How to enable and use Wake on LAN

https://commons.wikimedia.org/wiki/File:Utp_patch.png#fileIn this article I will describe how to enable Wake-on-LAN (WOL) and how to use it to start-up a system remotely. In order to use Wake-on-LAN your systems hardware and network driver needs to actually support this technology. You will also need to know the MAC address of the systems ethernet card.
Read the rest of this entry

How to use an SSH connection as a SOCKS proxy

https://commons.wikimedia.org/wiki/File:Gnome-fs-ssh.pngIn this article I will describe how to use an SSH connection as a SOCKS proxy. This basically means that you can route the network traffic of any application or even your entire systems traffic through an SSH connection.
Read the rest of this entry

How to trim disk images to partition size

I’ve recently been playing with my Raspberry Pi and Arch Linux when I encountered the following problem:

I’ve downloaded the Arch Linux image from the Raspberry Pi download page and used dd to copy it to a 8GB SD card. Read the rest of this entry

How to mark books as read in Calibre

How to mark books as read in CalibreIn this article I will describe how to mark/flag books you have already read in Calibre. Calibre is probably one of the best open source E-book library management application out there. It comes with many great tools and features and it’s easy to customize. By default there is no prebuild possibility to mark books you have already read in your library, but that’s where Calibres possibilities of customization come in handy. You can achieve this by simply adding a new column to your library. Just follow these simple steps:
Read the rest of this entry

How to make screencasts with FFmpeg

FFmpeg is able to use audio and video streams from many different sources. In order to record a screencast, you can use the x11grab input module for recording an X screen and the alsa input module for audio recording.
Read the rest of this entry

How to compile Truecrypt from source

A few days ago my new USB hard drive arrived. My idea was to connect the hard drive to my Raspberry Pi so that everyone in the network can read the data on that drive. But all the data stored on that drive should be encrypted. The problem was that I also wanted to use the hard drive to copy files from a computer of a friend. Not everyone uses Linux, so I could not encrypt the hard drive with LUKS.
But I had an idea to encrypt the hard drive with Truecrypt, which is available for Windows, Mac OS X and Linux. I created a little partition (about 100MB) which is not encrypted and download the Truecrypt installer for each OS to that partition. The advantage is that you don’t need an internet connection to download the installer. The rest of the hard drive is encrypted with Truecrypt.

The main problem was the installation of Truecrypt on my Pi because there is no ARM binary. I’ve no X-Server on my Pi so I had to install Truecrypt as console-only version. Here are the steps I’ve done to install Truecrypt on my Pi.
Read the rest of this entry

How to enable SWAP without restart

I use Conky to monitor my computer status, e.g. current cpu, memory and swap usage network connections etc. A few weeks ago I noticed that my SWAP-partition was not enabled. Maybe Conky was wrong, but I took a deeper look at it:

$ cat /proc/meminfo
[...]
SwapTotal:             0 kB
SwapFree:              0 kB
[...]

Read the rest of this entry

How to install ClockworkMod Recovery and CyanogenMod on Samsung Galaxy S (GT-I9000)

Screenshot: CyanogenMod loading on GT-I9000In this article I will describe how to install ClockworkMod Recovery and CyanogenMod on the Samsung Galaxy S. By installing CyanogenMod your device will also be rooted. I have written this post while I was installing ClockworkMod Recovery and CyanogenMod on my friends Samsung Galaxy S GT-i9000 (International). I provided the specific software download locations for the GT-i9000 and also the general download links in case you have an other model of the SI. Make sure to have enough battery life throughout the whole installation procedure and to read the disclaimer before starting to follow this guide!

Read the rest of this entry

How to install Privoxy and combine it with Tor

In this post I’ll show you how you can improve your privacy and anonymity while you are browsing on some websites. For this purpose I’ll use Privoxy and Tor. Privoxy is a non-caching web-proxy with filtering capabilities for enhancing privacy. Tor uses an overlay network of volunteers and relays your traffic through the Tor network to it’s destination. It also encrypts your data, so no Tor node (except the exit node) can read your data.

This is not a high-security setup, but it should improve your privacy and anonymity.

1. Privoxy
2. Tor
3. Combine Privoxy and Tor
4. Appendix
Read the rest of this entry

How to set up a stateful firewall with iptables

My old post to set up a small rules set for iptables is deprecated so I decided to update this post and improve some rules.
This time I tested this iptables setup on my Raspberry Pi. I connected to my Pi via SSH and the first time I tested the rules order I locked myself out and I had to connect the monitor and keyboard to fix this. The rule order in this post worked for me to set everything up via SSH.

I also tried this setup on a virtual machine and made a screencast of it. You can find the video at the end of this post.

1. Kernel modules
2. Important Rules
3. Chain Policies
4. Port Rules
5. Logging
6. Saving Rules
7. Appendix (Script and video)
Read the rest of this entry

Follow

Get every new post delivered to your Inbox.