The example model will be downloaded from HuggingFace.
[!IMPORTANT] this model isn't capable of working as an AI assistant, it's just for test purposes
The example model will be downloaded from HuggingFace.
[!IMPORTANT] this model isn't capable of working as an AI assistant, it's just for test purposes
https://huggingface.co/google/gemma-4-E4B
wget https://upload.wikimedia.org/wikipedia/commons/7/78/%22Arya%22_Cat_plays_with_Acalypha_indica-Pilangsari-2019.webm?download
python3 -m venv .venv
source .venv/bin/activateHost Open WebUI on your VPS and connect it to your PC to use local LLMs.
As an alterantive to Open WebUI you can consider Kurczak, which is simplified, lightweight UI for Ollama I've made.
+ --------------------- + + ---------------- +
| Ollama API (PC) | <==== WireGuard VPN tunnel =====> | Open WebUI (VPS) |
| http://10.0.0.2:11434 | 10.0.0.0/24 | 10.0.0.1 |
Modern(er) version of https://infosec.mozilla.org/guidelines/openssh configuration, including post-quantum algorithms.
Example usage:
./sshd_hardening.sh | tee /etc/ssh/sshd_config.d/sshd_hardening.conf
rc-service sshd restart || service sshd restart || systemctl restart sshCheck the current runtime sshd config to make sure that the hardening is effective:
Using the Rescue environment, we can mount or partition the VM disk.
Let's say the VM disk is "/dev/vda". It's recommended to wipe the disk before continuing with wipefs -a /dev/vda
Rescue environments usually have limited disk space, so we copy the disk image via SSH
and use dd to directly write it to the VM disk.
The cloud image doesn't have a password set by default, which prevents us from logging in. Therefore, we must first prepare the image by mounting it locally and setting a password inside chroot.
All you need to know in one place.
Table of contents:
TL;DR: This extension for Chrome and Brave is malicious, do not use it.
(Update) A follow up story by Wladimir Palant: https://palant.info/2024/10/30/the-karma-connection-in-chrome-web-store/
(Update 2024-11-11) The extension has been removed from CWS and marked as violating Chrome Web Store policies (which is good, but odd, as it should be marked as malware)