Jitsi is a self-hosted video conferencing service similar to Zoom, but Zoom has been plagued with security bugs and collects information about who is using the service. At one point they were even using images from the service to train AI. Other options might be Microsoft Teams or Facetime, both of which are also privacy-invasive big tech companies. Chances are, you are using one of these three services for your business conferences or even for your family conferences!


Fixing SSD, Encrypted, Dead Grub, Failed Kernel

We have all been there: sudo apt upgrade...DEATH. And the Linux distro comes crashing down. We immediately need to start thinking about the options: Do I have backups? What is the big problem? Is there an easy solution? Today I will talk about issues with the Kernel failing to properly install on an NVME SSD with a Luks encrypted LVM...all this meant the regular tutorials were not going to help me to get my system back, nor does the Boot Repair utility that is on the Linux Mint Live CD.


This guide will teach you how to use a Raspberry Pi to connect to a wireless network such as a hotspot, phone, or a free wireless access point, and pass the Internet to your router to share the Internet connection with all the resources on your network. This is a good backup solution for your network, or a means to share Internet with an off-grid setup. The data flow in this project will connect the pi to the Internet via the wlan port and pass the data through a DHCP server passing the connection to the eth port on the pi.


Introduction

Jellyfin is a FOSS cloud-based media server that you can self-host to manage all your media whether you are home or on the run. The software has native phone apps for all smartphone platforms and desktop apps as well. You can also access your media from a web browser. This guide will show you how to create your server and access it.


A VPN, or Virtual Private Network, was originally created to access a local network from the Internet. In our modern days, they are aggressively marketed for privacy. While they can be used to hide your Internet activity from your ISP, it is possible for your VPN company to collect all the same data. Ultimately, a VPN is a powerful tool when used correctly, but they could be a liability when used not used correctly.


Plex Server: A Pretty URL

This guide will allow you to access your Plex Media Server from a pretty domain instead of the IPaddress:Port/web that is usually required. In brief, once you install Plex, you will need to install the Apache webserver and then allow proxy passthrough for the port, and rewrite the URL to affix the “/web” to the end of the url. Here are the steps.


This tutorial will show you how to extend your wireless network with a Raspberry Pi. For this tutorial, I am using a Raspberry Pi 4, 4GB model in a SunFounder Acrylic case. I am powering the Pi with a standard 5V, 2A charger, which is enough to power this headless Pi without any other attachments. This microcomputer also contains my local web server.


Today we will talk about how to swap an audio track in a video. The concept is simple: a video is really a ‘movie’ stream, and at least one ‘audio’ stream. The video player software will select the proper audio stream based on the meta data. Our process is the following:


This tutorial will walk you through installing and setting up pihole, configuring blocklists, and setting your router to use pihole for DNS requests.


Plasma is an excellent Desktop Environment, but recent versions have removed the traditional Home, Trash, Network, and Computer icons from the system. This tutorial will help you restore them.