Step 1
Download macOS Installer (InstallAssistant.pkg
). Here is the link to Sonoma beta installer:
#!/bin/sh | |
print_usage() { | |
echo "usage: compress_video <input_file>" | |
echo "supported formats: mp4, webm, mkv, mov, avi, flv" | |
} | |
get_extension() { | |
f="${1##*/}" | |
case "$f" in |
Step 1
Download macOS Installer (InstallAssistant.pkg
). Here is the link to Sonoma beta installer:
Part of collection: Hyper-converged Homelab with Proxmox
15-04-2025: Seems Proxmox added this now to the GUI; see Using VirtioFS backed by CephFS for bind mounts how to use it.
Virtio-fs is a shared file system that lets virtual machines access a directory tree on the host. Unlike existing approaches, it is designed to offer local file system semantics and performance. The new virtiofsd-rs Rust daemon Proxmox 8 uses, is receiving the most attention for new feature development.
Performance is very good (while testing, almost the same as on the Proxmox host)
Out of the box, any M.2 NVMe SSDs connected to the Dell OptiPlex 3060 runs at PCIe Gen 2.0 speeds (Max 5 GT/s; 2 GB/s) so the speed tests look like this:
However, after this BIOS mod, the SSD can reach PCIe Gen 3.0 speeds (Max 8 GT/s; 3.9 GB/s) so the speed tests look like this:
This guide is intended for installing RetroNAS on an already configured Unraid server. If you're not familiar with Unraid or RetroNAS, head over to the RetroNAS GitHub page to learn about RetroNAS and consider setting it up on a Raspberry Pi.
Within Unraid, enable NFS by going to Settings
and NFS
.
Yes
Apply
# Here are some domains I block to interfere with DNS-over-HTTPS, so that my own DNS-based security schemes work. | |
# If you're going to be doing this, you should probably block all outbound 53, 853, and 5353 on your network, | |
# except from your own internal DNS resolver (eg. pihole) | |
# | |
# Data from https://github.com/curl/curl/wiki/DNS-over-HTTPS (and other places) | |
1a.ns.ozer.im | |
8888.google | |
aattwwss.duckdns.org | |
abel.waringer-atg.de |
There are at least two valid, signed TLS certificates that are bundled with publicly available Netgear device firmware.
These certificates are trusted by browsers on all platforms, but will surely be added to revocation lists shortly.
The firmware images that contained these certificates along with their private keys were publicly available for download through Netgear's support website, without authentication; thus anyone in the world could have retrieved these keys.