In that case, this seems pretty reasonable – disclaimer: I can’t personally attest to the effectiveness of this
- 10 Posts
- 85 Comments
Inform them of their rights: https://www.ilrc.org/red-cards-tarjetas-rojas#item-4476
tapdattl@lemmy.worldto Selfhosted@lemmy.world•CalDAV Server Without Exposing Server?English14·2 months agoI think the general consensus for homelabbers is a mesh network – Tailscale and Netbird are the two most popular options
tapdattl@lemmy.worldOPto Golang@programming.dev•Are code reviews allowed? I wrote a pretty basic RBAC module while working on a separate learning project and was hoping to get the opinion of more experienced Gophers1·2 months agoThat’s a bingo! Yeah I decided to dip my toes into Go by writing a simple library on a topic I was learning about
tapdattl@lemmy.worldOPto Golang@programming.dev•Are code reviews allowed? I wrote a pretty basic RBAC module while working on a separate learning project and was hoping to get the opinion of more experienced Gophers2·2 months agoI don’t think libraries should log by default
That’s a fair point, interfaces are still a concept that boggle my mind a bit, but maybe this is the problem that will help me actually grasp them. Thanks!
tapdattl@lemmy.worldOPto Golang@programming.dev•Are code reviews allowed? I wrote a pretty basic RBAC module while working on a separate learning project and was hoping to get the opinion of more experienced Gophers2·2 months agothere’s no explanation of what this is supposed to do.
Totally right, sorry about that, I’ll update the Github, but it brief this is a library that’s supposed to help a developer set up a Role Based Access Control system for an API for web service. Role Based Access Control is a method of access control whereby (And this is my very beginner’s understanding of it) users are assigned roles, and these roles are in turn issued different permissions based off what that role is supposed to have access to. When checking if a user is authorized access to a certain resource, the roles assigned to them are checked for the permissions needed for the resource. If they have permission then they are granted access to the resource, otherwise they are denied access.
This library manages roles, permissions assigned to roles, and checking of permissions against roles via an http middleware.
Then, there’s no main function. Where’s the entry point? This is a bit where I’m doubting myself now. Maybe go has changed, but when I was writing it, it requires a main function to even run.
Well, this is supposed to be a library that’s used by other people, so it has no main function itself, rather it’s called by other people
tapdattl@lemmy.worldto Opensource@programming.dev•15 Best Free and Open Source Web Project Management Software2·2 months agoI’ll save you 2 clicks :
Web Project Management Odoo : Suite of open-source business apps written in Python OpenProject: Collaborative Project Management Wekan: Trello-like Kanban Focalboard : Self-hosted project management tool Taiga: Web-based tool for agile project management Kanboard: Kanban board for small teams and individuals tuleap: Improve management of software development and collaboration eGroupWare : Enterprise ready web-based groupware suite with project management Redmine: Flexible application written using the Ruby on Rails framework LibrePlan: Project planning, monitoring and control Trac : Project management and bug/issue tracking system Leantime : Project management for the non-project manager Scrumlens: Agile retrospective tool dotProject: Web-based, multi-user, multi-language project management application TaskBoard: Kanban-inspired app for keeping track of things
I just wish I had done something absurd like sport a bright pink mohawk at some point before going bald 😂
Lol “Ukraine’s war against Russia” get the fuck out of here you punk ass shill
How about instead of restricting use of the software, adding in a clause that states "Use of this software is a formal acknowledgement and agreement by the user that race and gender are a social construct, gender identity and sexual orientation is a spectrum, humans can not be illegal,… " etc.
Thus use of the software is not restricted and is still open source, but forces groups, organizations, and people who disagree with the above to acknowledge something counter to their system of power.
tapdattl@lemmy.worldto Keep Track@lemmy.world•2/7/2025 - Trump says he's ending Biden's classified intelligence briefings in payback moveEnglish5·3 months ago“Nobody ever called me for advice” --Trump, probably
tapdattl@lemmy.worldto Selfhosted@lemmy.world•Interesting media, podcasts, shows, blogs on topic of self-hosting you like?English4·3 months agoThe Homelab Show was a good one, though they haven’t posted a new podcast in almost a year. Lawrence Systems and Learn Linux TV are the makers of it and have their own content as well
I just saw a video on Pangolin which is, essentially, a self hosted version of what cloudflare tunnels provide. I have absolutely no experience with it, just saw a video on YT, but it might be the solution you’re looking for
Correct, the hard disk in the laptop can not be read. This is where having a good backup strategy is important. Similar to how if your hard disk dies you’re no longer able to access the material on the hard disk. For me, the downsides of encryption do not outweigh the benefits of having my data secure.
I enabled full disk encryption during OS installation, set up a secure passphrase, and then set up automated encrypted backups to my home server, which are automatically backed up to a remote server.
I gain peace of mind in knowing that if my laptop is stolen I’m only out the cost of the laptop, the data within is still safe and secure.
- harddrives can be corrupted, too. That’s where backups come in
- True, though one could use a security key or password manager to overcome that, or setup secure boot/TPM to where a password isn’t actually needed. If all else fails, again, backups.
What are the downsides to encryption? Though you may have negligible benefits, if there are also negligible downsides then the more secure option should be chosen.
tapdattl@lemmy.worldto Today I Learned@lemmy.world•TiL someone really named their child Harry Cox.English61·4 months agoHarry Cox, son of Dick Cox
That would be if his name was Richard, not Robert
tapdattl@lemmy.worldto Programming@programming.dev•Goodbye SASS, welcome back native CSS19·4 months agoHe did
[…] Why does the radius need to be reactive? What do you stand to gain over just setting to like 3 or 4px and moving on with your life?
Junior webdev points
AKA you gain nothing.
tapdattl@lemmy.worldto Selfhosted@lemmy.world•What are your Homelab goals for 2025?English1·4 months agoWhat’s your solution? PiHole? The thing I don’t like about the PiHole is the lack of wildcard domain rewrites. I’ve been playing with AdGuard Home and Unbound, not sure what my final solution will be, though.
FreeIPA and Keycloak will give you directory management (LDAP and Kerberos), identity management, and single-sign on (OIDC and SAML) which if all your computers are running Linux as well, will give you centralized management of users.
You can then set other FOSS business management/productivity applications like NextCloud, Oodoo, Seafile, OnlyOffice, LibreOffice, CryptPad, etc. To use Keycloak as its authentication mechanism.
A lot of this will depend on what kind of work the business does.
You’ll also want to look into log management and SEIM for security monitoring, Wazuh, Graylog, and others. This is especially true if the business has any data compliancy responsibilities in the country this is in.