What was your reasoning for dumping pi-hole?
What was your reasoning for dumping pi-hole?
Do you encrypt the backups? I’m interested in learning more about this process.
I think that might be it. Almost like accessing a machine via a browser. Reminds of me Guacamole but I’m still not sure.
Pardon my ignorance, would this be comparable to something like Guacamole?
Another great article! I’m curious about the reasoning for using Debian on a Pi vs the Pi OS which is based off Debian?
Wireguard or Tailscale? I’ll be the only one ever to access my home network from outside my home.