Title Sort descending Body Authored on
The Ultimate Raspberry Pi Backup Strategy

In this article I’m going to discuss a Raspberry Pi (RPi) backup strategy that I use and that I recommend you use as well in backing up your RPi devices. This assumes, of course, that you own such devices.

The Evolution of the Internet and the World-Wide Web (W3)

Who Is Attributed With Developing The Internet We Know Today?

The Internet as we know it today is the result of the work of many individuals and organizations over several decades. Some key figures and organizations that have contributed to the development of the Internet include:cloud computing

OpenMediaVault Open Source Application

OpenMediaVault is a free and open-source software for building a Network-Attached Storage (NAS) system. It is based on Debian Linux and is designed to be simple to use and easy to set up. OpenMediaVault offers a web-based interface that allows users to easily manage their NAS, including file sharing, backups, and other network services.

Rsync Time-Machine Backup For Linux

Rsync is a Linux command-line tool that allows one to transfer files either to or from a remote host (but not between two remote hosts). The user can transfer single files or multiple files matching a pattern. In this article, I will first introduce rsync and its use in Linux, then I'll point out a method using rsync that replicates the backup process found in Apple Mac platforms called Time-Machine Backup.

Non-GUI Terminal in Linux

The terminal that you normally access in a Linux distro is called the Pseudo-Terminal. If you run the command:

$ tty

at the system prompt, it should report something like the following in stdout:

/dev/pts/0

indicating that you are in a pseudo-terminal (pts). See man pts and man tty for more information. If, on the other hand, you run the command:

$ who

the stdout will look something like the following:

<your user> tty7         2023-05-28 22:30 (:0)

The Pros and Cons of Open Source Software

Open source refers to the practice of making the source code of software freely available to the public. This allows anyone to view, modify, and distribute the code, as long as they follow the terms of the specific open source license. Open source software is typically developed by a community of volunteers and can be used for a wide range of purposes, from personal projects to large-scale enterprise systems.

Generating 2FA Authentication Code From the Linux CLI

Two-factor authentication (2FA) is a security process that requires two forms of identification to access an account. This provides an extra layer of protection against unauthorized access, even if a hacker or cybercriminal gains access to a user's password. Some reasons why using 2FA is important for accessing your online accounts are:

Elive Linux

Elive Linux is a beautiful and powerful operating system that is gaining popularity among Linux enthusiasts and power users alike. With its sleek interface, extensive customization options, and powerful built-in applications, Elive Linux is quickly becoming one of the most attractive and functional Linux distributions available today.

Installing, Configuring, and Running a Pi-Hole Server on a Raspberry Pi

A Pi-Hole server is a piece of software that can be installed on a Raspberry Pi computer, which functions as a network-wide ad-blocker and privacy-enhancing tool. It works by intercepting DNS requests made by devices on a network, and filtering out requests to known advertising and tracking domains.

Doas: Super Lightweight Replacement For sudo

The long-time use sudo command in Linux has been subject to security risks and is being deprecated and replaced with a much lighter command taken from OpenBSD called doas. The security risks have been identified in the National Vulnerability Database (NVD) CVE-2021-3156 as a High Risk. Sudo stands for superuser do whereas the doas command stands for dedicated openbsd application subexecutor. The sudo command package is roughly 20M in size whereas doas is only 570K in size.