33 years old Web Engineer, Frenchman living in the UK married to an Italian. Papa to a multilingual baby.
nice, my wallet thanks you :)
Thanks, I’ve got that setup in an evening on a machine that wasn’t doing anything, with unraid as an OS.
It works beautifully and the quality of content and speed (100MB/s always !!!) of the usenet servers are just amazing.
So landed on OS - Unraid Getting TV Shows - Sonarr (as Docker app) Indexer - NZBGeek Usenet server - Eweka Getter - NZBGet Streaming platform - Plex
I’ll add Radarr at some point but I just don’t watch that many movies. Might looks into books and scans of mangas though. Thanks anyway.
/remind me 1 year
More seriously though, only time will tell
I’ll go against all the comment here and say yes. It looks like apple is delivering a fantastic piece of hardware, and some basic solid features software wise. But the price point also means the user base will be more likely to buy expensive applications, compared to say the Quest. Some predictions
And at some point, Samsung, Google, and possibly maybe chinese constructers etc. will come up with their android based alternative. Starting as cheaper / not as good, and slowly catching up and building new features. “Samsung vision, gaming oriented with tracked controllers included”, “Pixel Vision, that integrates with your full suit of google products and give you great quality for less price” etc.
Wrong community, there is nothing mild about this
Holy Cow that’s a good guide, thanks for this.
Thanks, I’ll have a look over all that over the weekend.
Oh nice, I had a seedbox some years ago but at the time it was fairly manual still. Stopped it the day I accidentally run a rm -rf /
instead of rm -rf ./
(yeah that happens in real life!). I’ll have a look to see if I can find a hand free option or at the very least add the combination of Sonarr and nzb360 myself, thanks
I planned on exporting a web version as well and I was testing there first hence the issue.
How would this allow any website to impersonate you though? The login is made via a jwt which would not be accessible if you go in another website. If I login on mysuperlemmyclient.com and then visit maliciouswebsite.com, how can maliciouswebsite access the jwt that is stored likely in a cookie of mysuperlemmyclient.com?