What was your reasoning for dumping pi-hole?
What was your reasoning for dumping pi-hole?
Do you encrypt the backups? I’m interested in learning more about this process.
I think that might be it. Almost like accessing a machine via a browser. Reminds of me Guacamole but I’m still not sure.
Pardon my ignorance, would this be comparable to something like Guacamole?
Why? whats wrong with focusing on a specific audience?
Hmm. I’m not sure what you are trying to debate, /u/ElevenNotes. OP wrote a damn good guide, and looking at their other work - they are doing a great job at contributing to this community. Their post was also featured in the weekly newsletter over at selfh.st. This is a hobby sub with a contributing community. I urge you to treat it like one.
I don’t see the contradiction. /u/KillerTic wrote about A linux distro, Debian, and wrote a how-to guide for said distro. Just because Alpine didn’t work out for them, doesn’t mean that they can’t write an article about Debian.
I encourage you to actually read the article IF you are interested in learning about installing Debian. Not to mention, the writer clearly states this right up front.
I want to make it clear that I’m not a Linux expert or administrator; everything I’ve learned has been self-taught. The same applies to security practices.
If you happen to identify any issues or have valuable tips and advice, I welcome your input. I’m continually seeking ways to improve, and I’ll maintain a change log at the bottom of this article to track any updates and enhancements.
Another great article! I’m curious about the reasoning for using Debian on a Pi vs the Pi OS which is based off Debian?
Wireguard or Tailscale? I’ll be the only one ever to access my home network from outside my home.