How to check Internet connection on Raspberry Pi

How to check Internet connection on Raspberry Pi

It is always frustrating when the internet becomes inaccessible, especially on your Raspberry Pi. There are numerous reasons why your internet access could go down, and we have to take various troubleshooting measures to identify the cause of the problem. Things get tricky when the internet connection is seemingly working fine, yet websites are refusing to load on the Raspberry Pi. In this tutorial, we will show you how to check the internet connection on a Raspberry Pi through step by step troubleshooting instructions.

Read more

How to extract text from image

How to extract text from image

Although it is always ideal to have text stored as… well, text, sometimes an image or screenshot is the only option we have for the time being. The problem with having text stored as an image is that it can’t be easily copied and pasted, the font can’t be changed, and the file must be stored in an image format instead of something easily editable and small like a text file. Rather than going through the painstaking process of manually converting the image to text by typing it out, there are tools that can do the job for us on a Linux system.

Read more

How to check Raspberry Pi RAM size and usage

How to check Raspberry Pi RAM size and usage

A Raspberry Pi computer has a fixed amount of RAM built into the PC board. Since Raspberry Pi’s are micro sized, single board computers, the amount of memory is not upgradeable or expandable. Instead, you would need to purchase a more robust Raspberry Pi model or opt for one of the Pi’s that come with more RAM. Different Raspberry Pi models have various amounts of RAM that come installed. Some Raspberry Pi models can have varying amounts of RAM, along with different price points.

Read more

How to bind an ssh public key to a specific command

How to bind an SSH public key to a specific command

In the client-server architecture used by the SSH protocol, a client can authenticate by providing a tunneled clear text password or by using a public/private key pair: this is called public key authentication. A user who logs in via a public key on a remote machine has complete access to the command line; in certain situations, however, it may be useful to associate a public key to a single specific command, for security reasons.

Read more

Linux EOF explained

Linux EOF explained

An EOF (end of file) condition is used to indicate the end of a file or data stream. It is a marker that tells the operating system it has reached the end of the data which it is reading. A Linux system utilizes an EOF marker whenever it is reading data, and users can also manually specify an EOF with various Linux commands like cat. In this tutorial, we will explain EOF in Linux and see examples of how to utilize it ourselves via the Heredoc function in Bash.

Read more

How to use xclip on Linux

How to use xclip on Linux

The xclip tool can be used to interact with the system clipboard from the command line. This can come in handy in instances where you want to send information directly to the user’s clipboard, without requiring that they highlight and copy the text themselves. It also works in the other direction, so the xclip command can check the contents of the clipboard.

Read more

Creating a Bootable USB for Windows 10 and 11 on Linux

Creating a bootable USB drive is often necessary when you want to install or repair an operating system. This guide provides detailed steps on how to create a bootable USB drive for Windows 10 or 11 using Linux (both Debian and RPM-based distributions).

Our handy script does all the heavy lifting, making this task a breeze. The script operates by formatting the USB drive, and then copying the ISO file to the USB drive.

Read more

Linux hard link vs. soft link

Linux hard link vs. soft link

Soft links and hard links are the two types of links that can be created on a Linux system. Without realizing it, you have undoubtedly interacted with tons of hard links on your own system. And, most likely, you have encountered some soft links (also called symbolic links or symlinks), too. That is because the files you work with on your system every day are either hard links or soft links that point to data on your hard drive. What we usually think of as a “file” is actually an inode that points to a data block on our hard drive, and the hard link is how we interact with it.

Read more

How to check command version on Linux

How to check command version on Linux

When working with various Linux commands, you may be wondering what version of the command you are using. Of course, the version relates to the binary executable file itself, and traditionally is maintained by the system package manager, which is responsible for checking on updated versions and installing them at the user’s discretion. Commands in Linux typically undergo slow, subtle changes. Some commands have not changed much at all since the 70s, when they were introduced on Unix. Others have new versions developed regularly, and you need to check your version to know which features it has. In this tutorial, you will learn how to check the version of a command on a Linux system.

Read more

Bash base64 decode and encode on Linux

Bash base64 decode and encode on Linux

Linux commonly uses base64 to encode and decode data. This method of encoding provides a reliable way for data to be transmitted and stored. The encoding process will convert binary data to ASCII characters, making it usable by a variety of services (such as OpenSSL) that require readable ASCII character transmission as opposed to binary. Afterwards, the data can be decoded back to binary data. In this tutorial, you will see how to use the base64 command to decode and encode data on a Linux system.

Read more