I will be showing you how to build a wifi robot from scratch. It is a very straight forward project and can easily be handled by a intermediate robot builder. To complete the robot, it will take a couple of hours. I also attached the android phone with this app ip camera with this robo and connected to the wifi to see live video feed. We need to reduce `Beacon Interval` to 40 instead of 100 (default) if we are using wifi router to command robo with pc/laptop to see real time effect.
Video of complete robot driving:
- Nodemcu esp8266 https://www.amazon.in/ESP8266-NodeMcu-WiFi-Development-Board/dp/B00UY8C3N0/
- Power Bank
- Robot platform
- Motor driver
- Motor as per requirement
- Jumper wires
- Bread Board (Optional)
Early this year, the U.S. Congress rolled back Internet privacy rules, giving service providers free reign to track, store and sell browsing data. In July, the U.S. Department of Justice (DoJ) issued a warrant to DreamHost, asking for a list of everyone who visited DisruptJ20.org — a site used to plan protests at President Trump’s inauguration. Both events raise important questions about online privacy, and many consumers are turning to Virtual Private Networks (VPN).
More private than private browsing
Firefox private browsing with tracking protection is great at protecting you from invasive trackers and keeping your browser history secret, but when you surf the web, you leave footprints that Firefox can’t erase — your IP address is logged at the sites you visit and your ISP may keep records. That usually isn’t an issue, but the sites you visit could expose you to unwanted attention from government agencies or even hackers. A VPN can hide those footprints from prying eyes and add an extra layer of security against hackers.
Do you need a VPN?
A long time debate ends here. A book or a Computer/Phone screen what should be used for reading. This research says it all and the paper book wins. Read the full article here.
Most common 4 types of personalities stated by Carlo M. Cipolla are as follows.
How would you categorize them if get the chance to describe someone’s personality on first encounter. You should read this interesting article if u want to learn this magic. And I will try to describe this in short.
Lets Take an example, If a person is selling second person a goat, he may act as follows
- Helpless – suffer loss
- Bandit – trying to sell overpriced
- Intelligent – looks where both can get a happy deal
- Stupid – cause lose to both parties.
Now you know what these 4 types of personalities are, hurry and take notes when u negotiate with someone. Thanks for reading here is the link.
Get email address from log file
grep -E -o “\b[a-zA-Z0-9.-][email protected][a-zA-Z0-9.-]+\.[a-zA-Z0-9.-]+\b” emails.log > email.log
People talking on many forums that chrome or firefox like browsers are sending data to their server, and making the service very insecure. In many forums people are talking about building their own browser and services but its very tedious task.
So this guy made vivaldi for us that is secure enough for now.
I personally use firefox mostly but this post below made me rethink of what I am using. But its really worth to try.
It is of about 40.6MB in size for windows I am testing. Installation steps are quite easy.
- It has task manager
Vivaldi Task manager
2. I use system proxy settings like chrome, and no separate network settings like firefox. Also It does not have VPN option like opera provides in Settings > Privacy & security > VPN
Vivaldi Network settings
3. Other option are very similar to other browser and have all the functionalities that chromium browser have.
Vivaldi search page
For now it is making very good progress on being a trustworthy internet browser but still it lacks many good functionalities those other browsers have. Also they are seen thrice in new.ycombinator.com for their appreciated work & progress – https://shivalink.com/news.php?from=0&news_c=&size=20&q=vivaldi .Please visit the following url for more information.
Vivaldi makes History
You are browsing this post and almost all the websites in the world keep log of your activities and browser information. They can identify who you are and what you are reading/searching.
I have heard people saying I have nothing to hide, but we all know that no one can lie to a serach Engine like Google. And so people say google knows every thing.
Now think of it if some evil guy know everything about you. Like where you work and where is your home. Is that good or bad.
2. What is Anonymity
First check if have set up ssh-keygen Or set up with this command
ssh -T [email protected]
Then Check if ssh-Agent is working
If not then start with this command
eval `ssh-agent -s`
Now get you .pub create file in ssh-keygen process and paste content in but bucket
check detail of ip with ifconfig
iptables -t nat -A POSTROUTING -o phone-conn -j MASQUERADE
iptables -A FORWARD -i phone-conn -o eth0 -m state –state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth0 -o phone-conn -j ACCEPT
also do not forget to set dns
I got this idea when I was reading this page
Share iPhone’s internet to Home network using a Raspberry Pi
First, add the GPG key for the official Docker repository to the system:
curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -
Add the Docker repository to APT sources:
sudo add-apt-repository "deb [arch=amd64] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable"