Since a Raspberry Pi is commonly used as a test system rather than part of a production environment, you may not need any kind of advanced security on the device. For example, you may get tired of typing your password every time you want to log in to the Raspberry Pi, and wish to bypass these prompts completely. Doing so would be inherently less secure, but in some situations, flouting the security convention may be irrelevant. It is possible to bypass both the GUI and/or console login prompts on the Raspberry Pi.
server
How to set time on Raspberry Pi
The objective of this tutorial is to show how to set the system time, as well as the date, on a Raspberry Pi. Picking the time zone for your Raspberry Pi is usually done during installation of the operating system, and then the system date and time will be automatically synchronized with time servers online, according to the time zone that you have chosen. However, there are situations that can require us to manually configure the date and time, or change the time zone if switching locations. Let’s see how to do it.
How to set locale on Raspberry Pi
The locale on a Raspberry Pi is what determines the type of characters and encoding that appear in the command line terminal and any applications that check locale settings. Configuring the locale on your Raspberry Pi will set various environment variables to different values. The terminal and other applications can then query those variables to figure out what type of characters and settings to show the user.
How to remotely access your ebooks library with Calibre server
Calibre is, without a doubt, the most featured ebook manager available on Linux and other operating systems. The application is completely free and open source: it lets us easily organize, convert and sync our ebooks with a variety of devices and ebook readers. Calibre has an included media server, which can be used to remotely access a library.
Automating Raspberry Pi: How to Autostart Programs
Getting programs to start up automatically on your Raspberry Pi will help you to automate the device for certain tasks. Most users are likely not going to use their Raspberry Pi as a daily driver, so they will need services and programs to start up automatically without further user intervention. Whenever we can automate such tasks, it makes less work for us. In this tutorial, we will go over the step by step instructions to enable programs to autostart via command line and GUI on a Raspberry Pi.
Finding Your Raspberry Pi’s IP Address: A Quick Guide
Most users will want to configure their Raspberry Pi to join the local network, and maybe even have an internet connection. In order to remotely connect to the Raspberry Pi or to configure related networking settings, a user will first need to obtain the device’s IP address. In this tutorial, we will show you how to find the IP address of a Raspberry Pi. This will include the internal (or private) IP address, as well as the external (or public) IP address, if one is assigned.
How to install RealVNC viewer on Linux
RealVNC is a commercial VNC solution for various types of operating systems, including Linux. It allows users to control a computer remotely, and interact with the desktop as if they were sitting directly in front of the remote computer. The remote computer should be running RealVNC Server, while the client must run RealVNC Viewer in order to connect to the server and control the computer.
How to install and self host an Ntfy server on Linux
Ntfy is a free and open source notification service written in Go which lets us easily send and receive push notifications on smartphones or desktop computers via simple POST or PUT requests. The basic online service is publicly available free of charge and, on Linux, it is also possible to self-host an Ntfy instance.
How to bind an SSH public key to a specific command
In the client-server architecture used by the SSH protocol, a client can authenticate by providing a tunneled clear text password or by using a public/private key pair: this is called public key authentication. A user who logs in via a public key on a remote machine has complete access to the command line; in certain situations, however, it may be useful to associate a public key to a single specific command, for security reasons.
List of QR code generators on Linux
Quick response (QR) codes have surged in popularity over the last few years. They are an efficient way to share websites, wireless logins, app downloads, or even rewards programs at restaurants, and other things. You may have a use for them on a Linux system if you want to generate your own QR code as a quick way to share one of the previous examples or some other kind of information. To make your own QR code, you will need to download a QR code generator. In this tutorial, we have compiled a list of our favorite QR code generators for Linux. Check out our picks below to find one that suits you best.
What is zombie process on Linux
Everything running on a Linux system is a process, either taking place in the foreground (visible to the user) or in the background (unapparent processes like system services). There are various states that a process can be in, those being running, uninterruptable sleep, interruptable sleep, stopped, and zombie. But what is a zombie process?
List of best hex editors on Linux
Hex editors allow users to edit a binary file after it has already been compiled. Ordinarily, you should make changes to a program by editing the source code and compiling it into an executable file. But if you do not have access to the source code, it is still possible to change various bytes of data of the compiled file, in the hopes that your edit will yield the desired results. This is a hacky solution that can be used for both honest and nefarious purposes.