[0x3b0b]Most of my domains are on porkbun, one on Infomaniak and one that I think I haven't moved off Godaddy because I couldn't find anywhere else I was happy with to put it.
AramZS, kody, tPoltergeist, mahboubine, lazcorp, geoffo, [Joe_Crawford], bterry, jonnybarnes, [benatwork] and [Al_Abut] joined the channel
[Al_Abut]My first gigs were in academia and I picked up an entire book on home pages by Jakob Nielsen because I needed strategies and coping mechanisms for the entire org clamoring for space on the department’s main pages. It’s like the digital version of waterfront property that everyone wants a piece of real estate.
to2dsA typical website nowadays mystifies you with the cookie pop-up gauntlet, dazzles you with glitz and bling, all without coughing up the actual information you sought in the first place 🤔
starrwulfeHey @snarfed, did you take down Bluesky crossposting temporarily? I'm getting `500 Internal Errors` on http: brid.gy/publish/bluesky and also whenever using the API token directly.
starrwulfe!tell snarfed please check `@starrwulfe.xyz` bluesky crossposting logs for publish errors -- not sure if this is just my account or a widespread issue.
_tommysare there any guides out there about running a self-hosted web server on my own network with security in mind/at the forefront? I'm interested in making a raspberry pi Apache server for serving my website(s) but I am a bit concerned about it being a wide open vector of attack to my home network
superkuhThe most secure thing is just to use .html and other files. If you don't involve a dynamic scripting language or complex backend you'll never have trouble.
superkuhJust forward router port:80 to internal.ip.address.whatever:80 (and 443). That's the only route. Remote exploits for apache or nginx are extremely few and far between, like decade+.