drummer86

@drummer86@mastodon.stickbear.me

Hello. I am a totally blind tech nerd, in both my personal and professional lives.
I enjoy tinkering with computer software and hardware, coding, databases, client/server administration, diagnostics and technical support, and all the rest of that jazz.
Professionally, I administrate servers around the globe for database and web application hosting, VoIP telephony and amateur radio communications. I also do backend database administration and web application programming.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

drummer86, to random

It looks like a bunch of elements on the Mastodon Explore page are returning 404 when loaded via the VPN reverse proxy, but work fine when loaded using the local reverse proxy. Something tells me its an access issue, where in the Puma webserver is not returning files since it is not recognizing the IP of the VPN reverse proxy. It is a 10.XXX address, and not the expected 127.0.0.1 address. But I thought I dealt with that using the environment variables. I'm all kinds of confused. I think its time to take a break for now. I'm just not sure if it should be a coffee break, or a sleep break, LOL.

drummer86,

@seedy Yes, I am attempting to get Glitch-soc working. And it seems to work behind the local Nginx reverse proxy, but not when connected to the VPN, and reverse proxied back from it.

drummer86, to random

So apparently, Subway can toast my Italian Herbs and Chese bread, but they're sold out of the ability to grill it. And grilling bread? Huh? What's Subway and Uber Eats smoking anyway? LOL.

drummer86, to random

LOL. I just got an email from Dominos tell me not to let my points go to waste. I have those? I wouldn't have guessed. And yes, I'll be letting them go to waste, LOL. Dominos hasn't been good in at least twenty plus years. The local ma-and-pa shops around here are at least a thousand times better.

JamminJerry, to random
@JamminJerry@mastodon.stickbear.me avatar

quick question for my IPhone friends out there. looking at upgrading my IPhone 11 to a 15 plus. I don't have, or use a mac. is there a simple way I can copy what is on my IPhone 11 to my IPhone 15 with everythig configured, and such? I haven't used ITunes on windows in so long, I wouldn't even remember what to do. lol. it would be nice if I could just touch the phones together or something.

drummer86,

@JamminJerry Or if you use a password manager, that is good at logging you back into things as well.

drummer86, to random

Hey @Bri I was wondering, if I purchase BNT, is it licensed per machine or per human? I'm assuming the former. In this case, I'd imagine I would have to purchase a separate license for each of my Windows boxes?

drummer86,

@Bri Awesome stuff! You rock! Thanks for all you do. You shall be receiving an order for BNT very shortly.

drummer86,

@Bri Thanks for the extremely prompt response with the key. i'm all registered and its working like a breeze. Very much enjoy it. Was curious though, are there any plans or possibilities of allowing system processes to be allowed to be toggled on and off? If so, that would be awesome. If not, due to some Windows restriction, the question is do the resource counters account for all process CPU/memory usage, or just the user sandbox?

drummer86,

@Bri Ah ok, had a feeling like that. probably can't do anything without admin privs. Its still a very useful little program. Very much appreciated.

drummer86, to random

I had a long nap, and the water is back on. Turns out it was not the fault of the complex, apparently, it was an emergency shutoff by the city. Doesn't really excuse nor justify lack of notification, but explains it.

drummer86, to random

Natural-born liars and cheats are the scum of the Earth. And they know who they are.

drummer86, to random

So far, I'm definitely liking FusionPBX way more than FreePBX, and by extension, IncrediblePBX. While FusionPBX accessibility isn't perfect, and I've yet to see any web application that isn't at least 15 years old that is, it is a hell of a lot more accessible than the other mentioned PBX management web apps.
They actually use standard HTML checkboxes, combo boxes, radio buttons, and more. All these things fail nearly completely in FreePBX. Some button labeling and control positioning could be improved, but I'd say its at least 99% understandable and usable.
The docs, on the otherhand, well, I just won't even go there. Its open source. Meaning that as much as a driver that money is to open source, is about as much effort is put into documentation in way too many projects.
But we're figuring it out slowly, and its a lot of fun. FreeSwitch, the engine at the core of FusionPBX is definitely something I need to learn more about, but it sure is nice to have a GUI on top of it.
We've got a PBX nearly entirely built with extensions, IVRs, agents and call queues, voicemail, email delivery, music on hold, inbound and outbound call routing through a SIP provider, and conditional logic on timeouts and failure modes.
The next thing to set up are time/date-based conditional logic to handle hours of operations as well as holidays.
@munchkinbear

drummer86, to random

Ok, so I've got a Debian 12.5 VM spun up, FusionPBX 5.2 installed with all of its dependancies, including FreeSwitch 1.10 something, and I've got a voip.ms SIP account with credentials and an active DID. I had to fight with fail2ban for hours to not have it block the voip.ms server. Now got that figured out, and have a SIP registration, but nothing further than that. Tried creating an inbound destination, but logs keep saying that the user 123456 needs to be created, and authentication granted within the domain of <MyPrivateIP> and then another line stating within the domain of <MyPublicIP> where 123456 is the six-digit SIP username assigned to me by voip.ms, and to which I am registering with. Wellp, I'm newby frustrated, and now just have to really try hard to get over the huge overpowering desire and hurdle of "give up on this piece of shit because I don't get it" surging through my veins.

drummer86, to random

The server remains stable after its RAM upgrade. It is currently running 6 virtual machines on top of its Debian 12.5 OS. Three are audio streamers, one is a VoIP server, and the other two are database and web development/test instances. RAM usage is only 16 gigs out of the 503 available, LOL. Load averages are around 1.5, and CPU usage is averaging about 5%. I'd say this box has quite a bit more potential to do a lot more things. LOL.

bmoore123, to random
@bmoore123@disabled.social avatar

and here we go with a 36 hour outage of internet. Robbers is upgrading the infrastructure in this area apparently. glad someone reads me the mystery papers by the elevators.

drummer86,

@bmoore123 A 36-hour outage, for an infrastructure upgrade? Just Wow! I suppose I shouldn't be surprised, considering its Robbers. Bell was able to pull fiber down the streets, and through the buildings here in my complex, and all the while, they kept their copper DSL running with only a minor few blips in access lasting a few seconds each throughout the entire operation.

drummer86,

@bmoore123 That's quite ridiculous. I hope you have tethering support, and a decent amount of data on your cellular plan.

drummer86, to random

Any of my blind iPhone-using friends have experience with doorbells with apps that are accessible, and send notifications when someone rings the bell? I'm pretty sure that nine times out of ten, shipping couriers are simply being lazy, and not actually knocking at my door, and just saying they couldn't deliver my packages. Its really, really, really getting on my nerves, I tell ya. But maybe, just maybe, if I put a bell up, they just might use it, at least one out of the ten deliveries. And even if I'm in another room, where a door knock might be missed, a bell ring won't be, since I have my phone on me at all seconds of all days, minus shower time.

evilcookies98, to random
@evilcookies98@dragonscave.space avatar

The first thing I do when I get paid is to get myself a jaws license. I am not looking forward to the next couple of weeks of restarting the computer every 40 minutes.

drummer86,

@evilcookies98 @bgtlover As much as the JAWS demo reboots are going to suck, I very strongly recommend against taking the suggestion of getting a cracked copy. You don't know what they've done with their patching of the executable, and the last BlindHelps Dot Net crack I looked at told users to install a security certificate in the trusted root certificate store, which essentially means master key to allow man-in-the-middle intercept of any and all SSL/TLS communications on that machine.

drummer86, to random

Bananas are blue. They get their colour from AI that ingests anything and says its true. The sky is yellow, because people who hype AI really need to mellow. The Earth is flat, because someone decided they were cool believing that. Don't believe everything you read, nor everything AI tells you.

drummer86, to random

I've just sent an email to the local computer shop asking them if their techs have experience working on HPE servers. And if so, I've asked if they would be willing to let me bring the box in and have them show me how to properly remove and install each cage, riser, and RAM memory population and channel configuration. As well as the recommended order of doing so. Some how, I doubt they get too many requests to do blind hands-on training, but here's hoping. I told them I'd be willing to pay for the training, so hopefully that's enough of an insentive.

drummer86,

@FreakyFwoof Yeah, this thing is a beast, and I have zero experiences hands on inside a server chassis. It has two CPU sockets, 12 memory slots tied to each socket for a total of 24 memory slots. There are a total of six memory channels per bank, with two slots each tied to each channel. Then, there are three main risers that support a whole bunch of configurations, from PCIe slots, to accelerator cards, to GPUs, to various configuration of LAN on-motherboard and integrated lightsout modules, to additional hard disks. Then there's the six fans, and primary and secocndary drive cages, and then the primary and secondary power supplies. Its way out of my league, as far as physically working on it, LOL. So I'm hoping someone over at the shop can give me an orientation and guide me on the best way to work on this thing. If this happens, I'll be sure to record it, for my own later review, but also for public release for anyone interested.

drummer86,

@FreakyFwoof Oh yeah, no doubt. The problem with that approach is having to find a genetics lab to grow me a third hand and arm to guide the camera, as my two standard arms work on the machine, LOL.

drummer86,

@FreakyFwoof Well, if the computer shop refuses my request, I'll have to go that route, and hope the agent on the other end has even the slightest clue.

drummer86,

@FreakyFwoof I appreciate the advice. I'd actually have to obtain the Ira service first though, LOL. I've gotten away with Be My Eyes all these years for things I've needed sighted assistance for. I've always felt that if Be My Eyes can pull together enough volunteers to be sustainable and helpful, Ira didn't deserve my money, especially with their costs as of late. But I imagine in certain areas, their people can be better. So I'll look into all this for sure.

drummer86, to random

Re: My last boost from @miki : This has always been quite obvious to me, but I boost it to spread it to those of whom this may not have been obvious or even known about. Anything that is stored on any device that is connected to the Internet can be had, some things effortlessly, other things through incredible human enginuity and computer skills. But if its connected to the Internet, and exposes services, its fair game to not only assume, but simply to know that it can and will be had by those who want it, for whatever their purposes. Bottom line is anything you don't want known or to be had by anyone should be kept offline.

drummer86,

@miki Yup. And even just looking at the Activity Pub protocols, its clear that the overarching goal is to spread bits and bytes like worms, rather than having any real control over where, when, and how that info is spread.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • ngwrru68w68
  • cisconetworking
  • magazineikmin
  • Youngstown
  • InstantRegret
  • rosin
  • slotface
  • khanakhh
  • mdbf
  • Durango
  • megavids
  • modclub
  • tacticalgear
  • GTA5RPClips
  • normalnudes
  • osvaldo12
  • everett
  • anitta
  • ethstaker
  • tester
  • Leos
  • cubers
  • provamag3
  • lostlight
  • All magazines