It’s a meme about how draining the cmos battery bricked some PC’s, I think. It’s formatted like the Wikipedia sidebar summary for articles on wartime battles.
- 1 Post
- 63 Comments
It’s a meme about how draining the cmos battery bricked some PC’s, I think. It’s formatted like the Wikipedia sidebar summary for articles on wartime battles.
It can pass through. There is even an official Authentik guide on the various methods specifically for Jellyfin: https://integrations.goauthentik.io/integrations/services/jellyfin/
Same with Authelia, though I don’t have a link for that on hand.
Here is the video I followed for SWAG. Note that this (and most of IBRACORP’s guides, which are all fantastic) uses Unraid as the OS, which automates a lot of the processes.
And here is a written guide by the same group to go with or replace the video if this is more your speed: https://docs.ibracorp.io/swag-2/
I’ll be honest, even for “beginners” (which I was when I started this) this is still a lot to take in. Let me know if you run into any specific questions and I can try to help you.
Yeah that’s a good point. The joke is mostly for my own enjoyment or any random user who happens to forget the
jellyfin.subdomain.I have had a few hits to /wp-admin, but cloudflare actually blocks those for me (I don’t use a tunnel but I do use them for the domain name which helps a bit). I might just shut down the main page then.
While technically not strictly necessary, it adds more robust authentication methods, and makes it easier to build out other apps if you want to in the future without having to re-do the sign-in process for all of your users. You can have things like 2fa and other things that make it harder for bots to get in and easier for users to stay in. It also makes it easier to keep track of login attempts and notice compromised accounts.
Edit: There are also alternatives like authelia that may be easier to implement. I don’t really trust most web apps to be ultra secure with internet-facing sign-in pages so it just feels like “good practice” to hide behind an auth service whose sole purpose is to be written and built securely. Plus once you learn how to set up fail2ban with an auth service, there will be no need to re-learn or re-implement it if you add a 2nd app/service. Very modular and makes testing and adding new things much easier.
Another benefit is that it has a nice GUI. I can look at logins, add services, stuff like that without touching config files which will be nice for those who don’t like wading through text files to change config.
I used several separate guides plus help from a friend. Check out space invader one’s YouTube channel. I’m not at my pc right now but I can gather some of the tutorials I used when I get back.
I kept the main domain open, but redirected it to a rickroll
SWAG reverse proxy with a custom domain+subdomain, protected by authentik and fail2ban. Easy access from anywhere once it’s set up. No vpn required, just type in the short subdomain.domain.com and sign in (or the app keeps me signed in)
Everyone uses smartphones. But to supplement the other good answers here, at some level of wealth, so much of your activities, interests and purchases are extended to secretaries, planners, asset managers, and otherwise individuals about whom you can claim “I’ve got a guy for that”, that tracking you as an individual becomes less effective.
Of course, nobody is immune just due to wealth and billionaires who use social media are tracked just like anyone else.
Alk@sh.itjust.worksto
Asklemmy@lemmy.ml•It's June 2025. What are you looking forward to in the next 6 months?
7·9 months agoI’m going to get my commercial drone license and start doing freelance work to supplement my main job that doesn’t pay too well. Very excited.
Before you give up, maybe also try either a USB network adapter or (if your PC has space) an actual network card. Some of those can be incredibly affordable.
Alk@sh.itjust.worksto
Fediverse@lemmy.world•LibreOffice: We still see people on the fediverse recommending OpenOffice, despite it having year-old unfixed security issuesEnglish
1·10 months agoI’ve always said “lihb ree” office in my head. (lib as in rib)
Alk@sh.itjust.worksto
Rss Feeds Recs@lemmy.world•XKCD has an excellent RSS feedEnglish
5·11 months agoI recently discovered this too, set it up with my FreshRSS server and haven’t missed a comic since.
They already did. We are the other universe.
Wouldn’t flatpak inherently be less likely to rip the system to shreds?
Alk@sh.itjust.worksto
Fediverse@lemmy.world•Are there any Lemmy/Mbin instances by women for women?English
76·11 months agoIt’s not niche being a woman obviously. What’s niche is having a community exclude 50% of the population. Nothing wrong with it, but it is niche.
Alk@sh.itjust.worksto
Selfhosted@lemmy.world•Why do I have a separate Jackett docker image every day?!English
11·1 year agoI’ve had the opposite experience. It all “just worked”. Try running unraid. It makes a lot of it so much easier.
Alk@sh.itjust.worksto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•*Permanently Deleted*English
1417·1 year agoTime to go to usenet.




Side note: if you want to run a dedicated server and play on it with a cracked version (or just an offline mode or while MS services are down) edit the server.properties file and set
online-mode=falsefrom true. (Then restart the server if it was online)This wipes everyone’s inventories if there was already progress, so have everyone put their items in a chest before doing this. If you use modded, have everyone unclaim their chunks or any other username-bound items like teleporters with permission systems.
All of this can be redone, reclaimed, re-bound after the change happens. This effectively changes your in-game identities on a server from a Microsoft one to an offline one. This also makes it possible to evade username-based bans.