Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
Don't give out infosec advice if you have no fucking clue what you're talking about.
You think windows 10 just becomes unsafe because it stops getting security updates?
Lol.
Not immediately, no, but saying you can safely continue using it if you follow Internet use best practices is flat out wrong.
Is it? How?
Because best practices for connecting an unsupported operating system are to not do it.
Even if the OS is safe on the day support ends, a critical vulnerability might be found just a few days later. It's also possible that an exploit has already been found that the bad actor is sitting on it until support ends.
Even if that doesn't happen, software developers are going to drop support for the OS and vulnerabilities found in those applications could be used to gain ingress.
No amount of "being careful using the Internet" is going to prevent hacking if the system has exploits. If you context a fresh install of XP to the Internet, your system will be compromised in a matter of minutes.
It’s not flat out wrong though. Best practices for when your OS is EOL are different to best practices for a currently supported OS.
All those “experiments” where people go online with a new install of xp and are compromised in minutes disable windows firewall and don’t use any antivirus software. You seem like an expert - is that best practice? Do regular people just turn off the Windows firewall and disable their AV?
Believe it or not, firewalls and AV still stop unpatched security vulnerabilities - the security patches just mean they don’t have to.