec, Wazuh, etc