I will be showing you how to build a wifi robot from scratch. It is a very straight forward project and can easily be handled by a intermediate robot builder. To complete the robot, it will take a couple of hours. I also attached the android phone with this app ip camera with this robo and connected to the wifi to see live video feed. We need to reduce `Beacon Interval` to 40 instead of 100 (default) if we are using wifi router to command robo with pc/laptop to see real time effect.
Video of complete robot driving:

Items needed

  1. Nodemcu esp8266 https://www.amazon.in/ESP8266-NodeMcu-WiFi-Development-Board/dp/B00UY8C3N0/
  2. Power Bank
  3. Robot platform
  4. Motor driver
  5. Motor as per requirement
  6. Jumper wires
  7. Bread Board (Optional)

Continue reading

2+

Early this year, the U.S. Congress rolled back Internet privacy rules, giving service providers free reign to track, store and sell browsing data. In July, the U.S. Department of Justice (DoJ) issued a warrant to DreamHost, asking for a list of everyone who visited DisruptJ20.org — a site used to plan protests at President Trump’s inauguration. Both events raise important questions about online privacy, and many consumers are turning to Virtual Private Networks (VPN).

More private than private browsing

Firefox private browsing with tracking protection is great at protecting you from invasive trackers and keeping your browser history secret, but when you surf the web, you leave footprints that Firefox can’t erase — your IP address is logged at the sites you visit and your ISP may keep records. That usually isn’t an issue, but the sites you visit could expose you to unwanted attention from government agencies or even hackers. A VPN can hide those footprints from prying eyes and add an extra layer of security against hackers.

Ref link:

Do you need a VPN?

 

0

Most common 4 types of personalities stated by Carlo M. Cipolla are as follows.

  1. Helpless
  2. Bandit
  3. Intelligent
  4. Stupid

How would you categorize them if get the chance to describe someone’s personality on first encounter. You should read this interesting article if u want to learn this magic. And I will try to describe this in short.

Lets Take an example, If a person is selling second person a goat, he may act as follows

  1. Helpless – suffer loss
  2. Bandit – trying to sell overpriced
  3. Intelligent – looks where both can get a happy deal
  4. Stupid – cause lose to both parties.

Now you know what these 4 types of personalities are, hurry and take notes when u negotiate with someone. Thanks for reading here is the link.

http://www.zoon.cc/stupid/

2+

Hi,

People talking on many forums that chrome or firefox like browsers are sending data to their server, and making the service very insecure. In many forums people are talking about building their own browser and services but its very tedious task.

So this guy made vivaldi for us that is secure enough for now.

I personally use firefox mostly but this post below made me rethink of what I am using. But its really worth to try.

It is of about 40.6MB in size for windows I am testing. Installation steps are quite easy.

 

Install Vivaldi

Install Vivaldi

 

  1. It has task manager
Vivaldi

Vivaldi Task manager

 

2. I use system proxy settings like chrome, and no separate network settings like firefox. Also It does not have VPN option like opera provides in Settings > Privacy & security > VPN

Vivaldi Network setting

Vivaldi Network settings

 

3. Other option are very similar to other browser and have all the functionalities that chromium browser have.

Vivaldi

Vivaldi search page

 

For now it is making very good progress on being a trustworthy internet browser but still it lacks many good functionalities those other browsers have. Also they are seen thrice in new.ycombinator.com for their appreciated  work & progress – https://shivalink.com/news.php?from=0&news_c=&size=20&q=vivaldi .Please visit the following url for more information.

https://vivaldi.com/

 

Vivaldi makes History

1+

Hi,

You are browsing this post and almost all the websites in the world keep log of your activities and browser information. They can identify who you are and what you are reading/searching.

I have heard people saying I have nothing to hide, but we all know that no one can lie to a serach Engine like Google. And so people say google knows every thing.

Now think of it if some evil guy know everything about you. Like where you work and where is your home. Is that good or bad.

2. What is Anonymity

Continue reading

0

check detail of ip with ifconfig

iptables -t nat -A POSTROUTING -o phone-conn -j MASQUERADE
iptables -A FORWARD -i phone-conn -o eth0 -m state –state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth0 -o phone-conn -j ACCEPT

also do not forget to set dns

https://www.cyberciti.biz/faq/howto-linux-bsd-unix-set-dns-nameserver/

I got this idea when I was reading this page

Share iPhone’s internet to Home network using a Raspberry Pi

0

First, add the GPG key for the official Docker repository to the system:

curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -

Add the Docker repository to APT sources:

sudo add-apt-repository "deb [arch=amd64] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable"

Continue reading

0