How to Use Raspberry Pi as a VPN Gateway

A VPN (Virtual Private Network) protects your privacy by routing all your Internet traffic through an encrypted server that your ISP (or hackers) can’t see. Setting up and using a log-free VPN service from your PC desktop is straightforward enough, but other devices in your home such as your game console and set-top box don’t let you install VPN software.

One solution is to buy a router that can connect directly to a VPN service, protecting all the traffic on your home network a single stroke. But it could be cheaper (and simpler) just to route all your traffic through a Raspberry Pi that remains connected to the VPN at all times.

Source: How to Use Raspberry Pi as a VPN Gateway – Tom’s Hardware

How to boot your Raspberry Pi from a USB mass storage device

In this tutorial, we will show you how you can boot your Raspberry Pi using a USB port instead of the micro-SD card slot!

Please note: This method of booting is experimental and is not guaranteed to work with all USB mass storage devices.

Source: How to boot your Raspberry Pi from a USB mass storage device (ModMyPi)

Install and Use ffmpeg in Ubuntu & Other Linux [Full Guide]

ffmpeg is a CLI (command line based) utility for processing media files. It is a framework with a multitude of features and, because of it’s open source license, it is the base for many widespread apps such as VLC, YouTube, iTunes and many more. A number of Linux video editors use ffmpeg underneath the GUI.

What I love even more about ffmpeg is that it can be used on it’s own to accomplish many processing tasks in a very simple manner (with one or two commands). However, it’s a very powerful program that can be used in more complex ways and even replace an editing workflow.

In this ffmpeg tutorial, I’ll show you how to install ffmpeg and I’ll be covering it’s different uses. I’ll even get into some more complex features.

Source: Install and Use ffmpeg in Ubuntu & Other Linux [Full Guide] (It’s FOSS)

Two pages to enhance Firefox privacy

Here are two pages to visit to safeguard your privacy when using Firefox. Please BE CAREFUL when making changes such as these; you probably do not want to make every single change shown because if you do, you may experience unintended consequences, and may possibly even “break” certain web sites:

1. Firefox Privacy – The Complete How-To Guide

Mozilla Firefox is arguably the best browser available that combines strong privacy protection features, good security, active development, and regular updates. The newest version of Firefox is fast, light-weight, and packed full of great settings to protect your privacy.

It is for this reason that I consider Firefox to be the best all-around browser for privacy and security. It remains a solid alternative to some of the other options, such as Google Chrome, Microsoft Edge, and Safari.

Another great aspect of Firefox is that it is highly customizable, which is the point of this guide. Below we will go over how you can customize Firefox to give you the security and privacy you desire, while still working well for day-to-day browsing.

Source: Firefox Privacy – The Complete How-To Guide (Restore Privacy)

2. Privacy/Privacy Task Force/firefox about config privacy tweeks

Firefox: Privacy Related “about:config” Tweaks

This is a collection of privacy related about:config tweaks. We’ll show you how to enhance the privacy of your Firefox browser.

Source: Privacy/Privacy Task Force/firefox about config privacy tweeks (Mozilla Wiki)

Use the Unofficial Bash Strict Mode (Unless You Looove Debugging)

I call this the unofficial bash strict mode. This causes bash to behave in a way that makes many classes of subtle bugs impossible. You’ll spend much less time debugging, and also avoid having unexpected complications in production.

Source: Use the Unofficial Bash Strict Mode (Unless You Looove Debugging) (aaron maxwell)

How To Create A VPN Killswitch Using Iptables on Linux

Use iptables to create a VPN killswitch to protect against data leaks.

…..

If you’re connected to a VPN, you need a killswitch. No, it’s not as metal as it sounds. It’s just a mechanism that stops your Internet connection when you’re disconnected from the VPN. It protects you from inadvertently leaking sensitive information onto the Internet when the VPN connection drops.

Source: How To Create A VPN Killswitch Using Iptables on Linux – LinuxConfig.org

Guide to Sort Files by Date Using LS Commandline in Linux

The ls command is used to list directory contents and the results can be sorted upon several criteria such as by date, alphabetical order of filenames, modification time, access time, version and file size.

In this article, I will show you how to sort files by date using ls command in Linux.

Source: Guide to Sort Files by Date Using LS Commandline in Linux (LinOxide)

23 Advanced Bing Search Tips And Tricks You Should Know

Bing has several search engine shortcuts and advanced features that can be used to get better and accurate search results. These Bing search tips and tricks will help you narrow down search results to find exactly what you are looking for.

Source: 23 Advanced Bing Search Tips And Tricks You Should Know (Fossbytes)

This Siri Shortcut Automatically Triggers Camera Every Time Cops Pull You Over

I knew that day that the Shortcuts app has paved the way for automation in iPhone, but I didn’t realize that it can also be used to keep a track on the proliferating police abuse.

Source: This Siri Shortcut Automatically Triggers Camera Every Time Cops Pull You Over (Fossbytes)

Featured Article:

Recent Posts

Recent Comments

Archives

Categories

Meta

GiottoPress by Enrique Chavez

%d bloggers like this: