Welcome to Site In English

Here you can find info about Raspberry PI, ODROID, Linux and any other ideas.

News this week in the Pi World

ODROID-XU4Q-Gaming-Console

We're here one more time to show you what I think are the best articles that have come out of the internet this week not only from Raspberry, but also from ODROID and Arduino. A few chubby and soft buds ready to be shown to friends and family and of course, to strangers on all social networks.... The weekly summary of Pi World begins!

Continue reading...

News this week in the Pi World

dontbeevil

We didn't mind losing our privacy before, but we've realized, hopefully in time, what big corporations can do with our data. Privacy is a very precious treasure and in Europe they want to protect us and the plans are to curiously copy the laws that we have had in Spain for years and I think it works. Point for Spain, even if we don't win today in Eurovision, we'll be there as I do every week in this, your favourite section about the Pi World. Let's go!

Continue reading...

News this week in the Pi World

commodorePi

Here I am today, Saturday, reviewing the best of the week, as from now on it will be difficult for me to publish publish or search for updated content for the blog. I won't keep you waiting any longer. A ration of fried news coming up at the Pi!

Continue reading...

News this week in the Pi World

etcher

This week I leave some links about Etcher or run MS-DOS on the RPi among others while I go to watch Avengers 4.

Continue reading...

Penetration Testing with Raspberry Pi - Second Edition (free eBook)

pentesting_rpi

Happy bookday!

This book will show you how to utilize the Raspberry Pi to create a portable, low-cost hacking tool using Kali Linux 2.

YouÂ’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more...

Continue reading...

CentOS for web developers

centos7

Today I'm angry with the world. Why didn't anyone tell me Red Hat had a decent operating system? I have had to deal with a team CentOS 7 and I leave some notes here just for reference, and I'll complete them with some difficulties. The profile will be of web developers. Let's go!.

Continue reading...

Retr Av
I request your permission to obtain statistical data on its navigation on this website. If you continue to browse I consider you accept the use of cookies. This site is adapted to be compliant with the new law about General Data Protection Regulation. OK | More Information