Home Automation on a budget

Home Automation on a budget

In this article I will describe how to get the most bang for of your buck. I won't lie and tell you home automation is a cheap hobby. I spent quite a bunch of money before finally getting it right. The hardwareThe trick to saving money is to learn from my mistakes and buy the right hardware right off the bet. Most of the consumer level products in this space try to lock you into their ecosystem by using 'bridges' and 'hubs' that either only talk to their brand of products or a select group of partners. A good example…

Read More

Strip metadata and resize using ImageMagick

Strip metadata and resize using ImageMagick

Ever had to put up some ad on Craigslist or Ebay only to be told your photo filesize is too large? Life is too short to manually resize and compress multiple files to the appropriate specs. Also you might want to remove your metadata as well before uploading. ImageMagick has you covered!

Read More

Getting started with GPG

Getting started with GPG

Privacy and encryption go together like peanut butter and jelly. At the very heart of most encryption strategies is a set of keys and a key exchange. Most of you have probably already heard of PGP (Pretty Good Privacy) and are confused about GPG. Generate a strong 4096 bit key gpg --full-generate-key List generated keys gpg --list-secret-keys Upload key to default servers gpg --send-keys <your_key_uid> Specify a specific remote server gpg --keyserver hkps://keyserver.ubuntu.com --send-keys <your_key_uid> Exporting your key for orther devices gpg --output sec_key.gpg --armor --export-secret-key <…

Read More

Online privacy 101

Online privacy 101

Why should you care about your privacy when you have nothing to hide? Well, the thing is.. everyone has something to hide at some point in their lives. It can be something incredibly insignificant but consider this; everything you do online is being recorded and archived.

Read More

Encrypt all your internet traffic

Encrypt all your internet traffic

Today we'll show you just how to encrypt all your home traffic therefore making sure you're ISP can't easily track your every move. First off, there multiple ways to encrypt your traffic all with varying levels of anonimity and performance penalty. Usually the trade-off is anoniminiy vs performance. It's equally important to note that anonimity doesn't come out of the box. Therefore this is not a post about how to remain anonymous on the web, I'm simply showing you a way to shield your browsing activity from your ISP and prevent personal profiling. I therefore would like to narrow the…

Read More

Docker n00b guide

Docker n00b guide

Installation:sudo pacman -S docker docker-compose Add yourself to the docker group:sudo gpasswd -a <USER> docker WARNING: Every user you add to the docker group is root equivalent. NOTE: It takes a reboot for this change to take effect. Enable and start deamonsudo systemctl enable --now docker.service docker.socket Common commandsBuild a containerdocker build -t <docker_name> . docker run -d -P <docker_name> OPTIONAL - Name your own docker instance name: sudo docker run -d --name <instance_name> -p 81:80 <docker_name> Show Docker instances with namesdocker…

Read More

Close You've successfully subscribed to ELI5.
Close Great! You've successfully signed up.
Close Welcome back! You've successfully signed in.
Close Success! Your account is fully activated, you now have access to all content.