15+ examples for Linux cURL command

In this tutorial, we will cover the cURL command in Linux. Follow along as we guide you through the functions of this powerful utility with examples to help you understand everything it’s capable of.

The cURL command is used to download or upload data to a server, using one of its 20+ supported protocols. This data could be a file, email message, or web page.

Source: 15+ examples for Linux cURL command – Like Geeks

Linux users: How to Run Netflix in Kodi (original title: How to Run Netflix on the Raspberry Pi)

This is a case where a blog post is kind of mis-titled, and suggests that the article has more narrow application than it really does. The original title suggests it only applies to Raspberry Pi users, but if you actually read the article you find that the method shown should be equally applicable to any Linux-based distribution running Kodi, or at least to those Linux distros that are based on Debian (Debian, Raspbian, Ubuntu, Linux Mint, Elementary OS, Zorin OS, and many more). The same method would probably work on non-Debian-based distros as well, if you can get the required dependencies using their package managers, and if Kodi will run on them. I understand that it was published in a blog intended for Raspberry Pi users, so that’s probably why they tried to make it seem only relevant to the Raspberry Pi, but if you are running Kodi on some other Linux distro and want to view your Netflix content, you might try giving the method shown in this article a try:

How to Run Netflix on the Raspberry Pi – Pi My Life Up

Raspberry Pi Zero – Establishing an Ethernet connection (ENC28J60)

Thanks to the inexpensive Raspberry Pi Zero, Internet of Things (IoT) projects will continue to grow. One disadvantage which the Zero (not W) and A+ models have is the lack of Ethernet connectivity. That would not be a problem, if not just a single (micro) USB port onboard.

In order to connect these models with the network by Ethernet cable without a WLAN adapter, one can do this over the GPIOs: All you need is the “ENC28J60” module, the connection of which is shown in this tutorial.

Source: Raspberry Pi Zero – Establishing an Ethernet connection (ENC28J60) (Raspberry Pi Tutorials)

SSH port forwarding (tunneling) in Linux

In this tutorial, we will cover SSH port forwarding in Linux. This is a function of the SSH utility that Linux administrators use to create encrypted and secure relays across different systems.

SSH port forwarding, also called SSH tunneling, is used to create a secure connection between two or more systems. Applications can then use these tunnels to transmit data.

Source: SSH port forwarding (tunneling) in Linux – Like Geeks

If you have privacy concerns regarding Etcher (now known as balenaEtcher), here are some alternatives

We’ve used Etcher several times, mostly to make a bootable SD card for a Raspberry Pi or to put a bootable image of a Linux distribution onto a USB thumb drive. But we’re rethinking that now because we’ve read some concerns about privacy when using Etcher, or balenaEtcher as it is now called. … All we wanted to point out is that if you do have any concerns about using Etcher or balenaEtcher, there are alternatives, depending on which operating system you are using:

Source: If you have privacy concerns regarding Etcher (now known as balenaEtcher), here are some alternatives – Two “Sort Of” Tech Guys

How to Enable Support for HFS on the Raspberry Pi

In this Raspberry Pi HFS tutorial, we will walk you through the steps to enabling support for Apples HFS Plus filesystem on your Raspberry Pi.

This tutorial will take you through the packages that you need to install to interact with HFS Plus drives. We will also show how to mount the drives and format a drive.

Source: How to Enable Support for HFS on the Raspberry Pi – Pi My Life Up

Hit by ransomware? Victims of these four types of file-encrypting malware can now retrieve their files for free

Cybersecurity researchers crack the codes of FortuneCrypt, Yatron, WannaCryFake and Avest ransomware, allowing victims to get their files back without paying cyber criminals.

Source: Hit by ransomware? Victims of these four types of file-encrypting malware can now retrieve their files for free | ZDNet