Setting up a Raspberry Pi as a firewall is a cost-effective way to enhance your network security. This tutorial explains how to configure a Raspberry Pi-powered firewall using iptables and Raspberry Pi OS. Requirements A Raspberry Pi (Pi 3, 4, 5 or later recommended for …
shedboy71
-
-
Setting up a Raspberry Pi as a Tor proxy allows you to anonymize your internet traffic and enhance privacy. What is a Tor Proxy A Tor proxy is a middleman between a client, such as a web browser, and a service, like a web server, …
-
Integrating Amazon Alexa with a Raspberry Pi allows users to create a voice-controlled assistant, automate smart devices, and interact with Alexa’s AI capabilities. This tutorial will cover: Installing Alexa on Raspberry Pi Setting up Alexa Voice Service (AVS) Using a microphone and speaker Controlling Raspberry …
-
Installing and configuring Pi-hole is a straightforward process that involves setting up a Raspberry Pi (or another compatible system) and configuring it to block ads at the network level. Here’s a basic tutorial: What is Pi-hole? Pi-hole is a network-wide ad blocker that filters unwanted …
-
Hardware
Getting started with the compute modules – the Raspberry Pi Compute Module 5 Dev Kit
by shedboy71I have always wanted to get one of the Compute modules, so now that the Compute Module 5 is here I decided to go for it. Now, a basic summary of the Compute Module is its a Raspberry Pi 5 minus all of the connectors …
-
Raspberry Pi 500 features the same quad-core 64-bit Arm processor and RP1 I/O controller found in Raspberry Pi 5. With a one-piece aluminium heatsink built in for improved thermal performance, your Raspberry Pi 500 will run fast and smoothly even under heavy load, while delivering …