linux

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

12510198, in What's your favorite music player on Linux?

Dolphin + mpv for me so I can see the album covers and metadata and see whats available, if I have a specific song in mind, then ill just use the terminal and mpv.

danielfgom, in Friendly reminder
@danielfgom@lemmy.world avatar

Definitely. I use Timeshift on Linux Mint Debian Edition and set it to take weekly snapshots. Saved my bacon about 2 weeks ago when a kernel update borked my system.

Cwilliams, in What's your favorite music player on Linux?

I used to download my music with NewPipe and listen to it on Musicolet, but since then, i just gave up and got a cracked spotify client

ebd6a8c9051028dc1607, in How do I have Japanese fonts displayed in Fedora?

you can you this as a reference wiki.archlinux.org/title/…/Simplified_Chinese#Chi… . although it is for chinese, but you can take the font config of it and reorder it (put Noto Sans CJK JP at first)

cetvrti_magi, in What's your favorite music player on Linux?
@cetvrti_magi@lemmy.world avatar

Couldn’t find any that works for me. At the moment I just play my music in mpv from terminal.

optimal, in Flakes aren't real and cannot hurt you: a guide to using Nix flakes the non-flake way
@optimal@lemmy.blahaj.zone avatar

Guix is so good that it doesn’t need flakes

Atemu,
@Atemu@lemmy.ml avatar

How do you compose Guix projects?

clubb, in What's your favorite music player on Linux?
@clubb@lemmy.world avatar

I just really love mplayer

savbran, in What's your favorite music player on Linux?

Considering that I’m using Emby (selfhost), it’s able to manage my music collection too and I can play the music from the web player exposed by it.

Hellmo_Luciferrari,

Why emby over jellyfin if I may ask

savbran, (edited )

Stability and configuration options. I already used Jellyfin but for me is not stable. It often crashes and configuration options are a mess at the moment.

Hellmo_Luciferrari,

That’s fair, I haven’t ever given Emby a shot, and wanted to hear what may have drawn someone to emby over jf. Thank you

000, in What's your favorite music player on Linux?

Plexamp all the way, easily the sexiest music player I’ve found so far. All my music is FLAC pulled from Deezer, and since I’ve got a very large list of artists tracked, it’s super easy to discover new music with the radio and sonic analysis features. It’s also got a last.fm integration, which gives me more data than Spotify would about my listening habits.

The only feature I’m really missing in it is collaborative playlists. I can share playlists out to anyone on my Plex server, but they can’t add or remove songs.

wahming, in Thoughts on this?

My eyes…

kusivittula, in What's your favorite music player on Linux?

i use foobar because i can’t live without dolby headphone

minimalfootprint, (edited ) in Friendly reminder

Neat little guide (Arch, systemd) to set up automatic snapshots when you run a pacman/yay update and the option to chose snapshots in grub during startup. Really useful.

Reddfugee42, in Thoughts on this?

90ies

Ninety-ies?

orcrist, in Linux tablet?

If the main thing is PDF reading, buy an Android tablet. Of course research which one.

0xtero, (edited ) in Is it actually dangerous to run Firefox as root?

I regularly remote into in order to manage, usually logged into KDE Plasma as root. Usually they just have several command line windows and a file manager open (I personally just find it more convenient to use the command line from a remote desktop instead of directly SSH-ing into the system)

I’m not going to judge you (too much), it’s your system, but that’s unnecessarily risky setup. You should never need to logon to root desktop like that, even for convenience reasons.

I hope this is done over VPN and that you have 2FA configured on the VPN endpoint? Please don’t tell me it’s just portforward directly to a VNC running on the servers or something similar because then you have bigger problems than just random ‘oops’.

I do also remember using the browser in my main server to figure out how to set up the PiHole

To be honest, you’re most probably OK - malicious ad campaigns are normally not running 24/7 globally. Chances of you randomly tumbling into a malicious drive-by exploit are quite small (normally they redirect you to install fake addons/updates etc), but of course its hard to tell because you don’t remember what sites you visited. Since most of this has gone through PiHole filters, I’d say there’s even smaller chance to get insta-pwned.

But have a look at browser history on the affected root accounts, the sites along with timestamps should be there. You can also examine your system logs and correlate events to your browser history, look for weird login events or anything that doesn’t look like “normal usage”. You can set up some network monitoring stuff (like SecurityOnion) on your routers SPAN, if you’re really paranoid and try to see if there’s any anomalous connections when you’re not using the system. You could also consider setting up ClamAV and doing a scan.

You’re probably OK and that’s just paranoia.

But… having mentioned paranoia… now you’ll always have that nagging lack of trust in your system that won’t go away. I can’t speak to how you deal with that, because it’s all about your own risk appetite and threat model.

Since these are home systems the potential monetary damage from downtime and re-install isn’t huge, so personally I’d just take the hit and wipe/reinstall. I’d learn from my mistakes and build it all up again with better routines and hygiene. But that’s what I’d do. You might choose to do something else and that might be OK too.

HiddenLayer5,
@HiddenLayer5@lemmy.ml avatar

I hope this is done over VPN and that you have 2FA configured on the VPN endpoint? Please don’t tell me it’s just portforward directly to a VNC running on the servers or something similar because then you have bigger problems than just random ‘oops’.

I have never accessed any of my servers from the internet and haven’t even adjusted my router firewall settings to allow this. I kept wanting to but never got around to it.

Since these are home systems the potential monetary damage from downtime and re-install isn’t huge, so personally I’d just take the hit and wipe/reinstall. I’d learn from my mistakes and build it all up again with better routines and hygiene. But that’s what I’d do.

Yeah this and other comments have convinced me to reinstall and start from scratch. Will be super annoying to set everything back up but I am indeed paranoid.

amju_wolf,
@amju_wolf@pawb.social avatar

I have never accessed any of my servers from the internet and haven’t even adjusted my router firewall settings to allow this. I kept wanting to but never got around to it.

Does that mean you realistically don’t even know your network (router) setup? Because it’s entirely possible your machine is completely open to the internet - say, thanks to IPv6 autoconfiguration - and you wouldn’t even know about it.

It’s pretty unlikely but could potentially happen with some ISPs. Please always set up a firewall, especially for a server type machine. It’s really simple to block incoming outside traffic.

HiddenLayer5, (edited )
@HiddenLayer5@lemmy.ml avatar

Huh. I never even thought of that. I use my ISP’s router in bridge mode and have my own router running on mostly default settings, IIRC the only thing I explicitly changed was to have it forward DNS requests to my Pihole. I should inspect the settings more closely or as you said just configure the server to block the relevant ports from outside the LAN. Thank you.

amju_wolf,
@amju_wolf@pawb.social avatar

Oh if you even have your own router then have a firewall (primarily) there, and simply block every incoming forward connection except the ones you actually want (probably forwarded to your server). Similarly even for the router input rules you likely need only ICMP and not much else.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #