This recipe is for tunneling NFS traffic over SSH. This adds encryption
and Public Key authentication to otherwise insecure NFS traffic.
For this recipe to work, requires NFSv4. Earlier versions were
not tested, but I expect not all the functionality to work.
server configuration
...
I am busy moving away from my VeraEdge
installation to a Home Assistant running on a Raspberry Pi 4. This is
because it looks like the maker of the VeraEdge was bought and it is slowly being
phased out.
For this I am using the following parts:
...
This recipe is for setting virtualization on a voidlinux desktop.
Use this setup script to set things up on void linux.
Connecting to libvirtd
Note that virsh and virt-manager commands connect to different libvirtd
sessions by defauult.
virsh defaults to qemu:///session while virt-manager to qemu:///system.
...
Flatpak is a utility for software deployment and package management for
Linux. It is advertised as offering a sandbox environment in which users
can run application software in isolation from the rest of the system.
Flatpak was developed as part of the freedesktop.org project and was
originally called xdg-app.
Snap vs Flatpak
...
This article is about erasing disc drives securely. Specially for SSD
drives, writing zeros or random data to discs is not good enough and
counterproductive.
One way to do secure erase (for disposal) is to begin with an encrypted
disc. However, after the fact the following options are possible:
ATA Secure Erase
...
There are plenty of reasons why people would need to encrypt a
partition. Whether they're rooted it in privacy, security, or
confidentiality, setting up a basic encrypted partition on a Linux
system is fairly easy. This is especially true when using LUKS, since
its functionality is built directly into the kernel.
Installing Cryptsetup
...
Windows system administration is very mouse driven and to reach
all tools you need to browse through Windows explorer.
If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names.
Here is a list of admin tools with their .msc file names.
domain.msc: AD Domains and Trusts
...
It is possible to migrate the whole array to larger drives
(e.g. 250 GB to 1 TB) by replacing one by one. In the end the number
of devices will be the same, the data will remain intact, and you will
have more space available to you.
Extending an existing RAID array
In order to increase the usable size of the array, you must increase
...
So finally took the time to try out a Raspberry Pi. For this weekend project wanted to do something relatively simple.
Essentially, I wanted to recreate/enhance the functionality of a
TL-WR702N.
The TL-WR702N Nano Router is a neat device but being closed, can not be customized to what I wanted. It can be used in
the following modes:
...
This tutorial describes how to use the alarm manager to set alarms and how to use the notification framework to display them. In short, the sequence goes like this:
In an Activity AlarmManager.set is called with a PendingIntent containing a Uri.
When the alarm goes off, the Uri is called triggering a BroadcastReceiver.
In the BroadcastReceiver NotificationManager.notify is called with a PendingIntent.
When the notification is clicked, the Activity in the PendingIntent is started.
...