In this tutorial, we will show you how you can boot your Raspberry Pi using a USB port instead of the micro-SD card slot!
Please note: This method of booting is experimental and is not guaranteed to work with all USB mass storage devices.
Source: How to boot your Raspberry Pi from a USB mass storage device (ModMyPi)
ffmpeg is a CLI (command line based) utility for processing media files. It is a framework with a multitude of features and, because of it’s open source license, it is the base for many widespread apps such as VLC, YouTube, iTunes and many more. A number of Linux video editors use ffmpeg underneath the GUI.
What I love even more about ffmpeg is that it can be used on it’s own to accomplish many processing tasks in a very simple manner (with one or two commands). However, it’s a very powerful program that can be used in more complex ways and even replace an editing workflow.
In this ffmpeg tutorial, I’ll show you how to install ffmpeg and I’ll be covering it’s different uses. I’ll even get into some more complex features.
Source: Install and Use ffmpeg in Ubuntu & Other Linux [Full Guide] (It’s FOSS)
Here are two pages to visit to safeguard your privacy when using Firefox. Please BE CAREFUL when making changes such as these; you probably do not want to make every single change shown because if you do, you may experience unintended consequences, and may possibly even “break” certain web sites:
1. Firefox Privacy – The Complete How-To Guide
Mozilla Firefox is arguably the best browser available that combines strong privacy protection features, good security, active development, and regular updates. The newest version of Firefox is fast, light-weight, and packed full of great settings to protect your privacy.
It is for this reason that I consider Firefox to be the best all-around browser for privacy and security. It remains a solid alternative to some of the other options, such as Google Chrome, Microsoft Edge, and Safari.
Another great aspect of Firefox is that it is highly customizable, which is the point of this guide. Below we will go over how you can customize Firefox to give you the security and privacy you desire, while still working well for day-to-day browsing.
Source: Firefox Privacy – The Complete How-To Guide (Restore Privacy)
2. Privacy/Privacy Task Force/firefox about config privacy tweeks
Firefox: Privacy Related “about:config” Tweaks
This is a collection of privacy related about:config tweaks. We’ll show you how to enhance the privacy of your Firefox browser.
Source: Privacy/Privacy Task Force/firefox about config privacy tweeks (Mozilla Wiki)
I call this the unofficial bash strict mode. This causes bash to behave in a way that makes many classes of subtle bugs impossible. You’ll spend much less time debugging, and also avoid having unexpected complications in production.
Source: Use the Unofficial Bash Strict Mode (Unless You Looove Debugging) (aaron maxwell)
Use iptables to create a VPN killswitch to protect against data leaks.
If you’re connected to a VPN, you need a killswitch. No, it’s not as metal as it sounds. It’s just a mechanism that stops your Internet connection when you’re disconnected from the VPN. It protects you from inadvertently leaking sensitive information onto the Internet when the VPN connection drops.
Source: How To Create A VPN Killswitch Using Iptables on Linux – LinuxConfig.org
The ls command is used to list directory contents and the results can be sorted upon several criteria such as by date, alphabetical order of filenames, modification time, access time, version and file size.
In this article, I will show you how to sort files by date using ls command in Linux.
Source: Guide to Sort Files by Date Using LS Commandline in Linux (LinOxide)
Bing has several search engine shortcuts and advanced features that can be used to get better and accurate search results. These Bing search tips and tricks will help you narrow down search results to find exactly what you are looking for.
Source: 23 Advanced Bing Search Tips And Tricks You Should Know (Fossbytes)
Ever wondered why programming in Bash is so difficult? Bash employs the same constructs as traditional programming languages; however, under the hood, the logic is rather different.
Source: Understanding Bash: Elements of Programming | Linux Journal
I knew that day that the Shortcuts app has paved the way for automation in iPhone, but I didn’t realize that it can also be used to keep a track on the proliferating police abuse.
Source: This Siri Shortcut Automatically Triggers Camera Every Time Cops Pull You Over (Fossbytes)
Every so often something really useful appears on Reddit, and this is such a case. You may encounter a situation where you want to execute the contents of a bash script, but not more frequently than every few seconds. A Reddit user wanted to know How to check if a command in .bashrc has been executed within last 10 seconds if yes don’t execute the command again. The response by Reddit user mdaffin is brilliant in its simplicity, and can be used in any bash script where you don’t want the contents executed too often:
Write a time stamp to some file, check said file before you run the command if now – timestamp > 10s run the command and update the timestamp.
EDIT: Like this (with modification times instead):
if [[ ! -f "$TS_FILE" ]] || [[ "$(expr "$(date +%s)" - "$(stat -c %Y "$TS_FILE")")" -gt 10 ]]; then
You’d replace the
echo "running" line with the part of the bash script you want to run only if it’s been 10 seconds since the last time the script was run, or whatever number of seconds you specify after the
-gt. If the bash script actually outputs a file as part of its normal operation then you could specify that file in the
TS_FILE= line; there would be no need to create a separate timestamp file (unless some other process could also modify that same file).
This doesn’t actually stop the bash script from running; it just prevents it from executing the part of the script that you don’t want executed too frequently. This could be very useful in a situation where without such protection, the too-frequent execution of the script might cause something undesirable to happen (such as getting locked out of an online site for hammering it with requests). Depending on the situation there may be other, perhaps even better ways to avoid this possibility, but in other cases this may indeed be the best approach.