Fitbit reset
How to reset your Fibit Charge 5, 6 or Fitbit Luxe? You can reset your Fitbit Charge 5, Charge 6, or Fitbit Luxe in 2 ways: Soft reset: restart your Fitbit. You keep your data. ...
How to reset your Fibit Charge 5, 6 or Fitbit Luxe? You can reset your Fitbit Charge 5, Charge 6, or Fitbit Luxe in 2 ways: Soft reset: restart your Fitbit. You keep your data. ...
Introduction Configuring associations Setting associations Removing associations Last words ...
Intro Hardware Null modem Cisco style ports ...
I am using a QNAP TS-251D NAS. Because I would like to switch from QTS to Alpine Linux I though it would be useful to enable the serial port. The TS-251D has a built-in serial port that is already enabled and only needs to be connected. For that you need a number of parts: ...
This recipe is for tunneling NFS traffic over SSH. This adds encryption and Public Key authentication to otherwise insecure NFS traffic. For this recipe to work, requires NFSv4. Earlier versions were not tested, but I expect not all the functionality to work. server configuration ...
This article is a copy of this article and shows how to rename/change name of a network interface. Alpine Linux uses busybox mdev to manage devices in /dev. mdev reads /etc/mdev.conf and according to mdev documentation one can define a command to be executed per device definition. The command which is going to be used to change network interface name is nameif. ...
This article is an update to my Alpine Boot Switcher article. Contents: Preparing boot device ...
This is similar to my previous article Encrypting Filesystem in Void Linux but for Alpine Linux The point of this recipe is to create a encrypted file sytem so that when the disc is disposed, it does not need to be securely erased. This is particularly important for SSD devices ...
This is a small utility to manage a local printer(s) in a home office setting. It will show the state of the printer: accepting or rejecting jobs enable or disabled printing ...
Rules Simple include/exclude rules Simple include/exclude example Filter rules when deleting Filter rules in depth ...
I am busy moving away from my VeraEdge installation to a Home Assistant running on a Raspberry Pi 4. This is because it looks like the maker of the VeraEdge was bought and it is slowly being phased out. For this I am using the following parts: ...
This recipe is for setting virtualization on a voidlinux desktop. Use this setup script to set things up on void linux. Connecting to libvirtd Note that virsh and virt-manager commands connect to different libvirtd sessions by defauult. virsh defaults to qemu:///session while virt-manager to qemu:///system. ...
Flatpak is a utility for software deployment and package management for Linux. It is advertised as offering a sandbox environment in which users can run application software in isolation from the rest of the system. Flatpak was developed as part of the freedesktop.org project and was originally called xdg-app. Snap vs Flatpak ...
Now in 2024 this is usually no longer needed. A more current solution is: https://github.com/phillipberndt/autorandr The point of this article is to document I workaround that I came ...
This article is about erasing disc drives securely. Specially for SSD drives, writing zeros or random data to discs is not good enough and counterproductive. One way to do secure erase (for disposal) is to begin with an encrypted disc. However, after the fact the following options are possible: ATA Secure Erase ...
I couldn't find any to the point documentation on how to do this, so I am writing this. The way I understand Z-Wave associations work is that once devices are in the same Z-Wave network, a device can directly send a command to another device without intervention of the Hub or controller. ...
The point of this recipe is to create a encrypted file sytem so that when the disc is disposed, it does not need to be securely erased. This is particularly important for SSD devices since because of block remapping (for wear levelling) data can't be overwritten consistently. The idea is that the boot/root filesystem containing the encryption ...
There are plenty of reasons why people would need to encrypt a partition. Whether they're rooted it in privacy, security, or confidentiality, setting up a basic encrypted partition on a Linux system is fairly easy. This is especially true when using LUKS, since its functionality is built directly into the kernel. Installing Cryptsetup ...
Development travis cordova build ...
Windows system administration is very mouse driven and to reach all tools you need to browse through Windows explorer. If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names. Here is a list of admin tools with their .msc file names. domain.msc: AD Domains and Trusts ...