Do not let them steal your data if they steal your physical server!
First, this story is about tools that provide cryptographically strong encryption based on the AES standard. Be warned that if you forget your password (used to derive and encrypt the AES key), you will have to wait several decades until more powerful hardware will be available. Besides, you will have to pay for that computation power to perform a brute-force search to recover your lost key.
Second, I will focus on just a few tools that I found to be the best in their class. They are…
New: this article has been updated to support Ubuntu 21.04 Hirsute Hippo!
No LAN cable is required. Use any power outlet within the radius of your WiFi router! The 5GHz ac standard for Raspberry Pi 4 also covered.
I suppose that you have a wireless router and know how to configure it. Besides, you will need some storage medium for Raspberry Pi.
If you are looking for an elegant solution, I suggest investing in a capacious microSD card. A microSD card is needed to boot Raspberry Pi. A capacious microSD card allows you to go without an external hard drive…
If you have a 64-bit Windows 10 Pro, Enterprise, or Education, you can use the built-in hypervisor to host guest virtual machines (typically, running Ubuntu Linux). The official Microsoft docs give you a complex, error-prone, and outdated way to configure Hyper-V and its networking. If you wish to avoid pitfalls, this straightforward guide is for you.
If you need just one instance of Ubuntu for command-line tasks, it is better to install Windows Subsystem for Linux (WSL2) and get Ubuntu from the Windows App Store. WSL simulates the Linux kernel by mapping its API to the Windows kernel; thus, your…
Sergejs is an Associate Professor of Mathematics and has Ph.d. in Computer Science. He is the main developer of webAppOS.