To provision VMs yes, to configure them I think Ansible works best. But you can call Ansible from Terraform.
To provision VMs yes, to configure them I think Ansible works best. But you can call Ansible from Terraform.
I’d not be surprised if these attacks were linked to the recent lawsuits IA had to go through concerning copyright and such…
And energy dense too!
It also requires a literal village to run and maintain.
And that’s the problem, I don’t want to see a nuclear power plant managed by fucking Amazon or Google.
It’s probably both
You can use udev rules and systemd mount or AutoFs.
https://wiki.archlinux.org/title/Udev https://wiki.archlinux.org/title/Systemd#systemd.mount_-_mounting
If I remember correctly, it scans system files and replaces broken/corrupted ones. It can work on some issues, but it’s not a fix all thing.
Also try SFC /scannow
It was definitely a headache for me as well, but you need a guest agent (like vmwaretools or qemu-guest-agent), a cloud init ready template for the distro of your choice, a cloud init config file (network/user/vendor) and a custom SCSI/ide cloudinit cdrom mounted at boot on your VM. You also can find cloudinit logs on your VM to try and figure out what’s missing or what went wrong.
For reference, Apple currently has roughly 70 billion USD as cash on hands. 2.5 million USD is 0.0035% of their cash reserves.
If you have a yearly salary of 50k USD, that would be equivalent to losing 1.78 USD.
I am bad at math, so feel free to correct me if I’m wrong.
Another case that demonstrates they’ll always comply with the law in the end. You just need to make sure your laws and your legislation are rock solid.
“We should do something about this” - COPXX
If you buy three of them you can set up a Ceph cluster I suppose ahah. That would solve part of your issue of having storage and compute on the same node.
If you don’t need enterprise level hardware and support, I can suggest MinisForum. They released the MS01 fairly recently and I believe it fits your specs.
That’s the problem, if anyone somehow gets your root CA key, your encryption is pretty much gone and they can sign whatever they want with your CA.
It’s a lot of work to make sure it’s safe in a home setup.
I’m talking about home hosting and private keys. Not businesses with people whose full time job is to make sure everything runs fine.
I’m a nobody and I regularly have people/bots testing my router. I’m not monitoring my whole setup yet and if someone gets in I would probably not notice until it’s too late.
So hosting my own CA is a hassle and a security risk I’m not willing to put work into.
The domain certificate is public and its key is private? That’s basically it, if anyone gets access to your key, they can sign with your name and generate certificates without your knowledge. That’s my opinion and the main reason why I wouldn’t have a self hosted CA, maybe I’m wrong or misled, but it’s a lot of work to ensure everything is safe, only for a self hosted setup.
For self hosting at least, having your own CA is a pain in the ass to make sure everything is safe and that nobody except you has access to your CA root key.
I’m not saying it’s not doable, but it’s definitely a lot of work and potentially a big security risk if you’re not 100% certain of what you’re doing.
That sounds like a bad idea, you would need your CA and your root certs to be completely air gapped for it to be even remotely safe.
Oh shit, I was miserable back when I installed Arch. Dang, you might be onto something there!
Can’t wait for a Brexin and have them losing all the special treatment they used to have as members of the Union!