Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
I have a server in my school office. I currently only use it to backup important files. I am asking if running public or private containers on it would be safe and acceptable.
If authorized by the school IT department and policy, yes. Ask them, not us.
Yes, already have. It seems they don't care.
Then get that in writing.
This. Get in writing the specific legally binding policies for personal use of their network resources. Not just the personal opinion of the IT people. They don't write the legally binding policy that you are responsible for following.
If that's how you want to run your server that's your choice, but if it were me, I'd think long and hard about the legal implications of doing this.
So far you've not said anything about what you're trying to achieve and that's not helping.
Well, I am asking also security wise. I know most schools snoop. Can they somehow see traffic through ssh or VPN? Or just the protocols, logs, dates, etc
The SSH and VPN traffic is encrypted. Unless your private keys have been compromised, nobody can see what is going over the tunnel. They can log things like the IP addresses that are connecting to it and how much data is being transferred though.