How to Make Speed Tracker Using IR Modules with Arduino Uno

Posted: 2022-03-09 04:28:52
Source: https://linuxhint.com/make-speed-tracker-arduino-uno/

The infrared (IR) modules are mainly used for the detection of obstacles, measuring of speed , measuring of temperature and many other applications. These modules are easy to interface with Arduino boards and can be used in a vast number of projects for different applications. This article is a detailed guide on how to make a speed tracker using the IR modules with Arduino Uno. The infrared modules are used to calculate the speed of moving objects.

How to Interface IR Module with Arduino Uno

Posted: 2022-03-09 03:24:05
Source: https://linuxhint.com/interface-ir-module-arduino-uno/

The infrared sensor (IR) is a sensor that detects motion of any object in a specified area, and it also detects the heat signatures of a nearby object. This article is a detailed guide on how IR sensors work and how to interface an infrared (IR) module with Arduino Uno. A detailed schematics, code and hardware implementation is also discussed in this guide.

How to Control AC Appliances Wirelessly Using Arduino Uno

Posted: 2022-03-09 02:53:29
Source: https://linuxhint.com/control-ac-appliances-wirelessly-arduino-uno/

Most of our appliances in our homes work on the alternating current (AC) and instead of manually turning on and turning off the appliances we can just control them by the click of a button in our smart phone. This article is a comprehensive guide on how to wirelessly control AC appliances using Arduino Uno and bluetooth module HC-05. Schematic, code and hardware demonstration is also mentioned in this guide.

How to Change the Buzzer Frequency with Potentiometer – Arduino Uno

Posted: 2022-03-09 02:52:19
Source: https://linuxhint.com/change-buzzer-frequency-potentiometer-arduino/

Buzzers are the output devices that are used in the projects or appliance where sounding the alarm or tone is necessary. Similarly, the buzzers can also be used for indication purposes by generating different sounds at different frequencies. We can generate different sounds from buzzers by changing the frequency of the sound. In this guide to change the frequency of the sound of the buzzer we have used the potentiometer with Arduino Uno.

Home Automation Using Arduino Uno

Posted: 2022-03-09 02:40:36
Source: https://linuxhint.com/home-automation-arduino-uno/

Home automation has a great significance when it comes to controlling the appliances wirelessly because it makes it easy to turn on/off and monitor the appliances. Similarly, it can help in controlling the electricity bills and prevent human injury in case of any short circuit. In this guide we have created a home automation system using Arduino Uno and Bluetooth modules (HC-05) and for demonstration purposes we have considered two AC bulbs as the AC appliances.

Causes for Raspberry Pi Not Booting Up and How to Fix Them

Posted: 2022-03-09 02:37:12
Source: https://linuxhint.com/not-booting-up-issue-fix-raspberry-pi/

Raspberry Pi is a small and versatile device that offers many capabilities to every user who intends to use this device to perform daily life tasks. However, there are many people who are facing the Raspberry Pi boot issue and it has become challenging for most of the users who create projects on Raspberry Pi. This guide lists solutions to fix the not booting up issue of Raspberry Pi.

Best Apps for Kids on Raspberry Pi

Posted: 2022-03-09 02:35:53
Source: https://linuxhint.com/best-apps-for-kids-raspberry-pi/

The Raspberry Pi is a pretty useful device whose benefits are not restricted to adults but the kids may also enjoy many features of the Raspberry Pi device. If they are passionate to learn painting then installing MyPaint on the device would be a perfect option. For students to finish their daily assignments and projects, LibreOffice and Scratch 3 would be perfect choices in that case. Having the software PiKiss would be great when they wish to play classical games while the VLC media player would be an ideal pick for your kids to watch different animated movies on the Raspberry Pi desktop. This article lists these apps with description and their installation procedure.

Red Hat Is Discontinuing Sales and Services In Russia and Belarus

Posted: 2022-03-08 23:20:00
Source: https://linux.slashdot.org/story/22/03/08/2156210/red-hat-is-discontinuing-sales-and-services-in-russia-and-belarus?utm_source=atom1.0mainlinkanon&utm_medium=feed

Red Hat, the Raleigh-based open-source software company, said Tuesday it is halting all sales and services to companies in Russia and Belarus -- a response to the Russian invasion of Ukraine that has put Red Hat employees in harm's way. Raleigh News & Observer reports: Paul Cormier, Red Hat's chief executive officer, announced the decision in an email to employees, saying: "As a company, we stand in unity with everyone affected by the violence and condemn the Russian military's invasion of Ukraine." Red Hat's announcement comes a day after its parent company, IBM, which also has a large presence in the Triangle, suspended all business operations in Russia. "While relevant sanctions must guide many of our actions, we've taken additional measures as a company," Cormier wrote. "Effective immediately, Red Hat is discontinuing sales and services in Russia and Belarus (for both organizations located in or headquartered in Russia or Belarus)." Red Hat said it has approximately two dozen employees in Ukraine, which has become an important tech hub in Eastern Europe in recent years. It is home to tens of thousands of contractors and employees for U.S. firms. In his email, Cormier said that Red Hat has helped dozens of employees and family members in Ukraine relocate to safer locations. Many of them have gone to neighboring Poland, he noted. [...] However, Ukraine has barred men ages 18 to 60 from leaving the country, meaning many of Red Hat's employees can't be relocated from the country. We "continue to help those who remain in the country in any way possible," Cormier wrote.

Read more of this story at Slashdot.

5.16.13: stable

Posted: 2022-03-08 18:15:33
Source: http://www.kernel.org/

Version:5.16.13 (stable)
Released:2022-03-08
Source:linux-5.16.13.tar.xz
PGP Signature:linux-5.16.13.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.16.13

5.15.27: longterm

Posted: 2022-03-08 18:12:59
Source: http://www.kernel.org/

Version:5.15.27 (longterm)
Released:2022-03-08
Source:linux-5.15.27.tar.xz
PGP Signature:linux-5.15.27.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.15.27

5.10.104: longterm

Posted: 2022-03-08 18:09:45
Source: http://www.kernel.org/

Version:5.10.104 (longterm)
Released:2022-03-08
Source:linux-5.10.104.tar.xz
PGP Signature:linux-5.10.104.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.10.104

5.4.183: longterm

Posted: 2022-03-08 18:07:55
Source: http://www.kernel.org/

Version:5.4.183 (longterm)
Released:2022-03-08
Source:linux-5.4.183.tar.xz
PGP Signature:linux-5.4.183.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.4.183

4.19.233: longterm

Posted: 2022-03-08 18:04:14
Source: http://www.kernel.org/

Version:4.19.233 (longterm)
Released:2022-03-08
Source:linux-4.19.233.tar.xz
PGP Signature:linux-4.19.233.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-4.19.233

4.14.270: longterm

Posted: 2022-03-08 18:02:43
Source: http://www.kernel.org/

Version:4.14.270 (longterm)
Released:2022-03-08
Source:linux-4.14.270.tar.xz
PGP Signature:linux-4.14.270.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-4.14.270

4.9.305: longterm

Posted: 2022-03-08 18:01:05
Source: http://www.kernel.org/

Version:4.9.305 (longterm)
Released:2022-03-08
Source:linux-4.9.305.tar.xz
PGP Signature:linux-4.9.305.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-4.9.305

Archman 2022.03 overview | Fast, visual, stable and easy.

Posted: 2022-03-08 17:30:02
Source: https://www.youtube.com/watch?v=JINhsKvVDng

Simple Network Management Protocol - Not As Simple As You Would Suggest

Posted: 2022-03-08 17:00:00
Source: https://www.linuxjournal.com/content/simple-network-management-protocol-not-simple-you-would-suggest

Simple Network Management Protocol

The Simple Network Management Protocol (SNMP) has been an integral part of monitoring network environments since its introduction in 1988. It has established itself as the de facto standard in network monitoring. Many manufacturers support the protocol and have implemented an SNMP agent on their network devices. These agents allow monitoring solutions to query various data, such as bandwidth, CPU load, network interfaces, etc., without installing an additional agent on network equipment. 

Especially with the increasing number of devices on a network, a simple and established method such as SNMP sounds like a great help to include components in monitoring quickly. Unfortunately, SNMP has a few flaws. The first part of this article will explain how SNMP works, while the second part will drill deeper into the issues with SNMP and how to deal with them.

The protocol offers two methods to retrieve data from devices: polling and traps. With SNMP polling, a monitoring solution queries the data at user-specified time intervals from the SNMP agent. This active polling is used for status-based monitoring and is generally the recommended method. However, the disadvantage of SNMP polling is that the administrator does not notice if an event occurs between two queries, such as a brief change in the network interface status.

The alternative to SNMP polling is an event-based variant called SNMP traps. If a certain event occurs on the monitored device, it sends an error message to the monitoring instance. One of the disadvantages of SNMP traps is that the data packets transmitted via UDP can be lost. Since UDP does not acknowledge receipt of network packets, the administrator does not even know that an alert was sent if the packets containing the trap data are dropped. Thus, ironically, a problem on the network prevents the detection of another issue with a network device.

Another disadvantage of SNMP traps can be the flood of triggered messages. For example, suppose a core switch is no longer available. In that case, in large network environments, it can lead to thousands of switches sending traps. Even if it does not have an upstream filter mechanism, the trap receiver can collapse under such a load of error messages. Monitoring is then unavailable in an emergency. In addition, the administrator must re-reconfigure all components in the network if the IP address of the trap receiver changes.

Arduino millis() vs delay()

Posted: 2022-03-08 16:22:03
Source: https://linuxhint.com/millis-vs-delay-arduino/

For different operations there are a wide range of functions available that can be used in Arduino. The millis() and delay() are two functions that are associated with time and often used in Arduino programs. The millis() function gives the total time starting from the running of the Arduino code and will continue to run till the program is running. The delay() function is mainly used for pausing the Arduino code for some time. This article is a detailed guide on using millis() and delay() functions in Arduino programs and with examples.

Recovering Files from your PC (using Linux)

Posted: 2022-03-08 16:00:14
Source: https://www.youtube.com/watch?v=RmagSaz84tE

Linux Has Been Bitten By Its Most High-Severity Vulnerability in Years

Posted: 2022-03-08 15:23:00
Source: https://it.slashdot.org/story/22/03/08/1524203/linux-has-been-bitten-by-its-most-high-severity-vulnerability-in-years?utm_source=atom1.0mainlinkanon&utm_medium=feed

Cognitive Dissident writes: Ars Technica is reporting a major new vulnerability in Linux. Named "Dirty Pipeline" it involves abuse of 'pipes' at the shell level as you might guess. The name Dirty Pipe is meant to both signal similarities to Dirty Cow and provide clues about the new vulnerability's origins. "Pipe" refers to a pipeline, a Linux mechanism for one OS process to send data to another process. In essence, a pipeline is two or more processes that are chained together so that the output text of one process (stdout) is passed directly as input (stdin) to the next one. Tracked as CVE-2022-0847, the vulnerability came to light when a researcher for website builder CM4all was troubleshooting a series of corrupted files that kept appearing on a customer's Linux machine. After months of analysis, the researcher finally found that the customer's corrupted files were the result of a bug in the Linux kernel.

Read more of this story at Slashdot.

1 ... 506 507 508 509 ... 726