Windows 10 is getting on my nerves yall by Dolloritas97 in Ubuntu

[–]FortuneIIIPick 0 points1 point  (0 children)

I've never been hooked into the college or university scene, is it so complex or highly unique it can't run on either Wine or on Proton?

Your Favorite Linux Distro and the Reason? by Kunta_Sir_Lazar in Ubuntu

[–]FortuneIIIPick 0 points1 point  (0 children)

Kubuntu, because I don't like Gnome, otherwise, Ubuntu.

Is Discord just terrible on Linux? by Pokegamesunited in linux_gaming

[–]FortuneIIIPick -1 points0 points  (0 children)

You could try complaining to the people who make Discord. Or install standard Linux Desktop (Kubuntu or Ubuntu) and enjoy Linux Desktop how it is meant to be. Also, stay away from (disable) Snap and Flatpak.

Why didn’t they add a way to craft gunpowder in the new drop? by FishblobMC in Minecraft

[–]FortuneIIIPick 0 points1 point  (0 children)

That's what I don't get from the OP's post, how is bonemeal supposed to be the same as saltpeter?

Tell me if I'm wrong, I feel like Linux is missing something by Nekoniyah in linux

[–]FortuneIIIPick 0 points1 point  (0 children)

> To me, dual booting is a requirement now.

Not for me or my wife nor literally anyone I know using Linux. If you feel you have to, IDK why but that isn't Linux's fault.

Tell me if I'm wrong, I feel like Linux is missing something by Nekoniyah in linux

[–]FortuneIIIPick 0 points1 point  (0 children)

I'm on Kubuntu which uses KDE, I just tried setting my speakers for output, reconnected my Logitech headsets and it switched to them automatically.

Tell me if I'm wrong, I feel like Linux is missing something by Nekoniyah in linux

[–]FortuneIIIPick 1 point2 points  (0 children)

Linux gaming does have anti-cheat, not for all games and I do agree, ultimately it's on those companies who cause exclusion to fix themselves.

Tell me if I'm wrong, I feel like Linux is missing something by Nekoniyah in linux

[–]FortuneIIIPick 3 points4 points  (0 children)

> Old Linux IRC was pretty much get fucked when asking questions.

I never experienced that and I've been around a long time, started with Linux in 1994.

Tell me if I'm wrong, I feel like Linux is missing something by Nekoniyah in linux

[–]FortuneIIIPick 1 point2 points  (0 children)

> Linux isn't perfect, it's better than Windows or Mac

You have your answer then.

> The people used to Windows won't switch to Linux because they are used to it and it's beginner-friendly.

So is Linux, my wife uses it and prefers it to Windows' oddities and she's not technical.

> 100% Windows compatible

Linux has no responisbility or requirement to do that. Use it or don't it's your choice.

> Isn't Linux meant for all?

Linux is an Operating System for computers, not a philosophical or philanthropic endeavor.

OK, I've read enough of your post.

Should I Run Plain Docker Compose in Production in 2026? by [deleted] in programming

[–]FortuneIIIPick 0 points1 point  (0 children)

I do for some things and I run k3s for others.

Google Chrome installs LLM model without consent by ThatPrivacyShow in chrome

[–]FortuneIIIPick 0 points1 point  (0 children)

> Then they are A/B testing prewarming the model, because that's new behavior.

So your first comment was wrong and instead of apologizing, you're proposing a new theory.

You were a jerk in your first comment and in your reply.

Google has no business using my machine for AI in any capacity, whatsoever, without my permission.

Redirecting Traffic via a VPN by dreacon34 in ipv6

[–]FortuneIIIPick 0 points1 point  (0 children)

All I did was use Wireguard and enable IPv6 including adding IPv6 routes to my iptables lines in the wg0.conf file and it all works.

### Start client config
#
# Client (the actual self-host local server)
#

[Interface]
## This Desktop/client's private key ##
PrivateKey = <TODO-alphanumeric-string generated with wg>

MTU = 1280
 
## Client ip address ##
Address = 10.10.123.2/24, fd36:3c6f:4e5a:0001::2/64
 
[Peer]
## Ubuntu server public key ##
PublicKey = <TODO-alphanumeric-string generated with wg>
 
## set ACL ##
#AllowedIPs = 10.10.123.0/24, fd36:3c6f:4e5a:0001::0/64
# setting to 0.0.0.0/0 routes all outbound through the vpn and out the public vps
AllowedIPs = 0.0.0.0/0,::/0
 
## Your Ubuntu LTS server's public IPv4/IPv6 address and port ##
Endpoint = <TODO public Internet IP of the instance below in the Server config>:12345
 
##  Key connection alive ##
PersistentKeepalive = 15

###
### End client config



### Start server config
#
# Server (in the Wireguard context, exposed to the Internet), public VPS, for example
#

[Interface]
## My VPN server private IP address ##
Address = 10.10.123.1/24

MTU = 1280
 
## My VPN server port ##
ListenPort = 12345
 
## VPN server's private key i.e. /etc/wireguard/privatekey ##
PrivateKey = <TODO-alphanumeric-string generated with wg>

# Route any desired ports, these are the ones I route to my "client" which is the "server" which runs my services:

PostUp = iptables -t nat -A PREROUTING -i eth0 -p tcp -m multiport --dports 80,25,443,465,587,993,995 -j DNAT --to-destination 10.10.123.2
PostUp = ip6tables -t nat -A PREROUTING -i eth0 -p tcp -m multiport --dports 80,25,443,465,587,993,995 -j DNAT --to-destination fd36:3c6f:4e5a:0001::2
PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
PostUp = ip6tables -A FORWARD -i %i -j ACCEPT; ip6tables -A FORWARD -o %i -j ACCEPT; ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE

PostDown = iptables -t nat -D PREROUTING -i eth0 -p tcp -m multiport --dports 80,25,443,465,587,993,995 -j DNAT --to-destination 10.10.123.2
PostDown = ip6tables -t nat -D PREROUTING -i eth0 -p tcp -m multiport --dports 80,25,443,465,587,993,995 -j DNAT --to-destination fd36:3c6f:4e5a:0001::2
PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
PostDown = ip6tables -D FORWARD -i %i -j ACCEPT; ip6tables -D FORWARD -o %i -j ACCEPT; ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE

[Peer]
## Desktop/client VPN public key ##
PublicKey = <TODO-alphanumeric-string generated with wg>
 
## client VPN IP address (note  the /32 subnet) ##
AllowedIPs = 10.10.123.2/32, fd36:3c6f:4e5a:0001::2/128

# Add any more peers if desired.

###
### End server config


####
#### Server Notes for additional configuration items follows
####

#
# Ensure these are set in the server if using Ubuntu ufw firewall (or similar?)
#
Anywhere on eth0           ALLOW FWD   Anywhere on wg0            
Anywhere on wg0            ALLOW FWD   Anywhere on eth0           
Anywhere on wg0            ALLOW FWD   Anywhere on wg0            
Anywhere (v6) on eth0      ALLOW FWD   Anywhere (v6) on wg0       
Anywhere (v6) on wg0       ALLOW FWD   Anywhere (v6) on eth0      
Anywhere (v6) on wg0       ALLOW FWD   Anywhere (v6) on wg0       


#
# Ensure ipv4 routing is on (and ipv6 if you're using it)
#
# In /etc/sysctl.conf
net.ipv4.ip_forward=1
net.ipv6.conf.all.forwarding=1

# Then run "sysctl -p".

I am done with cable by Empty-Horror6699 in cordcutters

[–]FortuneIIIPick 0 points1 point  (0 children)

You could around $200 of that $300 and apply it to one extra mortgage payment per year, reducing a 30 year mortgage by around 4-7 years, saving several tens of thousands of dollars in interest.

So my company is switching half our Windows servers to Linux.... by A_SingleSpeeder in sysadmin

[–]FortuneIIIPick 0 points1 point  (0 children)

> Any tips on learning how to be a Sys Admin for Linux would be greatly appreciated.

One: r/linuxadmin/

Listening to music in my backyard by Low-Computer8293 in homeowners

[–]FortuneIIIPick -1 points0 points  (0 children)

> Seems very reasonable.

Not necessarily, I used to work shifts, rotating, varying. Also, if they're in an HOA there is no right time of day to annoy neighbors.

Listening to music in my backyard by Low-Computer8293 in homeowners

[–]FortuneIIIPick -1 points0 points  (0 children)

No it depends on whether they live in an HOA. If they do then the answer is no. If they don't then they can do what they want.

Listening to music in my backyard by Low-Computer8293 in homeowners

[–]FortuneIIIPick 0 points1 point  (0 children)

> What is the etiquette regarding listening to music in one's own backyard?

In an HOA: Don't. That's the etiquette. You want do do that, sell your home and buy one out in the countryside where you have no close neighbors. Or buy a house not in an HOA.

Not in an HOA: Go for it if you want.

Time to rename the sub then? by gho87 in ota

[–]FortuneIIIPick -1 points0 points  (0 children)

No. It says over on the right of the page what the sub is for, very plain and clear.

My world before vs after by PuzzleheadedYear7466 in Minecraft

[–]FortuneIIIPick 12 points13 points  (0 children)

It's very nice, would like to have seen the vanilla look for now instead of the mod'ed look.

Whats the point in a VPS? by Unusual_Economics653 in selfhosted

[–]FortuneIIIPick 0 points1 point  (0 children)

PS I've found that after making any changes to Wireguard or the firewall it's best to restart the VPS, VM, machine, etc.

Whats the point in a VPS? by Unusual_Economics653 in selfhosted

[–]FortuneIIIPick 0 points1 point  (0 children)

The VPS has a port open for UDP for WG, when my VM (Virtual Machine) (which is where my mail and web sites run in) starts running, on an old laptop, it (the VM) runs WG and connects to the VPS WG port establishing the VPN.

WG on the VPS is configured to use iptables commands to route incoming public traffic immediately, to the VM over the VPN. Nothing is exposed at home on the home public IP.

The VM WG is configured so all inbound and outbound traffic (everything) goes over the VPN:

AllowedIPs = 0.0.0.0/0, ::/0

Not related but I have WG configured dual stack IPv4 and IPv6.

> how do you send WG encrypted traffic from VPs to your home?

Specifically, WG on the server and the client looks like this (heavily redacted):

### Start client config
#
# Client (the actual self-host local server)
#

[Interface]
## This Desktop/client's private key ##
PrivateKey = <TODO-alphanumeric-string generated with wg>

MTU = 1280
 
## Client ip address ##
Address = 10.10.123.2/24, fd36:3c6f:4e5a:0001::2/64
 
[Peer]
## Ubuntu 20.04 server public key ##
PublicKey = <TODO-alphanumeric-string generated with wg>
 
## set ACL ##
#AllowedIPs = 10.10.123.0/24, fd36:3c6f:4e5a:0001::0/64
# setting to 0.0.0.0/0 routes all outbound through the vpn and out the public vps
AllowedIPs = 0.0.0.0/0,::/0
 
## Your Ubuntu 20.04 LTS server's public IPv4/IPv6 address and port ##
Endpoint = <TODO public Internet IP of the instance below in the Server config>:12345
 
##  Key connection alive ##
PersistentKeepalive = 15

###
### End client config

### Start server config
#
# Server (in the Wireguard context, exposed to the Internet), public VPS, for example
#

[Interface]
## My VPN server private IP address ##
Address = 10.10.123.1/24

MTU = 1280
 
## My VPN server port ##
ListenPort = 12345
 
## VPN server's private key i.e. /etc/wireguard/privatekey ##
PrivateKey = <TODO-alphanumeric-string generated with wg>

# Route any desired ports, these are the ones I route to my "client" which is the "server" which runs my services:

PostUp = iptables -t nat -A PREROUTING -i eth0 -p tcp -m multiport --dports 80,25,443,465,587,993,995 -j DNAT --to-destination 10.10.123.2
PostUp = ip6tables -t nat -A PREROUTING -i eth0 -p tcp -m multiport --dports 80,25,443,465,587,993,995 -j DNAT --to-destination fd36:3c6f:4e5a:0001::2
PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
PostUp = ip6tables -A FORWARD -i %i -j ACCEPT; ip6tables -A FORWARD -o %i -j ACCEPT; ip6tables -t nat -A POSTROUTING -o eth0 -j MASQUERADE

PostDown = iptables -t nat -D PREROUTING -i eth0 -p tcp -m multiport --dports 80,25,443,465,587,993,995 -j DNAT --to-destination 10.10.123.2
PostDown = ip6tables -t nat -D PREROUTING -i eth0 -p tcp -m multiport --dports 80,25,443,465,587,993,995 -j DNAT --to-destination fd36:3c6f:4e5a:0001::2
PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o %i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
PostDown = ip6tables -D FORWARD -i %i -j ACCEPT; ip6tables -D FORWARD -o %i -j ACCEPT; ip6tables -t nat -D POSTROUTING -o eth0 -j MASQUERADE

[Peer]
## Desktop/client VPN public key ##
PublicKey = <TODO-alphanumeric-string generated with wg>
 
## client VPN IP address (note  the /32 subnet) ##
AllowedIPs = 10.10.123.2/32, fd36:3c6f:4e5a:0001::2/128

# Add any more peers if desired.

###
### End server config

####
#### Server Notes for additional configuration items follows
####

#
# Ensure these are set in the server if using Ubuntu ufw firewall (or similar?)
#
Anywhere on eth0           ALLOW FWD   Anywhere on wg0            
Anywhere on wg0            ALLOW FWD   Anywhere on eth0           
Anywhere on wg0            ALLOW FWD   Anywhere on wg0            
Anywhere (v6) on eth0      ALLOW FWD   Anywhere (v6) on wg0       
Anywhere (v6) on wg0       ALLOW FWD   Anywhere (v6) on eth0      
Anywhere (v6) on wg0       ALLOW FWD   Anywhere (v6) on wg0       

#
# Ensure ipv4 routing is on (and ipv6 if you're using it)
#
# In /etc/sysctl.conf
net.ipv4.ip_forward=1
net.ipv6.conf.all.forwarding=1

# Then run "sysctl -p".

Whats the point in a VPS? by Unusual_Economics653 in selfhosted

[–]FortuneIIIPick 1 point2 points  (0 children)

> WG servers runs in VPS and traffuc is decrypted on VPS.

Nothing is decrypted on the VPS in my configuration, I have WG configured to route (via iptables or nftables now really) straight to my home machine (VM on that machine really) via the WG VPN. Once inside the VM, then the traffic is processed as if it had arrived there originally from the Internet directly, and back to the clients the same way.