<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Home Computing Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/category/truthful-news/tech/tech-update/home-computing/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/tech-update/home-computing/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Mon, 23 Jun 2025 05:42:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>Home Computing Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/category/truthful-news/tech/tech-update/home-computing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Install Node-Red to Home Assistant &#8211; Using Node-Red for Complex Home Automations</title>
		<link>https://goodshepherdmedia.net/complex-home-automation-with-node-red-and-home-assistant/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 12 Jun 2025 08:57:22 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Automation]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[Complex Home Automation]]></category>
		<category><![CDATA[Complex Home Automations]]></category>
		<category><![CDATA[Home Assistant]]></category>
		<category><![CDATA[Home Assistant with Node-Red]]></category>
		<category><![CDATA[How to Install Node-Red]]></category>
		<category><![CDATA[Node-Red]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20775</guid>

					<description><![CDATA[How to Install Node-Red to Home Assistant &#8211; Using Node-Red for Complex Home Automations Node-RED is a flow-based, low-code development tool for visual programming, originally developed by IBM for wiring together hardware devices, APIs and online services as part of the Internet of things. Node-RED provides a web browser-based flow editor, which can be used [&#8230;]]]></description>
										<content:encoded><![CDATA[<header class="entry-header">
<h1><span style="color: #ff0000;">How to Install Node-Red to Home Assistant &#8211; Using Node-Red for Complex Home Automations</span></h1>
<p>Node-RED is a flow-based, low-code development tool for visual programming, originally developed by IBM for wiring together hardware devices, APIs and online services as part of the Internet of things. Node-RED provides a web browser-based flow editor, which can be used to create JavaScript functions.</p>
</header>
<p class="has-text-align-center">This guide will show you how to install Node-Red to Home Assistant and take you through a basic flow.</p>
<p>Node-Red is a low-code development tool for building simple to complex automation flows. The software runs within a web browser and works great within Home Assistant. The software is relatively easy to learn and allows easy viewing of complex logic flows.</p>
<p>Using Node-Red gives you an excellent visual overview of automation flows, making it much easier to understand, edit, and create. You can build flows that control automatic gates, lights, water pumps, and more.</p>
<p>If you haven’t already, we reco</p>
<p>This tutorial will explain how to install Node-Red to Home Assistant. We also go through the basics of setting up an automation flow. Both of these topics give you a decent insight into how you can get the most out of the software.</p>
<div id="AdThrive_Content_1_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-1 adthrive-ad-cls adthrive-video-stickyoutstream-new-player" data-google-query-id="CN75yfa_640DFS_rrQAd2XI7jg">
<h2 id="installing-node-red" class="wp-block-heading lbb-section-break mt-5 text-center">Installing Node-Red</h2>
<p><a href="https://nodered.org/" target="_blank" rel="noopener">Node-RED: Low-code programming for event-driven applications</a></p>
<p>The installation of Node Red is very straightforward, but there are a few requirements for a smooth installation process.</p>
<p>To install Node-Red within Home Assistant, you must run a version that supports add-ons such as supervised or the operating system. Alternatively, you can set up Node-Red as a separate docker and connect it to Home Assistant.</p>
<p><strong class="step_numbering">1.</strong> Within the Home Assistant web interface, click on the <strong>settings</strong> tab and then click on <strong>add-ons</strong>.</p>
<figure class="wp-block-image aligncenter size-full"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-20807" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Settings-Page-with-Add-Ons-1.webp" alt="" width="730" height="750" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Settings-Page-with-Add-Ons-1.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Settings-Page-with-Add-Ons-1-389x400.webp 389w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">2.</strong> Click on <strong>add-store</strong> in the bottom right corner of the screen.</p>
<figure class="wp-block-image aligncenter size-full"><img decoding="async" class="alignnone size-full wp-image-20806" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Click-on-Add-on-Store-Button-2.webp" alt="" width="730" height="596" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Click-on-Add-on-Store-Button-2.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Click-on-Add-on-Store-Button-2-400x327.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">3.</strong> Using the search box, search for <strong>Node Red</strong>. Alternatively, you can scroll through the page until you find the Node-Red add-on.</p>
<figure class="wp-block-image aligncenter size-full"><img decoding="async" class="alignnone size-full wp-image-20805" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Add-On-Store-Search-Node-Red.webp" alt="" width="730" height="256" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Add-On-Store-Search-Node-Red.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Add-On-Store-Search-Node-Red-400x140.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">4.</strong> The page you should now see will contain all the details about the add-on. You can check through all the details if you want to know what you are about to install. Once you are ready to install, click <strong>Install</strong>.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20804" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Install-Screen.webp" alt="" width="730" height="534" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Install-Screen.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Install-Screen-400x293.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">5.</strong> Now, navigate to the configuration tab. In this tab, locate the <code>credential_secret</code> field and enter a strong password. Make sure you save this password, as you may need it in the future. I use 1Password for storing passwords, but other software such as <a href="https://pimylifeup.com/raspberry-pi-bitwarden/">Bitwarden</a> or <a href="https://0g.pimylifeup.com/czn8ML/nordpass" target="_blank" rel="noreferrer noopener sponsored nofollow">Nordpass</a> (Affiliate Link) would also be solid choices.</p>
<p>You will also need to disable SSL if it is not enabled on your Home Assistant installation. To disable SSL, click the SSL button so it is greyed out. If you leave it on and Home Assistant does not support SSL, Node-Red will fail to start.</p>
<p>Once you are done, click on <strong>save</strong>.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20803" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Credential-Secret-and-Disable-SSL.webp" alt="" width="730" height="695" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Credential-Secret-and-Disable-SSL.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Credential-Secret-and-Disable-SSL-400x381.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">6.</strong> After you have saved the <strong>credential secret</strong> and <strong>disabled SSL</strong>, return to the <strong>info</strong> tab. On this page, click on “<strong>Start</strong>“. Node-Red should start without issue. If it is not starting, navigate to the <strong>log</strong> tab and look through the logs for errors.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20802" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Installed.webp" alt="" width="730" height="362" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Installed.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Home-Assistant-Node-Red-Installed-400x198.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<p><strong class="step_numbering">7.</strong> If you click on Node-Red in the sidebar or “<strong>Open Web UI</strong>” on the add-on page, it will take you to the Node-Red application. You can now start writing your flows to automate your Home Assistant setup.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20801" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Started.webp" alt="" width="730" height="410" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Started.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Started-400x225.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<div id="AdThrive_Content_10_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-10 adthrive-ad-cls" data-google-query-id="CLPJkZXA640DFX-YjggdCeEn2g">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_0__container__"></div>
</div>
<h2 id="creating-your-first-node-red-flow" class="wp-block-heading lbb-section-break mt-5 text-center">Creating your First Node-Red Flow</h2>
<p>Node-Red can be a little daunting at first, but once you understand the basics, it is a powerful tool that allows you to handle complex and simple automations.</p>
<p>In this short tutorial, we will go through the basics of creating a flow that uses a Home Assistant node.</p>
<p>The following steps will take you through how to send a notification whenever the temperature of our weather station exceeds 15°C.</p>
<p><strong class="step_numbering">1.</strong> The first node we will use is the “<strong>Events: State</strong>” node. Drag this node onto the grid</p>
<div id="AdThrive_Content_11_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-11 adthrive-ad-cls" data-google-query-id="COPJ1ZXA640DFYyAjggdCzAivw">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_1__container__"></div>
</div>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20800" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Create-Events-State-Node.webp" alt="" width="730" height="515" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Create-Events-State-Node.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Create-Events-State-Node-400x282.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<div id="AdThrive_Content_12_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-12 adthrive-ad-cls" data-google-query-id="CIbp8pXA640DFfmYjggdjYESSg">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_2__container__"></div>
</div>
<p>Next, double-click on the node to open the options available. Fill in each of the relevant properties. Below is what I filled in.</p>
<ul class="wp-block-list">
<li><strong>Name</strong>: Check Temperature</li>
<li><strong>Server</strong>: Home Assistant</li>
<li><strong>Entity</strong>: Outdoor Temperature</li>
<li><strong>If State</strong>: &gt;= 15 (Greater or equal to 15)</li>
<li><strong>For</strong>: 1 Minute</li>
<li><strong>State type</strong>: Number</li>
</ul>
<p>I also do not have any checkboxes ticked for “<strong>Ignore State Change Event When</strong>“.</p>
<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20799" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/State-Node-Properties.webp" alt="" width="730" height="1205" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/State-Node-Properties.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/State-Node-Properties-242x400.webp 242w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/State-Node-Properties-620x1024.webp 620w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<div id="AdThrive_Content_13_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-13 adthrive-ad-cls" data-google-query-id="CJvytZbA640DFfLprQAdVdUSiA">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_3__container__"></div>
</div>
<p><strong class="step_numbering">2.</strong> Next, drag and drop a debug node. These nodes will output data that can help diagnose and fix issues with your flows.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20798" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Nodes.webp" alt="" width="633" height="301" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Nodes.webp 633w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Nodes-400x190.webp 400w" sizes="(max-width: 633px) 100vw, 633px" /></figure>
<p>On each node, there are dots. These dots represent different functions. For example, our <strong>Check Temperature</strong> node has two dots. One is for when our logic is false, and the other for when it is true.</p>
<p>We click and drag our true node and connect it to the debug node.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20797" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Debug-Nodes.webp" alt="" width="501" height="234" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Debug-Nodes.webp 501w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Debug-Nodes-400x187.webp 400w" sizes="(max-width: 501px) 100vw, 501px" /></figure>
<div id="AdThrive_Content_14_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-14 adthrive-ad-cls" data-google-query-id="CMHO9JbA640DFcC0jggdZkAAjg">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_4__container__"></div>
</div>
<p>The flow will run when you click deploy in the top right-hand corner.</p>
<p>In this example, if the temperature exceeds 15°C, the debug node will output after 1 minute. If it is not higher than 15°C, nothing will output.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20796" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Sidebar-Debug-Info.webp" alt="" width="312" height="298" /></figure>
<p><strong class="step_numbering">3.</strong> Next, we will want to notify our users that the temperature is too high. To do this, drag a “<strong>Call Service</strong>” node onto the grid. Connect the true output to the input on the “<strong>Call Service</strong>” Node.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20795" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node.webp" alt="" width="544" height="219" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node.webp 544w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node-400x161.webp 400w" sizes="(max-width: 544px) 100vw, 544px" /></figure>
<div id="AdThrive_Content_15_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-15 adthrive-ad-cls" data-google-query-id="CO2HyJfA640DFcmZjggdo_wXWw">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_5__container__"></div>
</div>
<p>Now, double-click on the call service node to edit it. Fill in each of the relevant properties. Below is what I filled in.</p>
<ul class="wp-block-list">
<li><strong>Name</strong>: Enter the name that you want the node to be referred to.</li>
<li><strong>Server</strong>: You shouldn’t need to update this as it should be <strong>Home Assistant</strong>.</li>
<li><strong>Domain</strong>: You will need to set this to <strong>notify</strong>.</li>
<li><strong>Service</strong>: Choose a device that you wish to notify. Choosing the <strong>notify</strong> option will notify all possible users.</li>
<li><strong>Data</strong>: This is where you need to specify the notification details. At the bottom of the properties is an example. Clicking “<strong>Load Example Data</strong>” will pre-populate the data field, which you can easily edit.</li>
</ul>
<p>Below is an example of my entry into the data field.</p>
<pre class="wp-block-code language-json"><code class="header language-json"><span class="hljs-punctuation">{</span>
   <span class="hljs-attr">"message"</span><span class="hljs-punctuation">:</span><span class="hljs-string">"Temperature is too High!"</span><span class="hljs-punctuation">,</span>
   <span class="hljs-attr">"title"</span><span class="hljs-punctuation">:</span><span class="hljs-string">"The temperature is higher than 15°C."</span>	
<span class="hljs-punctuation">}</span></code><a class="copy-code-block fa-copy" href="https://pimylifeup.com/install-node-red-home-assistant/#copy" aria-label="Copy code to clipboard">Copy</a></pre>
<div id="AdThrive_Content_16_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-16 adthrive-ad-cls" data-google-query-id="CMrL-JfA640DFeqEjggdPM8ijw">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_6__container__"></div>
</div>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20794" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node-Properties.webp" alt="" width="531" height="807" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node-Properties.webp 531w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Call-Service-Node-Properties-263x400.webp 263w" sizes="(max-width: 531px) 100vw, 531px" /></figure>
<div id="AdThrive_Content_17_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-17 adthrive-ad-cls" data-google-query-id="CLizl5jA640DFZLArQAdHhQDfQ">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_7__container__"></div>
</div>
<p><strong class="step_numbering">4.</strong> To avoid too many notifications, you may want to place a <strong>delay</strong> node. This node will allow a single notification to be sent for a specified time. To do this, drag and drop a <strong>delay node</strong> in between our check temperature and notify gus nodes.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20793" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Rate-Limit.webp" alt="" width="855" height="262" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Rate-Limit.webp 855w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Rate-Limit-400x123.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Rate-Limit-768x235.webp 768w" sizes="(max-width: 855px) 100vw, 855px" /></figure>
<p>Double-click on the delay node and update the settings to the following.</p>
<ul class="wp-block-list">
<li><strong>Action</strong>: Rate Limit and All Messages.</li>
<li><strong>Rate</strong>: 1 msg(s) per 15 minutes.</li>
<li>Change <strong>Queue Intermediate Messages</strong> to <strong>Drop Intermediate Messages</strong></li>
<li><strong>Name</strong>: Rate Limit</li>
</ul>
<div id="AdThrive_Content_18_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-18 adthrive-ad-cls" data-google-query-id="CJavsZjA640DFarArQAdu-I0eA">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_8__container__"></div>
</div>
<p>These properties will allow a single message every fifteen minutes. Any messages that try to be sent in the meantime will be dropped.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20792" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Delay-Node-Properties-v2.webp" alt="" width="493" height="434" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Delay-Node-Properties-v2.webp 493w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Delay-Node-Properties-v2-400x352.webp 400w" sizes="(max-width: 493px) 100vw, 493px" /></figure>
<div id="AdThrive_Content_19_desktop" class="adthrive-ad adthrive-sticky-container adthrive-content adthrive-content-19 adthrive-ad-cls" data-google-query-id="COa24ZjA640DFUy-jggd3GY6fw">
<div id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_9__container__"><iframe id="google_ads_iframe_/18190176,22523461534/AdThrive_Content/5c49e4afdf7d2523f3865216_9" tabindex="0" title="3rd party ad content" src="https://2ce263ff02c48bd25ced62d985b69e18.safeframe.googlesyndication.com/safeframe/1-0-45/html/container.html" name="" width="1" height="1" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" sandbox="allow-forms allow-popups allow-popups-to-escape-sandbox allow-same-origin allow-scripts allow-top-navigation-by-user-activation" data-is-safeframe="true" aria-label="Advertisement" data-google-container-id="v" data-load-complete="true" data-mce-fragment="1"></iframe></div>
</div>
<p><strong class="step_numbering">5.</strong> You should now have a basic flow that will notify users whenever the temperature goes above 15°C for over a minute. Feel free to change and alter this flow for other purposes.</p>
<p>You can remove the debug node if you are finished debugging. Alternatively, you can click the green square next to the node to deactivate it.</p>
<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20791" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Disable-Debug.webp" alt="" width="730" height="224" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Disable-Debug.webp 730w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-Red-Disable-Debug-400x123.webp 400w" sizes="(max-width: 730px) 100vw, 730px" /></figure>
<h2 id="conclusion" class="wp-block-heading lbb-section-break mt-5 text-center">Conclusion</h2>
<p>I hope you now have Node-Red installed and configured on your Home Assistant installation. Our basic flow introduced some basics of using the software to run automations. Once you understand the basics, you can create some cool automations using the data from some of the sensors and devices in your home.</p>
<p>We are constantly working on more Home Assistant tutorials, so if there is anything that you would like to see, please let us know. I recommend checking out some of the other tutorials for great ideas on what you can do with this amazing software.</p>
<p>If you encounter any problems or have any suggestions, please do not hesitate to leave a comment down below. <a href="https://pimylifeup.com/install-node-red-home-assistant/" target="_blank" rel="noopener">source</a></p>
</div>
<div data-google-query-id="CN75yfa_640DFS_rrQAd2XI7jg"></div>
<div data-google-query-id="CN75yfa_640DFS_rrQAd2XI7jg">
<hr />
</div>
<div class="field field-name-field-title-article field-type-text field-label-hidden">
<div class="field-items">
<h1 class="field-item even">Node-RED, the visual programming tool for Internet of Things</h1>
<div class="blog-header">
<div class="field field-name-field-title-article field-type-text field-label-hidden">
<div class="field-items"></div>
</div>
</div>
<div class="blog-image">
<div class="field field-name-field-media field-type-media field-label-hidden">
<div class="field-items">
<div class="field-item even">
<div id="file-920" class="file file-image file-image-png">
<h2 class="element-invisible"></h2>
<div class="content"><img loading="lazy" decoding="async" class="alignnone  wp-image-20809" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-1024x568.png" alt="" width="1006" height="558" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-1024x568.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-400x222.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-768x426.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-1536x852.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-example-article-hello-world_1-1-2048x1136.png 2048w" sizes="(max-width: 1006px) 100vw, 1006px" /></div>
</div>
</div>
</div>
</div>
</div>
<div class="blog-content">
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<p>&nbsp;</p>
<p>From the beginning of programming, one of the industry’s main challenges has been to <strong>facilitate the applications development to simplify the integration</strong> between the hardware devices, the software and us, the humans. Thanks to Node-RED we are much closer of this goal. <strong>Programming, without programming</strong>.</p>
<p><strong>What is Node-RED and what is it for?</strong></p>
<p>Node-RED is an open-source development tool based on visual programming that was created by IBM to connect hardware devices, APIs and online services.</p>
<p>Node-RED is a solid tool, easy to learn, and it does not require any programming knowledge. It has been consolidated as one of the main applications for <strong>real-time data management and transformation</strong> for IoT and Industry 4.0 solutions.</p>
<p>Node-RED allows to graphically connect predefined blocks, called nodes, to develop a concrete task. The nodes connection, usually a combination of input nodes, processing nodes and output nodes, when wired together, make up a flow.</p>
<p>Among all the available nodes we can find standard protocols as <strong>MQTT, REST, Modbus, OPC-UA, Bacnet, Websocket</strong>; and third party API integrations as <strong>Microsoft Azure, Amazon Web Services, Twitter, Facebook</strong> and many more.</p>
<p>&nbsp;</p>
<div align="center"><img loading="lazy" decoding="async" class="size-full wp-image-20811 alignnone" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node_red_mqtt_modbus_example.png" alt="" width="681" height="478" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node_red_mqtt_modbus_example.png 681w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node_red_mqtt_modbus_example-400x281.png 400w" sizes="(max-width: 681px) 100vw, 681px" /></div>
<p>&nbsp;</p>
<p><strong>Where can I install Node-RED?</strong></p>
<p>Node-RED is built on Node.js, taking full advantage of its power and <strong>assuring scalability, liability and low hardware requirements</strong>. These features allow to run Node-RED in personal <strong>computers, cloud servers and low-cost embedded</strong> hardware.</p>
<p>If you want to take your first steps in Node-RED you just need to click <a href="https://nodered.org/docs/getting-started/">here</a> to access to all the documentation. Follow step by step how to install the tool on your computer, your cloud services regular provider or your embedded device <a href="https://www.pickdata.net/emanager-industrial-iot-modular-controller-edge-computing">eManager</a>.</p>
<p>&nbsp;</p>
<p><strong>Nodes library</strong></p>
<p>The nature of the tool, being open source, and the facility to develop new nodes, come together into a <a href="https://flows.nodered.org/">nodes library</a> which grows each day with new community contributions.</p>
<p>Nowadays we can find <strong>more than 2500 available nodes</strong> in the Node-RED official library, including Smart Home integrations, converters between IoT protocols, geolocation functions, OAuth2 authentication and many more.</p>
<p>&nbsp;</p>
<p><strong>Hello world in Node-RED</strong></p>
<p>To conclude this article there is no better way than taking your first steps on Node-RED generating the classic Hello world. Below, we show step by step the process to achieve it:</p>
<p><strong>Message creation with Inject node</strong></p>
<ol>
<li>If you are running Node-RED on your computer, you can access <a href="http://127.0.0.1:1880/">http://127.0.0.1:1880</a> or whatever address or hostname you’re using</li>
<li>If it is our first time in Node-RED, we will see a flow named <em>Flow 1</em></li>
<li>On the node palette on the left side of the Node-RED, we will select the <em>Inject</em> node and will drag it onto our flow</li>
<li>In order to edit the node we will double click on it. After that, we will select <em>string </em>on the Payload field and we will write <strong>Hello world!</strong></li>
<li>Once we finish the previous steps, we click Done</li>
</ol>
<div align="center"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20812" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-1.png" alt="" width="681" height="523" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-1.png 681w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-1-400x307.png 400w" sizes="(max-width: 681px) 100vw, 681px" /></div>
<p><strong>Printing our message</strong></p>
<ol>
<li>In order to add a destination for our message we will select the <em>Debug</em> node. We will click and drag it onto our flow. It’s very important to place it on the right-hand side of the <em>Inject</em> node</li>
<li>To connect both nodes we just need to click the <em>Inject</em> node&#8217;s output and drag it to the <em>Debug</em> node&#8217;s input. A wire that links both nodes will be created</li>
<li><em>Debug</em> node will automatically print the message to the console window as we will see in the next step</li>
</ol>
<div align="center"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20813" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-2.png" alt="" width="681" height="522" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-2.png 681w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-2-400x307.png 400w" sizes="(max-width: 681px) 100vw, 681px" /></div>
<p><strong>Deployment</strong></p>
<ol>
<li>In order to start our application you must click on <em>Deploy</em> button</li>
<li>Now click the <em>Debug</em> tab in the right-hand side of the editor window</li>
<li>Finally, to launch our message you will click on the blue button coming out from the left-hand side of the <em>Inject</em> node</li>
<li>“Hello world” will appear on the <em>Debug</em> screen. Welcome to <strong>Node-RED</strong>!</li>
</ol>
<div align="center"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20814" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-3.png" alt="" width="1001" height="524" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-3.png 1001w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-3-400x209.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/Node-RED-Hello-World-PickData-3-768x402.png 768w" sizes="(max-width: 1001px) 100vw, 1001px" /></div>
<p>&nbsp;</p>
<p>As PickData, we firmly believe in solutions like Node-RED, because those allow you to focus on what really matters, <strong>bring our added value to the solutions</strong> and skip losing time between ins and outs of the usual programming. <a href="https://www.pickdata.net/news/node-red-visual-programming-tool-iot" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
<div></div>
</div>
</div>
<hr />
<h1 class="article-header-title">Node-RED has replaced my complex Home Assistant automations, and it does them so much better</h1>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-20815" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant.avif" alt="" width="1442" height="810" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant.avif 2200w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-1024x575.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-768x431.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-1536x863.avif 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/deploy-options-in-node-red-in-home-assistant-2048x1151.avif 2048w" sizes="(max-width: 1442px) 100vw, 1442px" /></p>
<p class="adsninja-injected-repeatable-ad-afterend">The self-hosting ecosystem is rife with cool and quirky apps designed to automate every facet of your life. There’s the holy <a href="https://www.xda-developers.com/use-terraform-with-proxmox/" target="_blank" rel="noopener">Terraform</a> and <a href="https://www.xda-developers.com/ansible-automation/" target="_blank" rel="noopener">Ansible</a> combo for home lab enthusiasts who love watching VMs come to life without pressing a single button, while n8n can handle all software-based automations. On the smart home side, you’ll often find <a href="https://www.xda-developers.com/beginners-guide-to-setting-up-home-assistant/" target="_blank" rel="noopener">Home Assistant</a> as the most recommended utility for creating schematics to control your IoT gadgets. And well, HASS can serve you well with its trigger-action workflows.</p>
<p>For YAML experts, you can even design long scripts to automate your smart home. But once you get into complicated workflows involving multiple sensors, actuators, and if-else statements, HASS starts to become rather unintuitive. While I still rely on Home Assistant for quick automations, Node-RED is my preferred platform for creating extended automation workflows spanning several smart devices in my living space.</p>
<div id="220d-4a48-b2cfb421ee77" class="display-card  article article-card small  no-badge  active-content                      " data-include-community-rating="false" data-nosnippet="">
<div class="w-img ">
<div class="body-img landscape ">
<div class="responsive-img  img-featured-4-pin-single-size-featured-secondary" data-img-url="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/home-assistant-frigate.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20816" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-frigate.avif" alt="" width="844" height="536" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-frigate.avif 844w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-frigate-400x254.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-frigate-768x488.avif 768w" sizes="(max-width: 844px) 100vw, 844px" /></figure>
</div>
</div>
</div>
<div class="w-display-card-content regular article-block">
<p class="display-card-excerpt">There&#8217;s nothing you can&#8217;t pull off with Home Assistant blueprints</p>
<div class="w-display-card-extra"></div>
<div class="w-display-card-details">
<div class="w-display-card-meta"></div>
</div>
</div>
</div>
<h2 id="it-pairs-well-with-my-home-assistant-devices">It pairs well with my Home Assistant devices</h2>
<h3 id="but-hass-isn-rsquo-t-the-only-data-server-for-my-node-red-instance">But HASS isn’t the only data server for my Node-RED instance</h3>
<p>I consider Home Assistant the centerpiece of my rat’s nest of an apartment and have mapped most smart devices, IoT gadgets, and even home lab equipment (via HACS integrations) to my HASS hub. As such, it acts as a data-gathering terminal in addition to its role as a control center.</p>
<p>Since my Node-RED instance is connected to my HASS server, it can directly grab statistics from my devices and push any message payloads I define in my custom workflows. I use a standalone Node-RED container instead of running it on top of Home Assistant, so I don’t have to rely on just HASS for my smart home automation.</p>
<p class="adsninja-injected-repeatable-ad-afterend">On that subject, I’ve already connected my Node-RED server to a Raspberry Pi-based MQTT broker, so I can automate MQTT communication with just these services. Heck, it even integrates with external APIs and webhooks, making it perfect for the times when I want to use the VMs and containers from my Proxmox server for my home automation projects.</p>
<h2 id="amazing-for-automation-chains">Amazing for automation chains</h2>
<h3 id="the-node-based-workflow-makes-everything-easier">The node-based workflow makes everything easier</h3>
<div class="body-img landscape ">
<div class="responsive-img  image-expandable  img-article-item" data-img-url="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/03/node-red-home-assistant-1.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20817" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1.avif" alt="" width="1650" height="928" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1.avif 1650w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1-768x432.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-home-assistant-1-1536x864.avif 1536w" sizes="(max-width: 1650px) 100vw, 1650px" /></figure>
</div>
</div>
<p>Upon first glance, a Node-RED canvas filled to the brim with node chains, functions, and variables can seem intimidating. However, the ability to represent every device as a node makes it easy to organize everything, and I can import multiple IoT products inside a single workflow.</p>
<p>On Home Assistant, I’d have to cycle between the Entities, Helpers, Scripts, and Events tabs every time I want to create a multi-device automation chain. Besides the added advantage of accessing my smart devices from a single page, Node-RED lets me reuse the function nodes as many times as I want, which is a godsend for projects requiring complex if-else logic with branching instructions.</p>
<h3 id="no-more-yaml-shenanigans">No more YAML shenanigans</h3>
<div class="valnet-gallery">
<div id="article-gallery-1-645238902" class="article__gallery type-gallery " data-gallery-thumbnail-id="gallery-thumbnails-1-645238902" data-gallery-id="main-carousel-1-645238902" data-article-gallery="article-gallery-modal-1-645238902" data-gallery-lightbox="gallery-modal-1-645238902" data-gallery-thumbnail-img-class="gallery-thumbnails-1-645238902-img">
<div class="w-gallery-carousel">
<section id="main-carousel-1-645238902" class="splide splide-gallery splide--fade splide--ltr splide--draggable is-active is-overflow is-initialized" data-gallery-expanded-id="main-expanable-carousel-1-645238902" data-gallery-expanded-thumbnail-id="expanded-gallery-thumbnails-1-645238902" aria-roledescription="carousel">
<div class="splide__arrows splide__arrows--ltr"><img loading="lazy" decoding="async" class="alignnone  wp-image-20818" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library.avif" alt="" width="1124" height="640" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library.avif 2458w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-400x228.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-1024x583.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-768x437.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-1536x875.avif 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/collections-in-node-red-library-2048x1166.avif 2048w" sizes="(max-width: 1124px) 100vw, 1124px" /></div>
<div id="main-carousel-1-645238902-track" class="splide__track splide__track--fade splide__track--ltr splide__track--draggable" aria-live="polite" aria-atomic="true">
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-20819" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant.avif" alt="" width="1226" height="690" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/easily-adding-a-connecting-node-on-flow-sheet-in-node-red-with-home-assistant-768x432.avif 768w" sizes="(max-width: 1226px) 100vw, 1226px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20820" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-automation-nodes-in-node-red-library-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<picture><source srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=750&amp;h=422&amp;dpr=2" media="(min-width: 1024px)" data-srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=750&amp;h=422&amp;dpr=2" /><source srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=735&amp;h=413&amp;dpr=2" media="(min-width: 768px)" data-srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=735&amp;h=413&amp;dpr=2" /><source srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=705&amp;h=397&amp;dpr=2" media="(min-width: 481px)" data-srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=705&amp;h=397&amp;dpr=2" /><source srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=360&amp;h=202&amp;dpr=2" media="(min-width: 0px)" data-srcset="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg?q=49&amp;fit=crop&amp;w=360&amp;h=202&amp;dpr=2" /><img loading="lazy" decoding="async" class="" src="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg" alt="Right-click options for a node in Node-RED with Home Assistant" width="1316" height="740" data-img-url="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/05/right-click-options-for-node-in-node-red-with-home-assistant.jpg" /><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20822" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/right-click-options-for-node-in-node-red-with-home-assistant-1-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></picture>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20823" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-backup-2-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
</div>
</section>
<section id="gallery-thumbnails-1-645238902" class="splide gallery-thumbnails splide--slide splide--ltr splide--draggable splide--nav is-active is-overflow is-initialized" aria-roledescription="carousel">
<div id="gallery-thumbnails-1-645238902-track" class="splide__track splide__track--slide splide__track--ltr splide__track--draggable splide__track--nav"></div>
</section>
</div>
</div>
</div>
<p>Although YAML syntax is nowhere near as complex as a mainstream programming language’s coding rules, it’s a pain to design complicated workflows with it. Home Assistant makes YAML scripting somewhat easy with the Developer Tools tab, but it’s far from the most intuitive option, especially since I can just use Node-RED.</p>
<p class="adsninja-injected-repeatable-ad-beforebegin">That’s because Node-RED has a minimal coding approach, as even the most complicated automation can be arranged in a node-based workflow. This visual aspect makes it easier to add nested logic, chains of loops, and long branches in a Node-RED canvas. As if that’s not enough, I can install custom modules and libraries for most communication protocols and external APIs in Node-RED.</p>
<h3 id="solid-troubleshooting-provisions">Solid troubleshooting provisions</h3>
<div class="body-img landscape ">
<div class="responsive-img  image-expandable  img-article-item" data-img-url="https://static1.xdaimages.com/wordpress/wp-content/uploads/wm/2025/02/node-red-blinds.jpg" data-modal-id="single-image-modal" data-modal-container-id="single-image-modal-container" data-img-caption="&quot;&quot;">
<figure><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20824" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds.avif" alt="" width="1650" height="928" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds.avif 1650w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds-768x432.avif 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/node-red-blinds-1536x864.avif 1536w" sizes="(max-width: 1650px) 100vw, 1650px" /></figure>
</div>
</div>
<p>Finally, Node-RED makes finding errors in my workflow a cinch. It’s a lot easier to detect errors in a Node-RED-based flow than a huge YAML file, where I can have several indentation errors because of accidentally pressing the Spacebar or Enter keys. In contrast, my mistakes are infinitely easier to catch on Node-RED’s canvas, as I can see how the different gadgets affect each other.</p>
<h3 id="that-said-hass-is-better-for-simple-automation-projects">That said, HASS is better for simple automation projects</h3>
<div class="valnet-gallery">
<div id="article-gallery-2-495544307" class="article__gallery type-gallery " data-gallery-thumbnail-id="gallery-thumbnails-2-495544307" data-gallery-id="main-carousel-2-495544307" data-article-gallery="article-gallery-modal-2-495544307" data-gallery-lightbox="gallery-modal-2-495544307" data-gallery-thumbnail-img-class="gallery-thumbnails-2-495544307-img">
<div class="w-gallery-carousel">
<section id="main-carousel-2-495544307" class="splide splide-gallery splide--fade splide--ltr splide--draggable is-active is-overflow is-initialized" data-gallery-expanded-id="main-expanable-carousel-2-495544307" data-gallery-expanded-thumbnail-id="expanded-gallery-thumbnails-2-495544307" aria-roledescription="carousel"><button class="expand icon i-expand" type="button" data-stnl="{&quot;category&quot;:&quot;Click Interactions&quot;,&quot;name&quot;:&quot;Image Gallery&quot;,&quot;action&quot;:&quot;Gallery Fullscreen Open&quot;}"></button></p>
<div class="splide__arrows splide__arrows--ltr"></div>
<div id="main-carousel-2-495544307-track" class="splide__track splide__track--fade splide__track--ltr splide__track--draggable" aria-live="polite" aria-atomic="true">
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20825" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-community-store-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20826" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-dynamic-notifications-llm-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20827" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-5-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20828" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-mqtt-4-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20829" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5.avif" alt="" width="1500" height="844" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5.avif 1500w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5-400x225.avif 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5-1024x576.avif 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/home-assistant-blueprints-5-768x432.avif 768w" sizes="(max-width: 1500px) 100vw, 1500px" /></p>
</div>
</section>
</div>
</div>
</div>
<p class="adsninja-injected-repeatable-ad-afterend">So far, I’ve only discussed why Node-RED suits my smart home projects. But I’d be biased if I didn’t talk about its drawbacks. Despite providing easier methods for automating complex projects, Node-RED has a steeper learning curve than Home Assistant. Plus, community-created blueprints are a neat utility in Home Assistant for casual users who want to quick put together motion-controlled lights.</p>
<div class="an-injected" data-estimated-y-top="5406.96891784668" data-estimated-y-bottom="5556.96891784668" data-estimated-x-left="80.33333587646484" data-estimated-x-right="830.3333358764648">
<div id="adsninja-ad-zone-div-gpt-ad-1553804529761-ccr-REPEAT2" class="adsninja-ad-zone an-zone an-zone-content-character_count_repeatable an-can-change an-injector-zone an-zone-d in-sticky-content">
<div id="dynamically-injected-refresh-ad-zone-div-gpt-ad-1553804529761-ccr-REPEAT2" class="dynamically-injected-refresh-ad-zone" data-original-ad-element-id="div-gpt-ad-1553804529761-ccr-REPEAT2" data-current-ad-element-id="div-gpt-ad-1553804529761-ccr-REPEAT2" data-refresh-count="0" data-not-bidding-count="0" data-floating-allowed="true" data-refreshing-allowed="true">
<div class="ad-current">
<div id="ad-zone-container-div-gpt-ad-1553804529761-ccr-REPEAT2" class="ad-zone-container ad-zone-container-content-character-count-repeatable adsninja-ad-zone-container-with-set-height ad-zone-container-background-details-enabled ad-zone-container-loading-animation-enabled ad-loaded" data-no-fill-collapsable="false">
<div id="ad-zone-size-container-div-gpt-ad-1553804529761-ccr-REPEAT2" class="ad-zone-size-container ad-zone-size-container-content-character-count-repeatable">
<div class="ad-zone ad-zone-content-character-count-repeatable  ">
<div class="ad-zone-inline ad-zone-inline-content-character-count-repeatable">
<div id="div-gpt-ad-1553804529761-ccr-REPEAT2" data-google-query-id="CJG7x7LE640DFbuYjggdCL4PjQ">
<div id="google_ads_iframe_/39363775/XDA-Developers/Article_InContent_Desktop_3__container__"></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>However, if you’re looking to build something as convoluted as a surveillance system that automatically turns on the lights and sets the right thermostat temperature when it detects your presence, it’s a good idea to go with Node-RED as your automation platform. <a href="https://www.xda-developers.com/node-red-has-replaced-my-complex-home-assistant-automations/" target="_blank" rel="noopener">source</a></p>
<hr />
<h1>Home Assistant with Node-Red</h1>
<p><iframe title="Node-Red Tutorial - Common Nodes Explained! (Chapters in the Timestamps) #nodered" width="640" height="360" src="https://www.youtube.com/embed/0osGkVHMugI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<header class="entry-header">
<div class="entry-meta"></div>
</header>
<div class="entry-thumbnail"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20778" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1.png" alt="" width="983" height="777" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1.png 983w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1-400x316.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1-768x607.png 768w" sizes="(max-width: 983px) 100vw, 983px" /></div>
<div class="entry-content">
<p><a href="https://www.home-assistant.io/">Home Assistant</a> is an open source home automation platform that can monitor and control smart home devices and it integrates with many of other common systems.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20779" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo.png" alt="" width="1112" height="863" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo.png 1112w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo-400x310.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo-1024x795.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_demo-768x596.png 768w" sizes="(max-width: 1112px) 100vw, 1112px" /></p>
<p>Home Assistant installation is targeted for Raspberry Pi’s but other hardware options are available.</p>
<p>I was very impressed how easy it was to install Home Assistant and get a basic home integration system up and running.</p>
<p>There is a huge number of integration solutions (1500+) that connect to most of the mainstream products. However if you want to do some custom Arduino or Raspberry Pi connections there isn’t an easy “out of the box” solution.  To solve this requirement Home Assistant has included <a href="https://nodered.org/">Node-Red</a> as an add-on.</p>
<p>Node-RED is a visual programming tool for wiring together hardware devices, APIs and online services.</p>
<p>I found that getting the Node-Red integration was a little tricky. This blog will show how to get Node-Red integration working and it includes a simple simulator circuit.</p>
<h2>Getting Started</h2>
<p>The <a href="https://www.home-assistant.io/getting-started/" target="_blank" rel="noopener">installation instructions</a> are very straightforward. I would recommend using a wired connection for your Raspberry Pi. A wireless network connection is 100% possible but it is not in the base installation directions.</p>
<p>After the basic installation is complete, add-ons can be installed under the Supervisor-&gt;Dashboard. I would recommend installing “File editor” and “Terminal &amp; SSH” add-ons along with Node-Red.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20780" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_addons.png" alt="" width="983" height="777" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_addons.png 983w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_addons-400x316.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_addons-768x607.png 768w" sizes="(max-width: 983px) 100vw, 983px" /></p>
<p>I found that the Node-Red installed without any problems but it required some configuration changes before it would run.</p>
<p>In the Node Red add-on you will need to add a credential_secret and a password.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20781" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_config.png" alt="" width="291" height="354" /></p>
<p>If Node-Red doesn’t start look at the log for errors (it’s at the bottom of the same page).</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20782" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_log.png" alt="" width="638" height="781" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_log.png 638w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_log-327x400.png 327w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<p>The base Node-Red installation has a very good selection of pre-installed nodes. If you wish to add more nodes see the “Manage Pallet” option that is accessed from the top right options icon.</p>
<p>At this stage Node-Red is somewhat standalone and it is not fully integrated with Home Assistant.</p>
<h2>Integrating Node-Red with Home Assistant</h2>
<p>The <a href="https://github.com/zachowj/hass-node-red">directions and files for Node-Red integration</a>  can be downloaded to your PC.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20783" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files.png" alt="" width="1036" height="612" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files.png 1036w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files-400x236.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files-1024x605.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_nr_int_files-768x454.png 768w" sizes="(max-width: 1036px) 100vw, 1036px" /></p>
<p>Specifically you want to <em><strong>custom_components/nodered</strong></em> directory and files, which will need to be moved to the Raspberry Pi. The Home Assistant “File editor” add-on can be used to create Pi directories and move files from your PC.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20784" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files.png" alt="" width="1299" height="780" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files.png 1299w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files-400x240.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files-1024x615.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nodered_files-768x461.png 768w" sizes="(max-width: 1299px) 100vw, 1299px" /></p>
<p>The following directories and file should now exist:</p>
<pre>/root/config/custom_components/nodered/__init__.py
/root/config/custom_components/nodered/__pycache__
/root/config/custom_components/nodered/binary_sensor.py
/root/config/custom_components/nodered/config_flow.py
/root/config/custom_components/nodered/const.py
/root/config/custom_components/nodered/discovery.py
/root/config/custom_components/nodered/manifest.json
/root/config/custom_components/nodered/save.txt
/root/config/custom_components/nodered/sensor.py
/root/config/custom_components/nodered/services.yaml
/root/config/custom_components/nodered/switch.py
/root/config/custom_components/nodered/websocket.py

/root/config/custom_components/nodered/.translations/en.json</pre>
<p>Once this is complete Home Assistant will need to be restarted.</p>
<h2>Including Node-Red Integrations</h2>
<p>The next step is to create sensors and switches in Node-Red that can be accessed in Home Assistant. Below is a simple circuit that sends a random number (0-100) to a HA entity.</p>
<p>This logic uses a <em>Big Timer</em> node, that generates a pulse every minute from the middle output pin. An <em>injector</em> node allow you to force a new value. A <em>random</em> node will output a new random number whenever the <em>Big Timer</em> or <em>Inject</em> nodes are triggered.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20785" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit.png" alt="" width="1207" height="415" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit.png 1207w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit-400x138.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit-1024x352.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_circuit-768x264.png 768w" sizes="(max-width: 1207px) 100vw, 1207px" /></p>
<p>Double-click on the HA entity to configure the HA server and other properties.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20786" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config.png" alt="" width="1141" height="563" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config.png 1141w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config-400x197.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config-1024x505.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entity_config-768x379.png 768w" sizes="(max-width: 1141px) 100vw, 1141px" /></p>
<p>Once the logic is complete click the “Deploy” button to make the logic active.</p>
<p>Node-Red integration is enabled by adding it in the Configuration-&gt;Integration page.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20787" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int.png" alt="" width="1138" height="965" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int.png 1138w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int-400x339.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int-1024x868.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_new_int-768x651.png 768w" sizes="(max-width: 1138px) 100vw, 1138px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20788" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entities.png" alt="" width="898" height="551" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entities.png 898w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entities-400x245.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/nr_entities-768x471.png 768w" sizes="(max-width: 898px) 100vw, 898px" /></p>
<h2>Overview Dashboard with Node-Red Data</h2>
<p>The final step is to modify the Overview Dashboard to include the Node-Red Entity.</p>
<p>For this example I added a gauge component using the Orange-Plus at the bottom right of this Configure UI page.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20789" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/config_ui.png" alt="" width="922" height="874" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/config_ui.png 922w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/config_ui-400x379.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/config_ui-768x728.png 768w" sizes="(max-width: 922px) 100vw, 922px" /></p>
<p>On the live Overview page it is possible to click on the gauge card and get more information about this sensor.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20778" src="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1.png" alt="" width="983" height="777" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1.png 983w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1-400x316.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/06/ha_overview1-768x607.png 768w" sizes="(max-width: 983px) 100vw, 983px" /></p>
<h2>Final Thoughts</h2>
<p>Home Assistant is a very well structured home automation solution that offers a number of excellent approaches to bring in data.</p>
<p>Node-Red is a very flexible programming environment that help expands connectivity to Arduino, Raspberry Pi and other 3rd party services that are not in the base Home Assistant software.</p>
<p class="entry-title"><a href="https://funprojects.blog/2020/03/23/home-assistant-with-node-red/" target="_blank" rel="bookmark noopener">source</a></p>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>30 years ago: When the C64 and Amiga pioneer Commodore went bankrupt</title>
		<link>https://goodshepherdmedia.net/30-years-ago-when-the-c64-and-amiga-pioneer-commodore-went-bankrupt/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Wed, 21 May 2025 22:17:26 +0000</pubDate>
				<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Entertainment]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Interestingly Extinct Technology]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[C64]]></category>
		<category><![CDATA[Commodore]]></category>
		<category><![CDATA[Commodore 64]]></category>
		<category><![CDATA[Commodore went bankrupt]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20434</guid>

					<description><![CDATA[30 years ago: When the C64 and Amiga pioneer Commodore went bankrupt 30 years ago today, the home computer era came to an end with the bankruptcy of Commodore. For fans of the cult computers C64 and Amiga, it is a day of mourning Commodore International filed for bankruptcy on April 29, 1994. The company was [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class=" a-article-header__title " dir="ltr" style="text-align: center;">30 years ago: When the C64 and Amiga pioneer Commodore went bankrupt</h1>
<blockquote>
<h3 style="text-align: center;"><span style="color: #0000ff;"><em>30 years ago today, the home computer era came to an end with the bankruptcy of Commodore. For fans of the cult computers C64 and Amiga, it is a day of mourning</em></span></h3>
</blockquote>
<p><span data-huuid="14230975140500532229">Commodore International filed for bankruptcy on <mark class="QVRyCf">April 29, 1994</mark>. The company was later liquidated, with its assets purchased by the German company Escom. </span><span data-huuid="14230975140500530860">Escom then continued to develop the Amiga line until they also went bankrupt in July 1996.<span class="pjBG2e" data-cid="56861176-f0d6-4ad4-8d28-e6861a7f35af"><span class="UV3uM"> </span></span></span></p>
<p>April 29, 1994, was a sad day for many computer nerds. With the insolvency of Commodore, a pioneer disappeared from the market, a company that shaped the home computer sector like no other with computers such as the C64 or Amiga. It was the end of a slow decline and the result of many wrong and inflexible decisions &#8211; Commodore often reacted too late to market developments and had no suitable response to the shift towards PCs and modern consoles.</p>
<p>Jack Tramiel founded Commodore. Born Idek Trzmiel in Poland, he was a Jewish child who survived the concentration camp in Auschwitz and forced labor in Ahlen near Hanover. After the war, he moved to the USA. In 1948, he learned basic technical skills in the US Army, which he later deepened as a typewriter mechanic in New York.</p>
<figure>
<div><img loading="lazy" decoding="async" class="alignnone wp-image-20439" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/Bil_Herd-140bb83b8c4b2b4e.webp" alt="" width="440" height="297" /></div><figcaption class="a-caption ">
<div class="text">Jack Tramiel (left) signs a book at the request of former Commodore developer Bill Heard. The picture was taken in 2007 at the 25th anniversary celebration of the Commodore C64 in Mountain View, California. Apple legend Steve Wozniak can be seen in the background.</div>
<div aria-expanded="false" aria-haspopup="true"></div>
<div class="text"></div>
<p class="a-caption__source">(Image: Babylon4, CC BY-SA 3.0)</p>
</figcaption></figure>
<p>He moved on to Canada and founded the Commodore company in 1954. It sold typewriters, which it imported cheaply from Czechoslovakia in individual parts, assembled and sold under license. After low-cost Asian manufacturers entered the market at the end of the 1950s, Commodore switched to calculators.</p>
<h3 id="nav_investor_gould__0" class="subheading">Investor Gould joins Commodore</h3>
<p>The Canadian businessman Iving Gould not only helped when Commodore was in difficulties in 1965, but also bought up over 17 percent of Commodore shares (worth over 400,000 dollars). Through several further financial injections, Gould became Commodore&#8217;s largest investor over time.</p>
<div class="ad-mobile-group-1">
<div id="HEI_M_Incontent-2" class="ad ad--sticky"></div>
</div>
<p>When the Asian suppliers also put pressure on the calculator sector, Commodore expanded its portfolio to include pocket calculators. Tramiel had seen the then new devices on a trip to Japan and came back with the idea of bringing them onto the market himself. Commodore purchased the corresponding processors from Texas Instruments &#8211; when TI, of all companies, brought its own calculators onto the market at dumping prices, Commodore was determined to become less dependent on suppliers.</p>
<figure>
<div><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20438" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/Radio_202-0c7704c0cd1640ae.webp" alt="" width="342" height="285" /></div><figcaption class="a-caption ">
<div class="text">A rare promotional gift from the early Commodore era: a radio with a design based on the Commodore 202 desktop computer</div>
<p class="a-caption__source">(Image: Markus Will)</p>
</figcaption></figure>
<p>This was achieved with the takeover of chip manufacturer MOS Technologies in 1976. Commodore not only acquired a supplier for pocket calculators, but also the developers of the important 8-bit chip MOS 6502. Chief developer Chuck Peddle immediately suggested building their own computer. Commodore&#8217;s first computer, the PET 2001 PET = Personal Electronic Transactor), made its debut at CES 1977. With a 6502 chip, monochrome monitor, cassette drive and 8 kilobytes of memory, it was a first success for the company. And not only that: with the MOS 6502, Commodore was now the supplier of one of the most important CPUs, which ran in many 8-bit systems such as those from Apple or Atari.</p>
<h3 id="nav_home_computers__1" class="subheading">Home computers for the masses</h3>
<p>Commodore launched the first low-cost computer on the market in 1981 with the VC 20: for 300 dollars, the device offered a 6502 processor, 5 kilobytes and rudimentary color graphics, which was the entry point into the computer world for many. In 1982, it was the best-selling home computer and the first Commodore computer to exceed one million units sold.</p>
<p>This success was only followed by the Commodore 64, which was released in September 1982 and turned the 8-bit market on its head: with an estimated 17 million units sold, it is considered the most successful home computer of all time. In the shadow of this success were devices such as the Commodore 128 or the Commodore 246 series, which did not sell nearly as many units.</p>
<figure>
<div><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20437" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/Commodore-64-Computer-FL-872a3ca54560fbd4.webp" alt="" width="915" height="517" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/Commodore-64-Computer-FL-872a3ca54560fbd4.webp 915w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/Commodore-64-Computer-FL-872a3ca54560fbd4-400x226.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/Commodore-64-Computer-FL-872a3ca54560fbd4-768x434.webp 768w" sizes="(max-width: 915px) 100vw, 915px" /></div><figcaption class="a-caption ">
<div class="text">The Commodore 64, here in the first version, which was also known as the &#8220;bread box&#8221; due to its shape. With up to 17 million units sold from 1982 to 1994, it is considered the best-selling home computer of all time.</div>
<p class="a-caption__source">(Image: Evan-Amos, Bearbeitung: Markus Will)</p>
</figcaption></figure>
<p>Tramiel was a tough and feared businessman. His understanding of business had to be followed by the staff and endured by the trading partners. When Jack Tramiel was not allowed to bring one of his sons into management and had a falling out with Irving Gould over the company&#8217;s direction, he left Commodore in 1984, taking some of the best developers with him. Tramiel bought the Atari company and openly went into battle against Commodore.</p>
<p>Commodore, in turn, had now lost its boss and some of the C64 developers. Although the Commodore 64 dominated the 8-bit market, they had no access to the emerging 16-bit wave. This came with the purchase of a small company called Amiga. Under the leadership of developer Jay Miner, who was already in charge of chip development for the Atari 400/800, a small team of developers had wanted to develop the best home computer ever since 1982, but there was no major investor behind the project and they were constantly struggling to survive. Although the presentation of the Lorraine prototype at the 1984 CES was a success, it did not attract any investors.</p>
<h3 id="nav_a_loan_almost__2" class="subheading">A loan almost turned the Amiga into an Atari</h3>
<p>Instead, Amiga obtained a loan of 500,000 dollars from Atari – well before the takeover by Jack Tramiel – to continue developing its project. When Tramiel&#8217;s Atari takeover talks later leaked out, the Amiga developers panicked. They were still smarting from a takeover meeting in which Tramiel had wanted to take over the company at a dumping price months earlier. If Amiga didn&#8217;t pay back the 500,000 dollars by August, he would probably have become their boss.</p>
<p>At the last second, Commodore bought Amiga for 27 million dollars and paid Atari off. Tramiel, still in takeover negotiations, had no idea what the 500,000 dollar check meant and later sued Commodore, which ended in a settlement a few years later. With Commodore behind them, the Amiga engineers developed the Amiga 1000, which celebrated its premiere in New York on July 23, 1985.</p>
<figure>
<div><img loading="lazy" decoding="async" class="alignnone size-full wp-image-20436" src="https://goodshepherdmedia.net/wp-content/uploads/2025/05/AMIGA1000__1_von_6_-f17d29f7c362b6e1-a3a07e5bba49a36e.webp" alt="" width="915" height="676" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/05/AMIGA1000__1_von_6_-f17d29f7c362b6e1-a3a07e5bba49a36e.webp 915w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/AMIGA1000__1_von_6_-f17d29f7c362b6e1-a3a07e5bba49a36e-400x296.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/05/AMIGA1000__1_von_6_-f17d29f7c362b6e1-a3a07e5bba49a36e-768x567.webp 768w" sizes="(max-width: 915px) 100vw, 915px" /></div><figcaption class="a-caption ">
<div class="text">The Amiga 1000 with keyboard and contemporary monitor from 1985, which breathed life into the term &#8220;multimedia&#8221; with its graphics and sound performance.</div>
<p class="a-caption__source">(Image: Markus Will)</p>
</figcaption></figure>
<p>With the Motorola 68000 with 16 (internally 32) bits and 7.16 megahertz, four-channel sound and up to 4096 simultaneous colors, the Amiga was graphically far ahead of the competition at the time. The AmigaOS was also the first widespread home computer with an operating system that was capable of preemptive multitasking. However, the Amiga was not yet positioned correctly: With a remote keyboard, it looked more like an office computer and was still too expensive for the children&#8217;s room, while Atari already had a keyboard computer with the same processor on the market with the Atari ST.</p>
<p>The Amiga&#8217;s breakthrough came with the Amiga 500, released in 1987. It was a keyboard computer similar to the C64, but with the performance data of the Amiga 1000 and also significantly cheaper than the first version of the series. Games such as Turrican, Defender of The Crown, Shadow of The Beast, Settlers and Lemmings demonstrated the Amiga&#8217;s outstanding capabilities and led to Commodore overtaking Atari in terms of sales over time.</p>
<h3 id="nav_later_more__3" class="subheading">Later, more professional Amigas and CD versions appeared</h3>
<p>The Amiga 2000, also released in 1987, was intended to appeal to more professional users. It had a separate keyboard and a spacious housing for additional cards. In 1990, the CDTV, an Amiga 500, was released as a CD console: very stylish, but unfortunately otherwise with technology that was now five years old. The Amiga 3000 was again intended for professional users. It was not until 1992 that two Amigas appeared with the Amiga 1200 and Amiga 4000, whose graphics capabilities were able to compete with the emerging VGA PCs. However, they came too late to turn the tide.</p>
<p>Amiga 500 Plus was supposed to replace the Amiga 500 in 1991, but brought hardly any improvements and instead incompatibilities. The Amiga 600, which appeared in 1992, was also not a real further development, as the performance data remained more or less the same. It had more compact dimensions due to the omission of the numeric keypad, the design was based on the Amiga 1200, but the processor was still the 68000 with 7.16 megahertz. As an alternative to its own Amiga series, Commodore successfully offered IBM PC-compatible computers, occasionally with the PC 10 to PC 70.</p>
<p>The Commodore 65 almost came onto the market as the successor to the C64 in 1992, until the planners at Commodore realized that new 8-bit computers were no longer in demand. The last product, the Amiga CD32, came too late as a CD console to save Commodore from insolvency. On April 29, 1994, the time had come: Commodore was bankrupt.</p>
<p>The German PC distributor Escom then took over the rights to the Amiga and continued to distribute the Amiga 1200 and Amiga 4000 until 1996, when they themselves had to file for bankruptcy independently of the Amiga. Since then, the rights to the Amiga and Commodore names have passed into different hands.</p>
<p>Today, an active nerd community takes care of Commodore&#8217;s legacy: enthusiasts continue to supply the systems with software and expansions. C64 has a huge fan base. It was even re-released four years ago in an FPGA version in its original size and with technical innovations. On the Amiga, you can also play via FPGA on the Amiga 500 mini-console, or you can play on the original device with an SD card partition. Lovers of classic devices can also meet at exhibitions such as the recent Retro Computing Festival in Paderborn. <a href="https://www.heise.de/en/background/30-years-ago-When-the-C64-and-Amiga-pioneer-Commodore-went-bankrupt-9702746.html" target="_blank" rel="noopener">source</a></p>
<h2>buy a modern version <a href="https://myretrocomputer.com/product/c64x-extreme/" target="_blank" rel="noopener">here</a></h2>
<p><iframe title="It&#039;s Official: The Real New COMMODORE® C64x is Finally Here!" width="640" height="360" src="https://www.youtube.com/embed/JG1TdfezJzo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<blockquote class="wp-embedded-content" data-secret="0BzPBLfshg"><p><a href="https://goodshepherdmedia.net/the-rise-and-fall-of-commodore/">The rise and fall of Commodore</a></p></blockquote>
<p><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The rise and fall of Commodore&#8221; &#8212; Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content" src="https://goodshepherdmedia.net/the-rise-and-fall-of-commodore/embed/#?secret=wm4TGl4pqE#?secret=0BzPBLfshg" data-secret="0BzPBLfshg" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The rise and fall of Commodore</title>
		<link>https://goodshepherdmedia.net/the-rise-and-fall-of-commodore/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Sun, 18 May 2025 22:54:08 +0000</pubDate>
				<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Interestingly Extinct Technology]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[Commodore 64]]></category>
		<category><![CDATA[The rise and fall of Commodore]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20441</guid>

					<description><![CDATA[The rise and fall of Commodore &#160; David John Pleasance, former Commodore MD, tells Martin Cooper MBCS about life inside one of computing’s most loved firms. He also explains why retro computing could be the key to getting a new generation of young people interested in technology. Mismanaged from the hero to zero. That, in [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="banner-title">The rise and fall of Commodore</h1>
<p>&nbsp;</p>
<section class="components">
<section class="components-text">
<div class="container">
<div class="row">
<div class="col-12 col-md-8 offset-md-2">
<div class="usercontent">
<p class="lead">David John Pleasance, former Commodore MD, tells Martin Cooper MBCS about life inside one of computing’s most loved firms. He also explains why retro computing could be the key to getting a new generation of young people interested in technology.</p>
</div>
</div>
</div>
</div>
</section>
</section>
<section class="components">
<section class="components-text __flexsection">
<div class="container">
<div class="row">
<div class="col-12 col-md-8 offset-md-2">
<div class="usercontent">
<p>Mismanaged from the hero to zero. That, in a way, sums up David John Pleasance’s take on how Commodore roared to a position of almost global dominance and then collapsed, just as dramatically, declaring bankruptcy on 19 April 1994.</p>
<p>A visit from the financial grim reaper might have spelled the end for Commodore as a commercial force but, if computing companies have a spirit, Commodore’s most certainly lives on. Today, the firm and its machines are the focus of a global retro movement that revives, restores, revisits and revels in classic Commodore machines, games and hardware. Through emulators, conferences, meetups, clubs and festivals new generations are discovering Commodore and its magic.</p>
<p>And Pleasance should know about all of this. He was one of Commodore’s longest serving employees, eventually becoming its UK MD. That gives him an unparalleled view of the tech giant’s rise and its eventual fall. It also affords him a great insight into why the 80’s and 90’s computers were so special.</p>
<h2>Flukes and good fortune</h2>
<p>‘My first job was with the business division, selling Commodore PETs into retail,’ Pleasance says. ‘My background has always been in retail. But they took me away from that role&#8230; the C64 was doing insane business. So, I got the job of national accounts manager for C64, looking after all the big guys: Dixons, Comet, Currys&#8230; Right from the start that move told me that they never had a business plan. I was given the job of selling the C64 because we didn’t have enough PETs to sell into retail.’</p>
<p>Finishing the point, he laughs and says: ‘I was hired to do a job that never transpired.’</p>
<p>After that shaky start, Pleasance didn’t look back. ‘We got computers &#8211; VIC-20s and C64s &#8211; into everybody. WH Smith, British Home Stores&#8230; I even sold into Tesco. We were good at selling and they were hot products.’</p>
<p>From there, he became Sales and Marketing Director for the UK, moved to the company’s European arm, spent a stint in the US and was finally moved back to England, as MD of Commodore UK. Describing his style of working and a taste for growing businesses, Pleasance says he’s ‘a hunter not a farmer.’</p>
<p>Despite all the ups and down, Pleasance states: ‘I consider myself to be an incredibly fortunate man. My whole life has been full of fluke circumstances that let me improve my career. Joining Commodore was absolutely one of those.’</p>
<h2>Looking for inspiration</h2>
<p>In his early years, Pleasance worked in Australia but decided, in 1983, to come back home to the UK. On the way, he travelled the world, looking around for what might be the ‘next big thing’. The tour forced him, inexorably, toward a conclusion: home computing was going to be huge. And so, he focused on finding a job in the computer industry back in the UK.</p>
<p>‘You’ve got to remember that there was no internet,’ he explains. ‘All the jobs that were worth getting were in the newspapers. There was a job selling computer services and I got on the phone to this guy, a recruitment agent. It took me thirty for forty minutes to convince him to interview me&#8230; I knew nothing about computers. My background was in retail. But, an interview I got.’</p>
<h2>Right place, right time</h2>
<p>‘I arrived at the building and as I was entering, a lady was leaving. So, I held the door for her. I remember it distinctly,’ Pleasance continues. ‘So, I had the interview with the guy and he said: “Well, Mister Pleasance, there is no doubt that you could do this job standing on your head. But, I’m not going to put you forward for it. You’ve got retail experience and it would be remiss of me not to use those skills.”’</p>
<p>Pleasance stood to leave and was called back. He recounts what the agent said next: ‘”Did you see a woman leaving as you arrived? She’s just given me a brief for a job. You’ve just arrived and I’ve not had time to write it up. You’d be perfect for it. She works for a computer company. They want to sell into the retail market and they’ve got a dilemma. Do they want a computing expert or a retail expert? My advice was get a retail specialist.” That was the job at Commodore and it never got advertised. Two days later I got the job.’</p>
<h2>Commodore’s origins</h2>
<p>Much of Commodore’s early success, Pleasance says, can be ascribed to its founder: Jack Tramiel. Born in 1928, Tramiel was &#8211; according to Pleasance &#8211; quite a formidable man but some redemption came in the form of having his finger firmly on the public’s collective pulse.</p>
<p>‘He knew what trends were happening,’ Pleasance says. ‘He was always investigating. One of the first computers they produced was the put-it-together yourself KIM-1. It was the same kind of concept as Sinclair did, build your own computer. He then produced the VIC-20, a real entry level machine.’</p>
<p>Commodore however hit the big time with the Commodore 64. ‘It was the perfect machine in terms of cost and performance,’ Pleasance recalls. ‘But, it also hit at the right time. In Europe there was a generation of people looking for something new. We’d been to the moon. This generation of children&#8230; was hungry for something new. The Commodore 64 fitted the bill perfectly.’</p>
<p>‘There’s been a lot of conjecture about the volume of C64s sold worldwide, ‘ Pleasance says firmly, halting the conversation. ‘I can tell you categorically that the number was just a tad under 27 million. I can tell you that because, when we were thinking about doing a management buyout, we got access to all the figures.’</p>
<h2>Commodore 64 and the Amiga</h2>
<p>By the late eighties, the 8-bit Commodore 64 was starting to show its age and was running out steam. The problem was, the 16-bit Amiga, a machine that would eventually surpass the C64’s success, was still in the late stages of gestation.</p>
<p>‘Amiga wasn’t powerful enough to be a serious business machine,’ Pleasance recalls. ‘It didn’t have enough serious business software and it cost $1,000. So, it was too expensive to be a games machine. It fell between too camps. It wasn’t until 1989, with the A500, that we had a product that was a generation ahead of the C64&#8230; multi-tasking, colours and dedicated chipsets. It turned people on again, big time. I was easy to use and again, it went on to influence a whole generation of people.’</p>
<p>Despite Amiga’s promise, Commodore, Pleasance says, was in another phase of disarray. Back in 1987, Commodore UK had the next in a quick series of MDs: Steve Franklin. Pleasance says that Franklin’s first action &#8211; under orders from above &#8211; was to fire swathes of the existing staff in an effort shake up the UK arm of company. Two weeks into his tenure, the MD called Pleasance into his office. ‘It was bizarre, he didn’t talk to me for two weeks. Then, one Monday morning &#8211; “Pleasance, my office now!”’</p>
<h2>Selling dreams, not computers</h2>
<p>The MD told Pleasance that if he could, he would fire him. But, because he didn’t have an easy replacement, the salesman and marketing man could stay. Reluctantly.</p>
<p>‘He spent 20 minutes lecturing me about ethics,’ Pleasance recounts. ‘After all that I said: “Fine. Okay. I’ll make a deal with you.” He said, “you’re in no position to make a deal with me!” I said, “hear me out. I’ll put a proposition to you now and if it works, I’ll bring more business into this company than you’ve ever seen before. Or, if I fail, I’ll give you enough reason to get rid of me.”’</p>
<p>‘I pointed to his desk where there was an Amiga 500 and said, “what is that?” He said, “it’s a computer.” I said, “it’s a piece of plastic with some keys on it. From now on, we don’t sell computers, we sell dreams. It’s what that computer can do, it’s what that computer can bring into your life &#8211; that’s what we’ve got to market. I want to put a bundle together and the fact that there’s an Amiga inside will be irrelevant.”’</p>
<p>The discussion lead to what Pleasance happily describes as his proudest career achievement: bundles. The idea ran that an Amiga &#8211; or, for cash flow reasons, an aging C64 &#8211; would be packaged up with the latest must-have game, some productivity packages and also art software.</p>
<p>Including art software, Pleasance explains, was a sop to parents who viewed creative software as an educational tool. With it included, parents were more willing to pay for a new computer because they believed it offered an educational advantage and would be ‘for the betterment of the child’. You’ve got to market to the people paying the bills, he advises.</p>
<h2>A huge bundle of results</h2>
<p>The Commodore team put the plan into action, basing the first bundle around Batman the Movie. The game was going to be created by Ocean software, after it had paid one million dollars for the licence to use the name.</p>
</div>
</div>
</div>
</div>
</section>
<section class="components-text __flexsection">
<div class="container">
<div class="row">
<div class="col-12 col-md-8 offset-md-2">
<div class="usercontent">
<p>The proposition was to build a bundle around Batman the Movie and for Ocean to give Commodore exclusivity for two months. After two months the games firm could sell the game across the counter. Pleasance said he’d pay ‘tuppence’ per copy and would only commit to 10,000 copies. Ocean, understandably had some ‘concerns’ &#8211; mainly that dealers would be annoyed by not being able to sell the biggest game in town.</p>
<p>Continuing with the story he says: ‘I said, “I’m sure they will be hacked off. But, my guess is that they’ll be hacked off for maybe two days. But, they’ll be selling a four hundred pound product and not a forty pound product. And I know what I’d prefer to sell.” Ocean was also worried that it’d paid a million dollars for the licence and it would cost a million dollars to make the game. They knew how many they needed to sell and were worried that this activity would damage their numbers.’</p>
<p>In the end, Ocean agreed and as predicted, the dealers were annoyed &#8211; for a very short period time. ‘And yes, we did affect Ocean’s sales. They ended up selling five times more copies than their biggest estimate of sales. And I didn’t take 10,000 pieces from them. I took 186,000 pieces. That’s how many Amiga 500 Batman packs we sold in 12 weeks.’</p>
<p>Over the following years, this model was deployed many times and in partnership with many game makers. It boosted the Amiga’s sales and also kept the C64 selling far longer than it really should.</p>
<p>In many ways, much of Commodore’s success can be ascribed to its relationship with software companies. Commodore, Pleasance says, put a great deal of effort to work with &#8211; and not against &#8211; games makers. The computer maker originally made games but stopped. It also went on to be a member of FAST &#8211; the Federation Against Software Theft. Commodore engineers would also work closely with games firms, helping to solve problems, Pleasance says.</p>
<p>‘We had a good relationship with them and that was really important,’ he says.</p>
<h2>Secret of success</h2>
<p>This all leads to the million-dollar question: Why were these machines so inspirational and why are they so fondly remembered, today? Pleasance says: ‘In those days, nobody had a mobile phone. Now, everybody has one and they’re much more powerful than those early computers. Children, from the moment them come out of the womb, seem to be able to use smartphones. And it’s boring. It’s not even new anymore. So, in terms of inspiring young people into technology, [mobiles phones are] kind of passé. And there have been no major hardware developments that take your breath away &#8211; like the Amiga did &#8211; there’s been nothing like that for many years. People have become blasé about [new] computers.’</p>
<p>But, whereas Pleasance has little time for modern day mobiles, legions of fans most certainly do have time for names such as Commodore, Sinclair, BBC Micro, Atari and all the rest. And this army of retro fans grows every year.</p>
<p>‘You’ve just got to look at the community of Commodore and Amiga fans around the world,’ he enthuses. ‘There’s a lot of nostalgia. It’s unprecedented. I’m off to Pixel Heaven, a retro event in Warsaw. It’s a weekend event and last year 6,000 people went. It’s all retro based. Gamescom in Cologne. Last year 37,000 people visited in five days.’</p>
<p>And, it’s not just the older generation that attends. Youngsters are being draw in too &#8211; nostalgia is pulling legions of young people into technology, coding, making and doing. ‘I’m very closely associated with the retro computing museum in Leicester and with a museum in Holland,’ he says. ‘They bring classes of school children through and show them the C64, Amiga and the BBC. It excites the kids. What you can make with pixels on a C64 is nothing compared to a modern mobile phone, but it really opens up their eyes and their ears to what’s possible. And it’s accessible, not locked down like a phone.’</p>
<h2>Game over</h2>
<p>For all its success and its valiant failures, Commodore was ultimately doomed. And the reason for this, according to Pleasance, is the fact that the business never had a coherent business plan. ‘They used to stumble from one crisis to the next,’ he says. ‘There was a huge number of changes in senior management and every time somebody new came in, they had a different view. And the problem was, after Jack Tramiel left, none of them had any knowledge of the computer business. There was a guy from Coca Cola and a guy from the steal industry. The had no idea about the computer market and they never tried to learn.’</p>
<p>In early 1992, Pleasance was VP of Consumer Products and was based in the US. By December of that year he was ordered back to the UK. ‘Commodore was in its biggest financial crisis ever,’ he explains. ‘I had no choice. I was back in the UK. They said, “we know the UK is a strong business and we need you to bring some money in.” But, I’m not a financial person. I can read a balance sheet. Colin Proudfoot was the financial controller. I said, “make him and me joint MDs &#8211; he’ll look after the money and I’ll look after the sales and marketing.”’</p>
<p>In his book, Commodore: The Inside Story, Pleasance writes that, on 19/4/1994 Commodore International &#8211; the parent company &#8211; went into liquidation, but Commodore UK continued to trade. In the long turn however, the odds were against Proudfoot and Pleasance as there was so much debt.</p>
<p>In 1994 the pair decided to find out if there was a viable business to be resurrected from the Commodore assets that were soon to be auctioned-off. They spent several months devising a business plan and initially, it went well.</p>
<p>‘We raised £50m,’ Pleasance recalls positively. ‘We were going to produce just Amiga products and let other people licence the Commodore name and produce products. That would generate revenue for us. We used Coopers and Lybrand who had just done two major management buyouts. We pulled together a consortium. We had two high-net worth individuals and a Chinese manufacturing company called New Star Electronics. It was investing half the money &#8211; this meant we had our own manufacturing company that was on our board and were partners.’</p>
<p>More specifically, the plan centred around dropping the aging C64 and focusing exclusively on the Amiga. To replace the low price C64, the plan was to offer the Amiga A300. When people had bought into the Amiga family they could be encouraged to updated. More well-off customers could buy the Amiga A1200. And again, customers had an upgrade path to 1000, 2000 or 3000 motherboards and tower cases. Using this approach people could upgrade all the way to the Amiga 4000 – the top of the line model (source: Commodore: The Inside Story).</p>
<p>Sadly, just 36 hours before the asset auction was due to take place in New York, a key backer pulled out and the plan failed.</p>
<p>Today, Commodore exists but only as a jumble of legal fragments. ‘Trademarks and IPs exist all over the place,’ Pleasance says. ‘Several people have claims on logos and the like. There’s a firm in Belgium, I think&#8230; There are some lawsuits going on&#8230; There’s an Italian company that’s making mobile phones. The first one is called the Commodore Pet &#8211; good name for a mobile phone? Last year they won the rights to fonts and type faces and also the chicken-head Commodore logo, because nobody has used it for five years. It’s a problem because of the way Commodore was broken up&#8230; It’s nightmare to sort out.’</p>
<div class="pullout">
<h2>The origins of Amiga</h2>
<p>Unlike the C64 and the VIC-20, Amiga wasn’t a home-grown Commodore product. Rather it was the child of Amiga Corporation and in its prototype days, went under the codename of Lorraine.</p>
<p>Initially, it was conceived, Pleasance says, as a business machine and in part, the Amiga Corporation funded Lorraine’s development with a bridging load from Atari Inc.</p>
<p>‘The concept was to have a multi-tasking machine with chips that were dedicated to specific jobs… there were lots of things that have never been done before,’ Pleasance explains. ‘But they ran out of money. Elsewhere, Jack Tramiel had left Commodore under a cloud. My understanding is that he wanted to put his three sons on the board but he held six percent of the company. He got overruled and so left,’ Pleasance recalls.</p>
<p>Lorraine was demonstrated at the 1984 Consumer Electronics Show in Chicago, in the hope of attracting investors. The demo given included stereo sound and also the classic Boing Ball demo. Investment wasn’t, however, forthcoming. Who would want to invest in a new computer company when the IBM PC was the dominant business machine maker?</p>
<p>‘Tramiel heard of Amiga and did a deal with them,’ Pleasance continues. ‘He leant them something like half a million dollars which they had to repay very quickly and if they couldn’t repay he would own the business. He gave them a cheque and immediately bought Atari. He paid a dollar for Atari as it had major debts.’</p>
<p>Tramiel’s idea was to use Atari as a vehicle through which to sell the Amiga. Fate, or a foe, had other ideas though: ‘The Commodore guys found out about the deal, went over to Amiga and gave them a better deal. When Tramiel found out, he went crazy, but they just gave him his cheque back. They never even cashed it. That cheque still exists somewhere.’ <a href="https://www.bcs.org/articles-opinion-and-research/the-rise-and-fall-of-commodore/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
</div>
</div>
</section>
</section>
<p>&nbsp;</p>
<h2>buy a modern version <a href="https://myretrocomputer.com/product/c64x-extreme/" target="_blank" rel="noopener">here</a></h2>
<p><iframe title="It&#039;s Official: The Real New COMMODORE® C64x is Finally Here!" width="640" height="360" src="https://www.youtube.com/embed/JG1TdfezJzo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2></h2>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>https://goodshepherdmedia.net/30-years-ago-when-the-c64-and-amiga-pioneer-commodore-went-bankrupt/</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI’s Threat to Google Just Got Real</title>
		<link>https://goodshepherdmedia.net/ais-threat-to-google-just-got-real/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 09 May 2025 08:03:11 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Business Opinions & Optics]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Money / Finances]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🤖 AI Artificial Intelligence]]></category>
		<category><![CDATA[🤖🗣️ChatGPT]]></category>
		<category><![CDATA[AI’s Threat to Google]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20281</guid>

					<description><![CDATA[AI’s Threat to Google Just Got Real Drop in search traffic is a reminder technological advancement can displace long-established tech giants &#160; A senior Apple AAPL 0.63%increase; green up pointing triangle executive said Wednesday that Google searches over the Safari web browser fell over the last two months. “That has not happened in over 20 years,” Eddie Cue, Apple’s [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>AI’s Threat to Google Just Got Real</h1>
<h2>Drop in search traffic is a reminder technological advancement can displace long-established tech giants</h2>
<p>&nbsp;</p>
<section class="ef4qpkp0 css-1lhnhkw-Container evtohk90">
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">A senior Apple AAPL <span class="css-1hk2j0i-ChicletChange e1vl9ktx3">0.63%</span><span class="css-f7n30v-Arrow e1vl9ktx1"><span class="css-1q7p60h-ArrowHiddenLabel e1vl9ktx0">increase; green up pointing triangle</span></span> executive said Wednesday that Google searches over the Safari web browser fell over the last two months. “That has not happened in over 20 years,” Eddie Cue, Apple’s senior vice president of services, said on the witness stand during the penalty trial phase of the Justice Department’s antitrust lawsuit against Google. Cue attributed the drop to a growing number of people using generative AI services such as ChatGPT and Perplexity.</p>
</section>
<div class="css-bsrkcm-Box e1vnmyci0">
<h1 class="css-1vi6b05-StyledHeadline-Styled-Styled-Styled emwm06f0">AI Has Upended the Search Game. Marketers Are Scrambling to Catch Up.</h1>
</div>
<h2 class="css-1964saf-NormalDek-NormalDek-Styled-Styled-Styled emwm06f0">Websites will soon serve primarily as data sources for AI platforms, not destinations for humans, Mailchimp predicts</h2>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">In a matter of months, artificial intelligence has begun to change how people search for things online in ways that have alarmed some marketers.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">Consumers who use traditional search engines like Google and Bing are now greeted atop their search results by AI-generated summaries of the topics at hand. A growing number of consumers now also turn directly to large language models such as OpenAI’s ChatGPT to answer everyday questions or guide their purchases.</p>
<div class="paywall css-1u1nl00-PaywalledContentContainer e1qcjy9n0">
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">Both developments have begun to eat away at the clicks and website traffic that marketers have earned over time by spending millions of dollars on search engine optimization, or SEO. They have also created a wave of businesses claiming to specialize in new industry acronyms such as generative engine optimization (GEO), answer engine optimization (AEO) and, of course, artificial intelligence optimization (AIO).</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">Email software platform Intuit Mailchimp has seen a steady drop in web traffic since AI-assisted search started allowing people to gather information about the company and its products without visiting its sites, according to Ellen Mamedov, global director of search engine optimization.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">In order to counter the shift, Mailchimp began updating its sites to better serve the so-called crawlers, bots that visit pages across the web to collect the data that informs the answers provided by AI platforms like ChatGPT and Google’s Gemini, Mamedov said.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">Technical search elements, like the speed at which pages load and the snippets of code used to track user activity, are more important for these bots and AI-driven searches than for traditional search engines, according to Mailchimp’s research.</p>
<div class="media-layout css-13plya0-Layout-baseCss ertdlv30" data-type="image" data-inset_type="" data-sub_type="" data-layout="inline">
<figure class="css-x5rdl7-Figure ebruzsj0"><picture class="css-u314cv"><img loading="lazy" decoding="async" class="css-1hzqsjo" src="https://images.wsj.net/im-78993691?width=700&amp;height=467" sizes="(max-width: 639px) 100vw, (max-width: 979px) 620px, (max-width: 1299px) 540px, 700px" srcset="https://images.wsj.net/im-78993691?width=540&amp;size=1.5 540w, https://images.wsj.net/im-78993691?width=620&amp;size=1.5 620w, https://images.wsj.net/im-78993691?width=639&amp;size=1.5 639w, https://images.wsj.net/im-78993691?width=700&amp;size=1.5 700w, https://images.wsj.net/im-78993691?width=700&amp;size=1.5&amp;pixel_ratio=1.5 1050w, https://images.wsj.net/im-78993691?width=700&amp;size=1.5&amp;pixel_ratio=2 1400w, https://images.wsj.net/im-78993691?width=700&amp;size=1.5&amp;pixel_ratio=3 2100w" alt="Photo illustration of the Mailchimp logo on a smartphone." width="700" height="467" /></picture></figure>
<p><span class="e1m33gv80 css-426zcb-CaptionSpan e1m33gv81">Mailchimp says traffic to its website has dropped due to the influence of large language models and AI overviews in search results.</span> <span class="css-7jz429-Credit eq0esvu0">Photo: Rafael Henrique/Zuma Press</span></div>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">The bots are designed to absorb and process information as quickly as possible, which is why they prefer faster-loading sites that have been optimized for machines rather than human readers, according to Mamedov. Websites in general will evolve to serve primarily as data sources for bots that feed LLMs, rather than destinations for consumers, she said.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">If Mailchimp doesn’t regularly make sure these elements are up-to-date, “we’re definitely going to be left behind,” said Mamedov.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">Chief marketing officers trained on classic SEO have seen similar traffic declines in recent months, and many aren’t aware that their companies’ sites haven’t been tailored to AI platforms or even made accessible to their bots, said Natasha Sommerfeld, partner in consulting firm Bain &amp; Co.’s customer practice.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">They’re also contending with the rapid rise of so-called zero-click search. Eighty percent of consumers now resolve 40% of their online search queries without clicking any links, according to a survey of more than 1,000 people conducted by Bain in December. Forty-two percent of people who regularly use generative AI said that they use such tools for shopping recommendations, the same survey found.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">OpenAI announced last month that ChatGPT will soon roll out a shopping button that redirects users to a merchant’s website, where they can buy the product they were researching.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">That could begin to address marketers’ AI challenge by letting people shop through ChatGPT, said Joy Howard, chief marketing officer at Back Market, a marketplace for refurbished electronics.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">LLM searches don’t yet drive sales, and they only account for 0.2% of traffic to Back Market’s sites. But such traffic is 470 times higher than it was last summer, and it will continue to grow, said Howard.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">Back Market is tweaking its SEO practices accordingly. It has focused more intently on updating individual product pages, for example, because some consumers ask LLMs to identify products that suit their needs and tastes before using search engines to locate and potentially buy them, Howard said. Back Market has also begun using a more conversational tone in its product copy, since its search team has found that LLMs like ChatGPT prefer everyday language to the detailed descriptions that often perform best in traditional search engines, she said.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">“This is not big for us yet, but it could be,” she said of LLM searches.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">Very few consumers have entirely replaced Google or Bing with ChatGPT, said Nikhil Lai, principal performance marketing analyst at <a class="ekxajjj0 css-i0lbhy-OverridedLink" href="https://www.wsj.com/market-data/quotes/FORR" target="_blank" rel="noopener" data-type="company">Forrester</a>. OpenAI says ChatGPT now processes roughly one billion searches a week, but Google handles 5 trillion searches each year, or around 100 times that total, according to its most recent figures.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">Trust is a question as well, with only 15% of consumers now willing to share their financial information with generative AI tools, according to Bain.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">As AI assumes a larger role in search, however, marketers will increasingly focus on how closely AI-generated summaries and prompt responses match the way they want their brands to be perceived, Lai said.</p>
<p class="css-1akm6h5-Paragraph e1e4oisd0" data-type="paragraph">“SEO teams have been caught flat-footed,” he said. “Traffic and ranking and average position and click-through rate…none of those metrics make sense going forward.” <a href="https://www.wsj.com/articles/ai-has-upended-the-search-game-marketers-are-scrambling-to-catch-up-84264b34" target="_blank" rel="noopener">source</a></p>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft shuts down Skype after 22 years, shifting users to Teams</title>
		<link>https://goodshepherdmedia.net/microsoft-shuts-down-skype-after-22-years-shifting-users-to-teams/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 05 May 2025 09:11:00 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Business & Industry]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Interestingly Extinct Technology]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Money / Finances]]></category>
		<category><![CDATA[OBITUARY]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌞On This Day!🌞]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[Microsoft shuts down Skype]]></category>
		<category><![CDATA[On This Day]]></category>
		<category><![CDATA[Skype]]></category>
		<category><![CDATA[Skype down]]></category>
		<category><![CDATA[skype logo]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=20269</guid>

					<description><![CDATA[Microsoft shuts down Skype after 22 years, shifting users to Teams Microsoft purchased Skype in 2011 for $8.5 billion Microsoft&#8217;s Skype has finally shut down, concluding its 22-year tenure as the once-dominant internet calling and messaging service. Microsoft acquired Skype in 2011 for $8.5 billion in what was then its largest-ever acquisition. At its peak, [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="headline">Microsoft shuts down Skype after 22 years, shifting users to Teams</h1>
<h2 class="sub-headline">Microsoft purchased Skype in 2011 for $8.5 billion</h2>
<p>Microsoft&#8217;s Skype has finally shut down, concluding its 22-year tenure as the once-dominant internet calling and messaging service.</p>
<p>Microsoft acquired Skype in 2011 for $8.5 billion in what was then its largest-ever acquisition. At its peak, Skype had more than 300 million monthly active users and was synonymous with internet-based voice and video calling. For many, Skype was their first experience of speaking to someone halfway across the world for free, a radical shift from the dominance of telcos and expensive long-distance calls.</p>
<p>The service steadily declined in relevance in recent years, with its active user base shrinking to approximately 36 million by 2023 as competitors such as Zoom, WhatsApp, and Microsoft&#8217;s own Teams platform gained traction.</p>
<p>Teams has since grown to 320 million monthly users, far surpassing Skype&#8217;s remaining user base. The company&#8217;s decision to discontinue Skype is apparently part of a broader effort to prioritize artificial intelligence features within Teams. Employees who worked on Skype will be reassigned to other projects rather than being laid off.</p>
<p>Skype played a key role in popularizing VoIP (Voice over Internet Protocol) technology, enabling businesses and individuals to connect around the world with minimal costs. It also served as an early testbed for AI-powered real-time language translation, a feature Microsoft showcased in a widely publicized demonstration in 2014. However, its frequent UI changes, reliability issues, ill-conceived social media-like features, gradual shift toward enterprise, and inability to keep pace with newer competitors, especially during the COVID-19 pandemic, ultimately led to its obsolescence.</p>
<p>Existing Skype users had until May 5 to migrate their data and contacts to Teams or seek alternative solutions. Skype&#8217;s legacy lives on in the VoIP technology it helped to normalize—but as a product, it stands as a case study in how brand recognition alone can&#8217;t save a stagnant platform.</p>
<p><a href="https://www.macrumors.com/2025/05/06/skype-shuts-down/" target="_blank" rel="noopener">source</a></p>
<h1 class="dusk:text-gray-100 mb-3 px-[15px] font-serif text-3xl font-semibold leading-none text-gray-700 dark:text-gray-100 sm:px-5 md:px-0 md:text-4xl lg:text-5xl">RIP Skype (2003–2025), survived by multiple versions of Microsoft Teams</h1>
<div class="my-2.5 mx-auto px-[15px] sm:px-5 lg:grid lg:max-w-5xl lg:grid-cols-3 lg:gap-6 lg:px-8 xl:px-0">
<div class="relative lg:col-span-2">
<div class="post-content post-content-double">
<p>Today is the day: Microsoft has formally shuttered the Skype app and service after announcing in February that Skype was being axed in favor of Microsoft Teams, the company&#8217;s Slack competitor.</p>
<p>The Skype apps have all been advertising the end of the service and pointing users to Teams for weeks now. As of today, if you open the app or navigate to the Skype site, you&#8217;ll be directed to use Teams instead. The last active vestige of Skype is the Skype Dial Pad, which Skype subscribers and members with Skype Credits can still use to make calls to traditional telephone numbers (the Dial Pad is also incorporated into Microsoft Teams Free).</p>
<p>It&#8217;s an unceremonious end for an app that was once synonymous with video calls. Microsoft originally bought Skype for $8.5 billion in 2011; it was also owned by eBay from 2005 to 2009 and by a group of venture capital firms between 2009 and 2011. Ironically, Microsoft bought the app to replace its own first-party communication client at the time, Windows Live Messenger (which itself had grown out of the old MSN Messenger).</p>
</div>
</div>
</div>
<div class="mt-2.5 mx-auto px-[15px] sm:px-5 lg:grid lg:max-w-5xl lg:grid-cols-3 lg:gap-6 lg:px-8 xl:px-0">
<div class="relative lg:col-span-2">
<div class="post-content post-content-double">
<p>Though not the first software to allow video communication over the Internet, Skype was one of the first recognizably modern peer-to-peer video chatting apps. Created by some of the same developers behind the Kazaa peer-to-peer file-sharing software, Skype was originally released in 2003, at around the same time when increasing broadband Internet availability and better video compression codecs were solving the bandwidth problem.</p>
<p>But as detailed by Wired, Skype lost momentum after the Microsoft purchase, partly due to a redesign that people didn&#8217;t like and partly because upstarts like Zoom were offering new features and better call quality. When the COVID-19 pandemic hit in 2020 and all kinds of office jobs shifted to remote work, it was Zoom and not Skype that was in a better position to become the video-chatting app everyone was trapped in.</p>
<p>Skype has been merging into or being replaced by Teams for years, starting with the end of Skype for Business in 2017, a few months after formally releasing the first version of Teams. Microsoft has pushed Teams aggressively, including it alongside its flagship Office apps and Microsoft 365 service for years. Some regulators believed this was, in fact, <em>too</em> aggressive, and Microsoft decoupled Teams from the other Office apps in 2023 (for the European Union) and 2024 (for everyone else). <a href="https://www.macrumors.com/2025/05/06/skype-shuts-down/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><iframe title="Goodbye Skype: Microsoft Shuts Down Iconic Calling App After 20 Years | MS Teams Takes Over | News9" width="640" height="360" src="https://www.youtube.com/embed/UtcVe6caMis?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><script type="text/javascript" src="https://video.foxbusiness.com/v/embed.js?id=6367562707112&#038;w=466&#038;h=263"></script><noscript>Watch the latest video at <a href="https://www.foxbusiness.com">foxbusiness.com</a></noscript></p>
<p>Skype is no more, as Microsoft is retiring the once-popular video calling service on Monday.</p>
<p>Shutting down Skype will help the software giant focus on its homegrown Teams service by simplifying its communication offerings, Microsoft announced back in February.</p>
<p><iframe title="Skype shuts down today, urges to shift to Teams: What users need to know | Microsoft" width="640" height="360" src="https://www.youtube.com/embed/a2PdKhk-oiA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>To ease the transition from the platform, its users will be able to log into the free version of Teams using their existing credentials, with chats and contacts migrating automatically.</p>
<p>&#8220;Skype has been an integral part of shaping modern communications and supporting countless meaningful moments, and we are honored to have been part of the journey,&#8221; Jeff Tepper, Microsoft president of collaborative apps and platforms, said in a statement.</p>
<div class="inline image-ct">
<div class="m"><picture><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/343/192/zoom-working-from-home.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/686/384/zoom-working-from-home.jpg?ve=1&amp;tl=1 2x" media="(max-width: 767px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/672/378/zoom-working-from-home.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/1344/756/zoom-working-from-home.jpg?ve=1&amp;tl=1 2x" media="(min-width: 768px) and (max-width: 1023px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/931/523/zoom-working-from-home.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/1862/1046/zoom-working-from-home.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1024px) and (max-width: 1279px)" /><source srcset="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/720/405/zoom-working-from-home.jpg?ve=1&amp;tl=1, https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/1440/810/zoom-working-from-home.jpg?ve=1&amp;tl=1 2x" media="(min-width: 1280px)" /><img decoding="async" src="https://a57.foxnews.com/static.foxbusiness.com/foxbusiness.com/content/uploads/2020/12/931/523/zoom-working-from-home.jpg?ve=1&amp;tl=1" alt="Zoom call remote work" /></picture></div>
<div class="caption">
<p>Businessman discussing work on video call with team members. (iStock / iStock)</p>
</div>
</div>
<p>Those who do not want to use Microsoft Teams Free can export their Skype data. Those who do nothing will have their data deleted in January 2026, Microsoft&#8217;s website says.</p>
<p>Skype first launched in 2003. When Microsoft acquired it in 2011 for $8.5 billion, the service had around 150 million monthly users. When the popularity of Zoom surged during the COVID-19 pandemic in 2020, that number had fallen to roughly 23 million.</p>
<p>The decline was partly because Skype&#8217;s underlying technology was not suited for the smartphone era.</p>
<div class="ad-container desktop ad-h-50 ad-w-300">
<div id="desk-ad-lb3" class="ad gam" data-ad-lz="1" data-ad-init="1" data-google-query-id="CM-vyrCCkI0DFSI0RAgdP1IfXA" data-ad-slot-rendered="1" data-rendered-size="300x250">
<div id="google_ads_iframe_/4145/fbn/desk/art/tech/lb3_0__container__">
<p><iframe title="Microsoft Officially Shuts Down Skype After 22 Years, Urges Transition to Teams for Communication" width="640" height="360" src="https://www.youtube.com/embed/5bX9uAodGFM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
</div>
</div>
<div></div>
</div>
<div class="inline image-ct">
<div class="caption">
<p><iframe title="Microsoft shuts down Skype after two decades" width="640" height="360" src="https://www.youtube.com/embed/upckolTvOqs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><a href="https://www.foxbusiness.com/technology/microsoft-shuts-down-skype-after-22-years-shifting-users-teams" target="_blank" rel="noopener">source</a></p>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Access ANY Network (remotely) What is a Hacker Dropbox?</title>
		<link>https://goodshepherdmedia.net/access-any-network-remotely-what-is-a-hacker-dropbox/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 04:49:03 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Electronic Projects]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[Access ANY Network]]></category>
		<category><![CDATA[Access ANY Network remotely]]></category>
		<category><![CDATA[Family HelpDesk Support]]></category>
		<category><![CDATA[Hacker Dropbox]]></category>
		<category><![CDATA[NetworkAccess]]></category>
		<category><![CDATA[RaspberryPi]]></category>
		<category><![CDATA[twingate]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19809</guid>

					<description><![CDATA[Access ANY Network (remotely) What is a Hacker Dropbox? What is a Hacker Dropbox? (and why you need one….even if you aren’t a hacker) Build your Hacker Dropbox with Twingate (it’s free): https://ntck.co/twingate_ztna 💻 Raspberry Pi Imager: https://www.raspberrypi.com/software/ 🛒 Buy a Raspberry Pi: Raspberry Pi 4: amazon.com Raspberry Pi 5: amazon.com Here is a great definition from [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="post-content">
<h1>Access ANY Network (remotely) What is a Hacker Dropbox?</h1>
<h2 id="what-is-a-hacker-dropbox-and-why-you-need-oneeven-if-you-arent-a-hacker">What is a <em>Hacker Dropbox</em>? (and why you need one….even if you aren’t a hacker)</h2>
<p><iframe title="Access ANY Network (remotely)" width="640" height="360" src="https://www.youtube.com/embed/1lZ3FQSv-wI?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><span class="yt-core-attributed-string--link-inherit-color" dir="auto"> Build your Hacker Dropbox with Twingate (it’s free): <a class="yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color" tabindex="0" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbC1VYTZIemJjdHlLUHlFODBRS1VwYjRRdXc3d3xBQ3Jtc0trRGFGT1ptQVh5V2dUTlExMkNHZ1QyZEhtTV9FdFEzZjBfWXNDWkZBemRJdmdmdUstTlM2M0hhMmRrQWZ6dTRxVk1aMjJkVFFJODZSS1VwOG01LUV0V09uTWRKSHMzbEwxSDFGOHlYZmJVZGNjaWZFVQ&amp;q=https%3A%2F%2Fntck.co%2Ftwingate_ztna&amp;v=1lZ3FQSv-wI" target="_blank" rel="nofollow noopener">https://ntck.co/twingate_ztna</a><br />
<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f4bb.png" alt="💻" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Raspberry Pi Imager: </span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><a class="yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color" tabindex="0" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbm9EUkI2a1cyVjMxSUNud1JQSHl6VGM4YnRnd3xBQ3Jtc0tsOHYyTVd6d09UWk43MHgzSThoZnRnR3EyQkdKSXkxZ2VEMGJ5ckt6S0ZlUWFXTEdabmlhRGZ2TE9OV2V4d1ZfejVtODFtVEZrT28wVXZnQlhWX1BSSUg4TEs1V01qaGZGZE15Qnktb3Y5NlhlMWJ4VQ&amp;q=https%3A%2F%2Fwww.raspberrypi.com%2Fsoftware%2F&amp;v=1lZ3FQSv-wI" target="_blank" rel="nofollow noopener">https://www.raspberrypi.com/software/</a></span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><br />
<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6d2.png" alt="🛒" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Buy a Raspberry Pi: Raspberry Pi 4: </span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><a class="yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color" tabindex="0" href="https://www.amazon.com/CanaKit-Raspberry-4GB-Starter-Kit/dp/B07V5JTMV9/?th=1" target="_blank" rel="nofollow noopener">amazon.com</a></span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><br />
Raspberry Pi 5: </span><span class="yt-core-attributed-string--link-inherit-color" dir="auto"><a class="yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color" tabindex="0" href="https://www.amazon.com/CanaKit-Raspberry-Starter-Kit-PRO/dp/B0CRSPKPNG?th=1" target="_blank" rel="nofollow noopener">amazon.com</a></span></p>
<ul>
<li>Here is a great definition from ChatGPT: <em>a small, discreet, and often portable device designed to be covertly placed in a target network to provide remote access for a hacker or penetration tester. It typically contains hardware and software configured to exploit the network or collect sensitive information.</em></li>
<li>If you’re a hacker…this is a no brainer. Get instant access to a remote network by dropping off a device. But….if you’re not a hacker…why do you need this?</li>
</ul>
<h3 id="family-helpdesk-support">Family HelpDesk Support</h3>
<ul>
<li>If you’re like me, you are likely the official technical support for your family and friends. I also inherited the role of helpdesk support for my church…these kinds of things just happen by default when you are in tech and people find out about your technical skills.</li>
<li>This isn’t an easy thing to do, especially when it comes to troubleshooting networks for your family. Is the network up? Why is it slow? Sometimes a FaceTime call just isn’t going to cut it.</li>
<li>If I’m going to be the support for my church and family, I’m going to take my role seriously. I need FULL control of the remote network……no more playing around!!!</li>
<li>With the <em>Hacker Dropbox</em>, I can drop off a small device, in my case it’s going to be a Raspberry Pi 4. (it can be a lot of things, as long as the device is Linux-based and is 64-bit). Instantly I get access to this remote network, enabling me to provide remote support and access any device.</li>
</ul>
<h3 id="this-is-not-vpn">This is NOT VPN</h3>
<ul>
<li>This is not a VPN (VIrtual Private Network) solution….it’s much better.</li>
<li>This is a ZTNA (Zero-Trust Network Access) solution. It’s called Twingate and I’ve been using them for a long time in my business and personal networks. I talk more about them in the video above but in short, they allow you to get and give remote access to networks in the most secure way. They are used by everyone from large enterprises to homelabbers looking to access their Plex server.</li>
<li>This isn’t the first video I’ve made about them but this is the first time I’ve featured a use-case like this.</li>
<li>Oh, it’s also <strong>FREE</strong> for home labbers. (And…cough….businesses that don’t have a ton of employees….like me.)</li>
</ul>
<h3 id="you-dont-need-to-know-anything-about-the-network">You don’t need to know ANYTHING about the network</h3>
<ul>
<li>I wanted this to be a turnkey solution even if you don’t know anything about the remote network. All you’ll have to do is plug in an ethernet cable (or connect to wifi….but you’ll need to know the SSID and password) and you will know everything you need to know about that network…..but how?</li>
<li>Twingate has a powerful API that allows us to do many things…including write python scripts that will automagically tell us the private IP address of our <em>Hacker Dropbox</em> (Raspberry Pi) and the Public IP address of the network, giving us instant access to this <em>Hacker Dropbox</em> AND the network.</li>
<li>This guide will contain that script.</li>
</ul>
<h2 id="what-do-you-need">What do you need?</h2>
<ul>
<li>Any Linux-based 64-bit system will do. You’ll need at least 1 CPU and 2GB RAM (recommended)…but you can go as low as 512MB of RAM.</li>
<li>You can also run this as a Docker container, which is my favorite way to deploy this in my home lab.</li>
<li>In this example, with the <em>Hacker Dropbox</em>, I’m using a Raspberry Pi 4 running Raspberry Pi OS Lite &#8211; 64-bit and installing it directly on the system (no docker container)</li>
</ul>
<h3 id="what-other-hardware-options-do-i-have">What other hardware options do I have?</h3>
<p>Again, this can be many things, but here are some ideas to get the juices flowing:</p>
<ul>
<li>ZImaboard</li>
<li>Raspberry Pi 4/5</li>
<li>Raspberry Pi 400/500</li>
<li>Old laptops</li>
<li>NAS</li>
<li>Intel NUC or other mini-pcs</li>
</ul>
<h1 id="the-tutorial">The Tutorial</h1>
<h2 id="step-1---setup-twingate">Step 1 &#8211; Setup Twingate</h2>
<p>This setup is VERY easy and is all done in the cloud.</p>
<ul>
<li>Sign up for Twingate here: <a href="https://ntck.co/twingate_ztna">https://ntck.co/twingate_ztna</a>
<ul>
<li>You’ll create a new Twingate network</li>
</ul>
</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19830" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-1024x843.png" alt="" width="640" height="527" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-1024x843.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-400x329.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-768x632.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613-1536x1264.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112613.png 1738w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<h2 id="step-2---add-your-first-remote-network">Step 2 &#8211; Add your first remote network</h2>
<p>You will be prompted to go through a wizard, we can skip that for now.</p>
<ul>
<li>Click on <em>Remote Networks</em></li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19829" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-1024x377.png" alt="" width="640" height="236" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-1024x377.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-400x147.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-768x283.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739-1536x565.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112739.png 1592w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>And then add a <em>Remote Network</em></li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19828" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-1024x407.png" alt="" width="640" height="254" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-1024x407.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-400x159.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-768x305.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803-1536x611.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112803.png 1932w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Choose <em>on-premise</em> for location</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19827" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825-1024x736.png" alt="" width="640" height="460" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825-1024x736.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825-400x287.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825-768x552.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112825.png 1244w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Once created, we’ll click on the remote network link to jump in and add more config…like adding a connector.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19826" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-1024x564.png" alt="" width="640" height="353" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-1024x564.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-400x220.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-768x423.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905-1536x846.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220112905.png 1616w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<h2 id="step-25---prep-your-hacker-dropbox">Step 2.5 &#8211; Prep your <em>Hacker Dropbox</em></h2>
<ul>
<li>This will vary based on what device you choose but this will normally involve installing a compatible OS (64-bit Linux OS) and getting access to your device via CLI.</li>
<li>I demo flashing an SD-card for the Raspberry Pi 4 in the video.</li>
</ul>
<h2 id="step-3---adding-a-connector-for-your-remote-network">Step 3 &#8211; Adding a connector for your remote network</h2>
<p>The connector, in our case, will be the <em>Hacker Dropbox</em>, a linux-based device running Twingate software, aka, <em>The Connector</em></p>
<ul>
<li>Click on <em>Deploy Connector</em></li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19825" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010-1024x820.png" alt="" width="640" height="513" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010-1024x820.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010-400x320.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010-768x615.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113010.png 1504w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Good practice, run <code>sudo apt update</code> to make sure all your repos are up-to-date (this will different for you if you are running something that isn’t Debian-based)</li>
<li>For the Raspberry Pi example, we are installing the Twingate connector directly on the OS, no container. So we’ll select Linux as our option.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19824" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-1024x589.png" alt="" width="640" height="368" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-1024x589.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-400x230.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-768x442.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353-1536x883.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113353.png 1816w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Now, generate your access tokens. These will automatically be added the command we’ll use to install Twingate here in a moment.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19823" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-1024x541.png" alt="" width="640" height="338" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-1024x541.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-400x211.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-768x406.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428-1536x812.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113428.png 1740w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Copy the provided command</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19822" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-1024x518.png" alt="" width="640" height="324" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-1024x518.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-400x202.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-768x389.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458-1536x777.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113458.png 1826w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Paste that command in your terminal and watch the magic happen.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19821" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1024x405.png" alt="" width="640" height="253" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1024x405.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-400x158.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-768x304.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1536x608.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521.png 2048w" sizes="(max-width: 640px) 100vw, 640px" /><img loading="lazy" decoding="async" class="alignnone size-large wp-image-19821" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1024x405.png" alt="" width="640" height="253" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1024x405.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-400x158.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-768x304.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521-1536x608.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113521.png 2048w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19820" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-1024x611.png" alt="" width="640" height="382" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-1024x611.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-400x239.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-768x458.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536-1536x916.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113536.png 1948w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>We are actually….done. Check Twingate to see if your connector is up.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19819" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-1024x566.png" alt="" width="640" height="354" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-1024x566.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-400x221.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-768x424.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621-1536x848.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113621.png 1550w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<h2 id="step-4---add-a-remote-wifi-network-if-not-using-ethernet">Step 4 &#8211; Add a remote WiFi Network (if not using ethernet)</h2>
<ul>
<li>This will be Raspberry Pi specific.</li>
<li>Run this command to access the NetworkManager TUI</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash"><span class="token function">sudo</span> nmtui
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Edit a connection</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-medium wp-image-19818" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113842-400x339.png" alt="" width="400" height="339" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113842-400x339.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113842-768x652.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113842.png 884w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<ul>
<li>Select Add</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19817" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856-1024x823.png" alt="" width="640" height="514" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856-1024x823.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856-400x321.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856-768x617.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113856.png 1202w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Select WiFi</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19816" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-1024x525.png" alt="" width="640" height="328" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-1024x525.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-400x205.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-768x394.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917-1536x788.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113917.png 1798w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Add SSID and Password (you’ll need to know this for the remote network)</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19815" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-1024x506.png" alt="" width="640" height="316" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-1024x506.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-400x198.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-768x379.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943-1536x758.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220113943.png 1936w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Select <em>Ok</em> and then hit <em>ESC</em> to save and get out of there.</li>
</ul>
<h2 id="step-5---use-the-twingate-api-to-learn-about-the-remote-network">Step 5 &#8211; Use the Twingate API to learn about the remote network</h2>
<p>You only need this option if this is a network you are unfamiliar with. So, for example, you might be offering remote support for your family and you will likely already know their network, 192.168.1.0/24 (for example) and you may have set the static IP address of your <em>Hacker Dropbox</em> and can easily, manually add this as a resource in Twingate.</p>
<ul>
<li>Generate an API token</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19814" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-1024x704.png" alt="" width="640" height="440" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-1024x704.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-400x275.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-768x528.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238-1536x1056.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114238.png 1940w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Our script will be provisioning resources so we’ll need to give it a good amount of access.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19813" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315-1024x934.png" alt="" width="640" height="584" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315-1024x934.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315-400x365.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315-768x701.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114315.png 1116w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Copy that key and put it somewhere safe.</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19812" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347-1024x878.png" alt="" width="640" height="549" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347-1024x878.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347-400x343.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347-768x658.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220114347.png 1094w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<h3 id="run-the-python-script">Run the Python Script</h3>
<ul>
<li>You’ll need another computer, can be anything that can run Python. (which…can be anything, Windows, Mac, Linux.)</li>
<li>You’ll also need Python3 installed, refer to your OS-specific documentation to install Python.</li>
</ul>
<h4 id="create-the-script">Create the script</h4>
<ul>
<li>Create a new python script</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash"><span class="token function">nano</span> twingate.py
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>paste the following script</li>
<li>Replace the following variables:
<ul>
<li><strong>API_URL</strong></li>
<li><strong>API_KEY</strong></li>
<li><strong>TARGET_NETWORK_NAME</strong></li>
</ul>
</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-python" tabindex="0"><code class=" language-python" data-lang="python"><span class="token keyword keyword-from">from</span> gql <span class="token keyword keyword-import">import</span> gql<span class="token punctuation">,</span> Client
<span class="token keyword keyword-from">from</span> gql<span class="token punctuation">.</span>transport<span class="token punctuation">.</span>requests <span class="token keyword keyword-import">import</span> RequestsHTTPTransport

<span class="token comment"># Twingate API settings</span>
API_URL <span class="token operator">=</span> <span class="token string">"https://****your Twingate network here****.twingate.com/api/graphql/"</span>  <span class="token comment"># Replace &lt;subdomain&gt; with your Twingate subdomain</span>
API_KEY <span class="token operator">=</span> <span class="token string">"YOUR TWINGATE API KEY"</span>
TARGET_NETWORK_NAME <span class="token operator">=</span> <span class="token string">"YOUR REMOTE NETWORK"</span>  <span class="token comment"># Replace with your target network name</span>

QUERY_REMOTE_NETWORKS <span class="token operator">=</span> gql<span class="token punctuation">(</span><span class="token triple-quoted-string string">"""
query GetRemoteNetworkDetails {
  remoteNetworks(after: null, first: 10) {
    edges {
      node {
        id
        name
        connectors {
          edges {
            node {
              id
              name
              publicIP
              privateIPs
              remoteNetwork {
                id
                name
              }
            }
          }
        }
      }
    }
  }
}
"""</span><span class="token punctuation">)</span>

MUTATION_CREATE_RESOURCE <span class="token operator">=</span> gql<span class="token punctuation">(</span><span class="token triple-quoted-string string">"""
mutation CreateResource($name: String!, $address: String!, $remoteNetworkId: ID!) {
  resourceCreate(
    name: $name,
    address: $address,
    remoteNetworkId: $remoteNetworkId
  ) {
    ok
    error
    entity {
      id
      name
      address {
        type
        value
      }
    }
  }
}
"""</span><span class="token punctuation">)</span>

<span class="token keyword keyword-def">def</span> <span class="token function">setup_client</span><span class="token punctuation">(</span><span class="token punctuation">)</span><span class="token punctuation">:</span>
    transport <span class="token operator">=</span> RequestsHTTPTransport<span class="token punctuation">(</span>
        url<span class="token operator">=</span>API_URL<span class="token punctuation">,</span>
        headers<span class="token operator">=</span><span class="token punctuation">{</span><span class="token string">"X-API-KEY"</span><span class="token punctuation">:</span> API_KEY<span class="token punctuation">}</span><span class="token punctuation">,</span>
        use_json<span class="token operator">=</span><span class="token boolean">True</span><span class="token punctuation">,</span>
    <span class="token punctuation">)</span>
    <span class="token keyword keyword-return">return</span> Client<span class="token punctuation">(</span>transport<span class="token operator">=</span>transport<span class="token punctuation">,</span> fetch_schema_from_transport<span class="token operator">=</span><span class="token boolean">True</span><span class="token punctuation">)</span>

<span class="token keyword keyword-def">def</span> <span class="token function">get_target_network</span><span class="token punctuation">(</span>client<span class="token punctuation">)</span><span class="token punctuation">:</span>
    response <span class="token operator">=</span> client<span class="token punctuation">.</span>execute<span class="token punctuation">(</span>QUERY_REMOTE_NETWORKS<span class="token punctuation">)</span>
    <span class="token keyword keyword-for">for</span> edge <span class="token keyword keyword-in">in</span> response<span class="token punctuation">[</span><span class="token string">"remoteNetworks"</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">"edges"</span><span class="token punctuation">]</span><span class="token punctuation">:</span>
        network <span class="token operator">=</span> edge<span class="token punctuation">[</span><span class="token string">"node"</span><span class="token punctuation">]</span>
        <span class="token keyword keyword-if">if</span> network<span class="token punctuation">[</span><span class="token string">"name"</span><span class="token punctuation">]</span> <span class="token operator">==</span> TARGET_NETWORK_NAME<span class="token punctuation">:</span>
            <span class="token keyword keyword-return">return</span> network
    <span class="token keyword keyword-return">return</span> <span class="token boolean">None</span>

<span class="token keyword keyword-def">def</span> <span class="token function">create_resource</span><span class="token punctuation">(</span>client<span class="token punctuation">,</span> name<span class="token punctuation">,</span> address_value<span class="token punctuation">,</span> remote_network_id<span class="token punctuation">)</span><span class="token punctuation">:</span>
    params <span class="token operator">=</span> <span class="token punctuation">{</span>
        <span class="token string">"name"</span><span class="token punctuation">:</span> name<span class="token punctuation">,</span>
        <span class="token string">"address"</span><span class="token punctuation">:</span> address_value<span class="token punctuation">,</span>
        <span class="token string">"remoteNetworkId"</span><span class="token punctuation">:</span> remote_network_id
    <span class="token punctuation">}</span>
    response <span class="token operator">=</span> client<span class="token punctuation">.</span>execute<span class="token punctuation">(</span>MUTATION_CREATE_RESOURCE<span class="token punctuation">,</span> variable_values<span class="token operator">=</span>params<span class="token punctuation">)</span>
    <span class="token keyword keyword-if">if</span> <span class="token keyword keyword-not">not</span> response<span class="token punctuation">[</span><span class="token string">"resourceCreate"</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">"ok"</span><span class="token punctuation">]</span><span class="token punctuation">:</span>
        <span class="token keyword keyword-raise">raise</span> Exception<span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Failed to create resource: </span><span class="token interpolation"><span class="token punctuation">{</span>response<span class="token punctuation">[</span><span class="token string">'resourceCreate'</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">'error'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">"</span></span><span class="token punctuation">)</span>
    <span class="token keyword keyword-return">return</span> response<span class="token punctuation">[</span><span class="token string">"resourceCreate"</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">"entity"</span><span class="token punctuation">]</span>

<span class="token keyword keyword-def">def</span> <span class="token function">automate_resource_creation</span><span class="token punctuation">(</span><span class="token punctuation">)</span><span class="token punctuation">:</span>
    client <span class="token operator">=</span> setup_client<span class="token punctuation">(</span><span class="token punctuation">)</span>

    <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Searching for target network: </span><span class="token interpolation"><span class="token punctuation">{</span>TARGET_NETWORK_NAME<span class="token punctuation">}</span></span><span class="token string">..."</span></span><span class="token punctuation">)</span>
    target_network <span class="token operator">=</span> get_target_network<span class="token punctuation">(</span>client<span class="token punctuation">)</span>

    <span class="token keyword keyword-if">if</span> <span class="token keyword keyword-not">not</span> target_network<span class="token punctuation">:</span>
        <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Network '</span><span class="token interpolation"><span class="token punctuation">{</span>TARGET_NETWORK_NAME<span class="token punctuation">}</span></span><span class="token string">' not found."</span></span><span class="token punctuation">)</span>
        <span class="token keyword keyword-return">return</span>

    <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Found network: </span><span class="token interpolation"><span class="token punctuation">{</span>target_network<span class="token punctuation">[</span><span class="token string">'name'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">"</span></span><span class="token punctuation">)</span>
    remote_network_id <span class="token operator">=</span> target_network<span class="token punctuation">[</span><span class="token string">'id'</span><span class="token punctuation">]</span>

    <span class="token keyword keyword-for">for</span> connector_edge <span class="token keyword keyword-in">in</span> target_network<span class="token punctuation">[</span><span class="token string">"connectors"</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">"edges"</span><span class="token punctuation">]</span><span class="token punctuation">:</span>
        connector <span class="token operator">=</span> connector_edge<span class="token punctuation">[</span><span class="token string">"node"</span><span class="token punctuation">]</span>
        public_ip <span class="token operator">=</span> connector<span class="token punctuation">.</span>get<span class="token punctuation">(</span><span class="token string">"publicIP"</span><span class="token punctuation">)</span>
        private_ips <span class="token operator">=</span> connector<span class="token punctuation">.</span>get<span class="token punctuation">(</span><span class="token string">"privateIPs"</span><span class="token punctuation">,</span> <span class="token punctuation">[</span><span class="token punctuation">]</span><span class="token punctuation">)</span>

        <span class="token keyword keyword-if">if</span> public_ip<span class="token punctuation">:</span>
            resource_name <span class="token operator">=</span> <span class="token string-interpolation"><span class="token string">f"Resource-Public-</span><span class="token interpolation"><span class="token punctuation">{</span>public_ip<span class="token punctuation">.</span>replace<span class="token punctuation">(</span><span class="token string">'.'</span><span class="token punctuation">,</span> <span class="token string">'-'</span><span class="token punctuation">)</span><span class="token punctuation">}</span></span><span class="token string">"</span></span>
            <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Creating Resource for public IP: </span><span class="token interpolation"><span class="token punctuation">{</span>public_ip<span class="token punctuation">}</span></span><span class="token string">..."</span></span><span class="token punctuation">)</span>
            resource <span class="token operator">=</span> create_resource<span class="token punctuation">(</span>client<span class="token punctuation">,</span> resource_name<span class="token punctuation">,</span> public_ip<span class="token punctuation">,</span> remote_network_id<span class="token punctuation">)</span>
            <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Resource created: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'name'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string"> (ID: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'id'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">, Address: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'address'</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">'value'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">)"</span></span><span class="token punctuation">)</span>

        <span class="token keyword keyword-for">for</span> private_ip <span class="token keyword keyword-in">in</span> private_ips<span class="token punctuation">:</span>
            resource_name <span class="token operator">=</span> <span class="token string-interpolation"><span class="token string">f"Resource-Private-</span><span class="token interpolation"><span class="token punctuation">{</span>private_ip<span class="token punctuation">.</span>replace<span class="token punctuation">(</span><span class="token string">'.'</span><span class="token punctuation">,</span> <span class="token string">'-'</span><span class="token punctuation">)</span><span class="token punctuation">}</span></span><span class="token string">"</span></span>
            <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Creating Resource for private IP: </span><span class="token interpolation"><span class="token punctuation">{</span>private_ip<span class="token punctuation">}</span></span><span class="token string">..."</span></span><span class="token punctuation">)</span>
            resource <span class="token operator">=</span> create_resource<span class="token punctuation">(</span>client<span class="token punctuation">,</span> resource_name<span class="token punctuation">,</span> private_ip<span class="token punctuation">,</span> remote_network_id<span class="token punctuation">)</span>
            <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Resource created: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'name'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string"> (ID: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'id'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">, Address: </span><span class="token interpolation"><span class="token punctuation">{</span>resource<span class="token punctuation">[</span><span class="token string">'address'</span><span class="token punctuation">]</span><span class="token punctuation">[</span><span class="token string">'value'</span><span class="token punctuation">]</span><span class="token punctuation">}</span></span><span class="token string">)"</span></span><span class="token punctuation">)</span>

<span class="token keyword keyword-if">if</span> __name__ <span class="token operator">==</span> <span class="token string">"__main__"</span><span class="token punctuation">:</span>
    <span class="token keyword keyword-try">try</span><span class="token punctuation">:</span>
        automate_resource_creation<span class="token punctuation">(</span><span class="token punctuation">)</span>
    <span class="token keyword keyword-except">except</span> Exception <span class="token keyword keyword-as">as</span> e<span class="token punctuation">:</span>
        <span class="token keyword keyword-print">print</span><span class="token punctuation">(</span><span class="token string-interpolation"><span class="token string">f"Error: </span><span class="token interpolation"><span class="token punctuation">{</span>e<span class="token punctuation">}</span></span><span class="token string">"</span></span><span class="token punctuation">)</span>
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Save the file.</li>
</ul>
<h4 id="now-well-create-a-python-virtual-environment">Now, we’ll create a python virtual environment</h4>
<ul>
<li>This will make sure we can install packages and prerequisites without hurting your other projects. (if you have some….if you don’t…that’s okay….it’s just good practice)</li>
<li>First make sure you have it installed. See below for Linux.</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash"><span class="token function">sudo</span> <span class="token function">apt</span> <span class="token function">install</span> python3-venv -y
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Also make sure you install PIP</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash"><span class="token function">sudo</span> <span class="token function">apt</span> <span class="token function">install</span> python3-pip
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Now create a Python virtual environment and activate it.</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash">python3 -m venv twingatesomething

<span class="token builtin class-name">source</span> twingatesomething/bin/activate
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Install the pre-reqs</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash">pip <span class="token function">install</span> gql requests requests.toolbelt
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Type to run the script</li>
</ul>
<div class="highlight">
<div class="code-toolbar">
<pre class=" language-bash" tabindex="0"><code class=" language-bash" data-lang="bash">python3 twingate.py
</code></pre>
<div class="toolbar">
<div class="toolbar-item"><button class="copy-to-clipboard-button" type="button" data-copy-state="copy">Copy</button></div>
</div>
</div>
</div>
<ul>
<li>Check your resources in Twingate…you should see something cool</li>
</ul>
<p>!<img loading="lazy" decoding="async" class="alignnone size-large wp-image-19811" src="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-1024x609.png" alt="" width="640" height="381" srcset="https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-1024x609.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-400x238.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-768x457.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720-1536x914.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2025/03/Pasted-image-20241220115720.png 1856w" sizes="(max-width: 640px) 100vw, 640px" /></p>
</div>
<div class="pagination">
<div class="pagination__title"><a href="https://blog.networkchuck.com/posts/building-a-hacker-dropbox-access-any-network/" target="_blank" rel="noopener"><span class="pagination__title-h">source</span></a></div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is the Morris Worm? How One Man Accidentally Destroyed the Internet 30 Years Ago</title>
		<link>https://goodshepherdmedia.net/what-is-the-morris-worm-how-one-man-accidentally-destroyed-the-internet-30-years-ago/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 17:00:34 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Morris Worm]]></category>
		<category><![CDATA[worm]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=19530</guid>

					<description><![CDATA[This Is How One Man Accidentally Destroyed the Internet 30 Years Ago It all started with the Morris worm. Pixabay Back in November 1988, Robert Tappan Morris, son of the famous cryptographer Robert Morris Sr., was a 20-something graduate student at Cornell who wanted to know how big the internet was — that is, how many devices were [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="cCV">
<div class="sWr">
<div class="GqV JD9">
<div class="gsz Ak6">
<div class="R1N ROm wfd">
<h1 class="aVX cS4">This Is How One Man Accidentally Destroyed the Internet 30 Years Ago</h1>
</div>
<div class="r87 uRt">
<h2>It all started with the Morris worm.</h2>
</div>
<div class="rAY _9O">
<div></div>
</div>
</div>
<div class="daF">
<div class="pxF oL7 YOh"><picture><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=920&amp;h=560&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=920&amp;h=560&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=728&amp;h=512&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=728&amp;h=512&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" /><img decoding="async" class="N4z geM" src="https://imgix.bustle.com/inverse/16/d3/b9/0d/81ea/4fc4/a40e/f6ca452a0f8e/hacking-29031561920jpg.jpeg?w=400&amp;h=300&amp;fit=crop&amp;crop=faces&amp;dpr=2" alt="" /></picture></div>
</div>
<p><span class="Vms j29"><a href="https://pixabay.com/en/hacking-cyber-blackandwhite-crime-2903156/" target="_blank" rel="noopener noreferrer">Pixabay</a></span></p>
</div>
</div>
</div>
<div class="tn6">
<div class="AOL Afg" data-adroot="true">
<p>Back in November 1988, Robert Tappan Morris, son of the famous cryptographer <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">Robert Morris Sr.</a>, was a 20-something graduate student at Cornell who wanted to know <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">how big</a> the internet was — that is, how many devices were connected to it. So he wrote a program that would <a href="http://www.foo.be/docs-free/morris-worm/" target="_blank" rel="noopener noreferrer">travel from computer to computer</a> and ask each machine to send a signal back to a control server, which would keep count.</p>
<div class="adWrapper G8T zzk pCo hzA UdU">
<div id="ad-1" data-google-query-id="CIjamtf9_4sDFY8I7wId-ZQQEg">
<div id="google_ads_iframe_/49944529/inverse/posts_0__container__">The program worked well — too well, in fact. Morris had known that if it traveled too fast there might be problems, but the limits he built in weren’t enough to keep the program from <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">clogging up large sections of the internet</a>, both copying itself to new machines and sending those pings back. When he realized what was happening, even his <a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/morris-worm.html" target="_blank" rel="noopener noreferrer">messages warning system administrators</a> about the problem couldn’t get through.</div>
</div>
</div>
<div class="sWr iGR">
<div class="yFJ">
<div class="jjV">
<div class="_Qy wmr">
<div id="jwplayer-video-1" class="jwplayer jw-reset jw-state-paused jw-stretch-uniform jw-flag-aspect-mode jw-breakpoint-5 jw-floating-dismissible jw-flag-ads jw-flag-ads-googleima jw-flag-user-inactive" tabindex="0" role="application" aria-label="Video Player - This Quantum Device Will Protect You From Cyberattacks to Make &quot;True&quot; Random Numbers">
<div class="jw-wrapper jw-reset">
<div class="jw-controls jw-reset">
<div class="jw-controlbar jw-reset">
<div class="jw-reset jw-button-container">
<div class="jw-reset jw-spacer">His program became the first of a particular type of <a href="https://www.inverse.com/article/48293-5g-future-cybersecurity-risks">cyberattack</a> called “<a href="https://theconversation.com/attackers-can-make-it-impossible-to-dial-911-67980" target="_blank" rel="noopener noreferrer">distributed denial of service</a>,” in which large numbers of internet-connected devices, including computers, <a href="https://techcrunch.com/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled/" target="_blank" rel="noopener noreferrer">webcams</a>, and <a href="https://theconversation.com/police-around-the-world-learn-to-fight-global-scale-cybercrime-75804" target="_blank" rel="noopener noreferrer">other smart gadgets</a>, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked.</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU stickyScrollableRailAd">
<div id="ad-2" data-google-query-id="CMC61df9_4sDFWBZCAQdjKAwLA">
<div id="google_ads_iframe_/49944529/inverse/posts_1__container__">As the chair of the integrated <a href="https://cybersecurityprograms.indiana.edu/" target="_blank" rel="noopener noreferrer">Indiana University Cybersecurity Program</a>, I can report that these kinds of attacks are <a href="http://bwcio.businessworld.in/article/Verisign-releases-DDOS-Trends-Report-of-Q2-2018/05-10-2018-161517/" target="_blank" rel="noopener noreferrer">increasingly frequent</a> today. In many ways, Morris’s program, known to history as the “Morris worm,” set the stage for the crucial, and potentially devastating, vulnerabilities in what I and others have called the coming “<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3208018" target="_blank" rel="noopener noreferrer">Internet of Everything</a>.”</div>
</div>
</div>
<h2>Unpacking the Morris Worm</h2>
<p>Worms and <a href="https://www.inverse.com/article/44826-pig-virus-human-hosts-human-cells-study-shows">viruses</a> are similar but different in one key way: A virus needs an external command, from a user or a hacker, to run its program. A worm, by contrast, hits the ground running all on its own. For example, even if you never open your email program, a worm that gets onto your computer might email a copy of itself to everyone in your address book.</p>
<p>In an era when few people were concerned about malicious software and nobody had protective software installed, the Morris worm spread quickly. It took 72 hours for researchers at Purdue and Berkeley to <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">halt the worm</a>. In that time, it infected tens of thousands of systems — about <a href="https://www.welivesecurity.com/2013/11/06/five-interesting-facts-about-the-morris-worm-for-its-25th-anniversary/" target="_blank" rel="noopener noreferrer">10 percent of the computers then on the internet</a>. Cleaning up the infection cost <a href="https://en.wikipedia.org/wiki/Morris_worm#cite_note-6" target="_blank" rel="noopener noreferrer">hundreds or thousands of dollars</a> for each affected machine.</p>
<p>In the clamor of media attention about this first event of its kind, confusion was rampant. Some reporters even asked whether <a href="https://www.washingtonpost.com/news/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/" target="_blank" rel="noopener noreferrer">people could catch the computer infection</a>. Sadly, many journalists as a whole <a href="https://medium.com/@davelee/reporting-on-cyberattacks-the-medias-urgent-problem-d6c450a3383a" target="_blank" rel="noopener noreferrer">haven’t gotten much more knowledgeable on the topic</a> in the intervening decades.</p>
<div class="sWr iGR">
<div class="gDT">
<figure class="Qf5 CMk">
<div class="pxF CgC mvL s-817845468"><picture><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=825&amp;h=835&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=825&amp;h=835&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=688&amp;h=697&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=688&amp;h=697&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces, https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces&amp;dpr=2 2x" /><img decoding="async" class="N4z B9M" src="https://imgix.bustle.com/inverse/2c/03/fb/77/deaa/4c4e/bec1/5a8d825c4acc/robert-tappan-morris-in-2008.jpeg?w=374&amp;h=379&amp;fit=crop&amp;crop=faces&amp;dpr=2" alt="Robert Tappan Morris, in 2008." /></picture></div><figcaption class="rv9 tm3">
<div>
<p>Robert Tappan Morris, in 2008.</p>
</div>
<p><cite class="Afu _Nh"><a href="https://commons.wikimedia.org/wiki/File:Robert_Tappan_Morris.jpg" target="_blank" rel="noopener noreferrer">Trevor Blackwell/Wikimedia, CC BY-SA</a></cite></p>
</figcaption></figure>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU stickyScrollableRailAd">
<div id="ad-3" data-google-query-id="COiN19j9_4sDFYQ4RAgdtKYB9A">
<div id="google_ads_iframe_/49944529/inverse/posts_2__container__">Morris wasn’t trying to destroy the internet, but the worm’s widespread effects resulted in him being <a href="https://www.wired.com/2011/07/0726first-computer-fraud-indictment/" target="_blank" rel="noopener noreferrer">prosecuted</a> under the then-new <a href="https://theconversation.com/malwaretechs-arrest-sheds-light-on-the-complex-culture-of-the-hacking-world-82136" target="_blank" rel="noopener noreferrer">Computer Fraud and Abuse Act</a>. He was sentenced to three years of probation and a roughly $10,000 fine. In the late 1990s, though, he became a <a href="https://www.cnet.com/news/yahoo-buys-viaweb-for-49-million/" target="_blank" rel="noopener noreferrer">dot-com millionaire</a> — and is now a <a href="https://pdos.csail.mit.edu/%257Ertm/" target="_blank" rel="noopener noreferrer">professor at MIT</a>.</div>
</div>
</div>
<h2>Rising Threats</h2>
<p>The internet remains subject to much more frequent — and more crippling — DDoS attacks. With more than <a href="https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/" target="_blank" rel="noopener noreferrer">20 billion</a> devices of all types, from refrigerators and cars to fitness trackers, connected to the internet, and millions more being connected weekly, the number of security flaws and vulnerabilities is exploding.</p>
<p>In October 2016, a DDoS attack using <a href="https://techcrunch.com/2016/10/24/webcams-involved-in-dyn-ddos-attack-recalled/" target="_blank" rel="noopener noreferrer">thousands of hijacked webcams</a> — often used for security or baby monitors — <a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet" target="_blank" rel="noopener noreferrer">shut down access to a number of important internet services</a> along the eastern US seaboard. That event was the culmination of a series of increasingly damaging attacks using a botnet, or a network of compromised devices, which was controlled by <a href="https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/" target="_blank" rel="noopener noreferrer">software called Mirai</a>. Today’s internet is much larger, but not much more secure, than the internet of 1988.</p>
<p>Some things have actually gotten worse. Figuring out <a href="https://doi.org/10.1080/01402390.2014.977382" target="_blank" rel="noopener noreferrer">who is behind particular attacks</a> is not as easy as waiting for that person to get worried and <a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/morris-worm.html" target="_blank" rel="noopener noreferrer">send out apology notes and warnings</a>, as Morris did in 1988. In some cases — the ones big enough to merit full investigations — it’s possible to identify the culprits. A trio of college students was ultimately found to have <a href="https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/" target="_blank" rel="noopener noreferrer">created Mirai to gain advantages</a> when playing the <em>Minecraft</em> computer game.</p>
<h2>Fighting DDoS Attacks</h2>
<p>But technological tools are not enough, and neither are laws and regulations about online activity — including the <a href="https://ssrn.com/abstract=2573787" target="_blank" rel="noopener noreferrer">law under which Morris was charged</a>. The dozens of state and federal cybercrime statutes on the books have <a href="https://phys.org/news/2018-02-cyberattacks-costly-worse.html" target="_blank" rel="noopener noreferrer">not yet seemed to reduce the overall number or severity</a> of attacks, in part because of the <a href="https://www.csoonline.com/article/3153707/security/top-cybersecurity-facts-figures-and-statistics.html" target="_blank" rel="noopener noreferrer">global nature</a> of the problem.</p>
<div class="adWrapper G8T zzk pCo hzA UdU">
<div id="ad-4" data-google-query-id="CKq1rOL9_4sDFUzl_QUdBhsrdQ">
<div id="google_ads_iframe_/49944529/inverse/posts_3__container__">There are some efforts underway in Congress to <a href="https://www.fifthdomain.com/congress/policy/2018/10/12/support-for-hack-back-grows-after-trumps-pledge-to-get-aggressive-in-cyberspace/" target="_blank" rel="noopener noreferrer">allow attack victims in some cases to engage in active defense measures</a> — a <a href="https://www.lawfareblog.com/tagged/hacking-back" target="_blank" rel="noopener noreferrer">notion</a> that comes with a number of downsides, including the risk of escalation — and to <a href="https://www.reuters.com/article/us-usa-cyber-congress-idUSKBN1AH474" target="_blank" rel="noopener noreferrer">require better security</a> for internet-connected devices. But passage is far from assured.</div>
</div>
</div>
<div class="adWrapper kG8 zzk k_e UdU">
<div id="ad-5" data-google-query-id="CLfExuL9_4sDFa78_QUdu4cnBg">
<div id="google_ads_iframe_/49944529/inverse/posts_4__container__">There is cause for hope, though. In the wake of the Morris worm, Carnegie Mellon University established the world’s first <a href="https://www.sei.cmu.edu/about/divisions/cert/index.cfm#history" target="_blank" rel="noopener noreferrer">Cyber Emergency Response Team</a>, which has been replicated <a href="https://www.us-cert.gov/" target="_blank" rel="noopener noreferrer">in the federal government</a> and <a href="http://www.internationalcybercenter.org/certicc/certworld" target="_blank" rel="noopener noreferrer">around the world</a>. Some policymakers are talking about establishing a <a href="https://www.securityweek.com/does-us-need-national-cybersecurity-safety-board" target="_blank" rel="noopener noreferrer">national cybersecurity safety board</a>, to <a href="https://theconversation.com/what-cybersecurity-investigators-can-learn-from-airplane-crashes-91177" target="_blank" rel="noopener noreferrer">investigate digital weaknesses and issue recommendations</a>, much as the National Transportation Safety Board does with <a href="https://www.inverse.com/article/49548-element-one-hydrogen-fuel-plane-2025">airplane</a> disasters.</div>
</div>
</div>
<p>More organizations are also taking preventative action, adopting best practices in cybersecurity as they build their systems, rather than waiting for a problem to happen and trying to clean up afterward. If more organizations considered cybersecurity as an important element of <a href="https://theconversation.com/notpetya-ransomware-attack-shows-corporate-social-responsibility-should-include-cybersecurity-79810" target="_blank" rel="noopener noreferrer">corporate social responsibility</a>, they — and their staff, customers, and business partners — would be safer.</p>
<p>In <a href="https://www.penguinrandomhouse.com/books/28148/3001-the-final-odyssey-by-arthur-c-clarke/9780345423498/" target="_blank" rel="noopener noreferrer"><em>3001: The Final Odyssey</em></a>, science fiction author Arthur C. Clarke envisioned a future where humanity sealed the worst of its weapons in a vault on the moon — which included room for the most malignant computer viruses ever created. Before the next iteration of the Morris worm or Mirai does untold damage to the modern information society, it is up to everyone — governments, companies, and individuals alike — to set up rules and programs that support widespread cybersecurity, without waiting another 30 years. <a href="https://www.inverse.com/article/50422-worlds-first-cyberattack-happened-30-years-ago-robert-tappan-morris" target="_blank" rel="noopener">source</a></p>
<div class="sWr iGR">
<div class="gDT">
<figure class="Qf5 CMk">
<div class="pxF CgC mvL s1359406774"><picture><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" media="(min-width:1025px)" /><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" media="(min-width:768px)" /><source srcset="https://imgix.bustle.com/uploads/image/2020/1/17/8a40da51-497d-472d-a6a5-70aae3d08a37-divider-1.svg" /></picture></div>
</figure>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacker Tool Kit &#038; Pen Tester Kit HackerBox 0073 LAN Lord</title>
		<link>https://goodshepherdmedia.net/hacker-tool-kit-pen-tester-kit-hackerbox-0073-lan-lord/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 07 Nov 2024 07:29:02 +0000</pubDate>
				<category><![CDATA[⚠️Breaking News⚠️]]></category>
		<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[0073 LAN Lord]]></category>
		<category><![CDATA[Hacker Tool Kit]]></category>
		<category><![CDATA[HackerBox]]></category>
		<category><![CDATA[Pen Test Kit]]></category>
		<category><![CDATA[Pen Tester Kit]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18828</guid>

					<description><![CDATA[Hacker Tool Kit &#38; Pen Tester Kit HackerBox 0073 LAN Lord Welcome to HackerBox 0073. We will explore Wi-Fi channels and frequencies, configure the ESP8266 D1 Mini SoC, assemble the Open Source Wi-Fi Nugget, leverage the Wi-Fi Nugget as a communications security and hacking tool, introduce the Rtlduino dual-frequency wireless SoC, assemble a full-color TFT [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Hacker Tool Kit &amp; Pen Tester Kit HackerBox 0073 LAN Lord</h1>
<p><iframe title="HakByte: Create a $15 WarDriving Rig to Log WiFi Data w/ the ESP8266" width="640" height="360" src="https://www.youtube.com/embed/ITRwyr7KOnc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<section id="intro" class="step" data-stepid="SZANRS1KWNJLR5F">
<div class="step-body">
<p>Welcome to HackerBox 0073. We will explore Wi-Fi channels and frequencies, configure the ESP8266 D1 Mini SoC, assemble the Open Source Wi-Fi Nugget, leverage the Wi-Fi Nugget as a communications security and hacking tool, introduce the Rtlduino dual-frequency wireless SoC, assemble a full-color TFT display platform for the Rtlduino, and leverage the platform to implement a Wi-Fi channel mapping tool capable of operating on both 2.4GHz and 5GHz wireless bands.</p>
<p>HackerBoxes is the monthly subscription box for enthusiasts of electronics and computer technology &#8211; Hardware Hackers &#8211; The Dreamers of Dreams.</p>
<p>There is a wealth of information for current and prospective members in the <a href="https://hackerboxes.com/a/FAQ" rel="nofollow noopener noreferrer">HackerBoxes FAQ</a>. Almost all of the non-technical support emails that we receive are already answered there, so we&#8217;d really appreciate it if you can take a few minutes to read the FAQ.</p>
</div>
</section>
<section id="stepsupplies" class="step" data-stepid="">
<h2 class="step-title">Supplies</h2>
<div class="step-body">
<p>This Instructable contains information for getting started with HackerBox 0073. The full box contents are listed on the <a href="https://hackerboxes.com/products/hackerbox-0073-lan-lord" rel="nofollow noopener noreferrer">product page for HackerBox 0073</a> where the box is also available for purchase while supplies last. If you would like to automatically receive a HackerBox like this right in your mailbox each month with a $15 discount, you can subscribe at HackerBoxes.com and join the revolution!</p>
<p>A soldering iron, solder, and basic soldering tools are generally needed to work on the monthly HackerBox. A computer for running software tools is also required. Have a look at the HackerBox Core Workshop for a set of basic tools and a wide array of introductory activities and experiments.</p>
<p>Most importantly, you will need a sense of adventure, hacker spirit, patience, and curiosity. Building and experimenting with electronics, while very rewarding, can be tricky, challenging, and even frustrating at times. The goal is progress, not perfection. When you persist and enjoy the adventure, a great deal of satisfaction can be derived from this hobby. Take each step slowly, mind the details, and don&#8217;t be afraid to ask for help.</p>
</div>
</section>
<section id="step1" class="step" data-stepid="SMI9A5BKWNJLR5K">
<h2 class="step-title">Step 1: Wi-Fi Frequencies and Channels</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18831" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/F303XAYKWOZ14AI.webp" alt="" width="931" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/F303XAYKWOZ14AI.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/F303XAYKWOZ14AI-400x301.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/F303XAYKWOZ14AI-768x577.webp 768w" sizes="(max-width: 931px) 100vw, 931px" /></div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>The 802.11 standard provides several distinct radio frequency ranges for use in Wi-Fi communications. These range from 1000 MHz to 60 GHz bands. Currently, the most commonly used frequency bands are 2.4GHz and 5GHz.</p>
<p>Each range is divided into multiple channels numbered at 5 MHz spacing. Although channels are numbered at 5 MHz spacing, transmitters generally occupy at least 20 MHz, and standards allow for channels to be bonded together to form wider channels for higher throughput.</p>
<p>Each Wi-Fi channel is a small segment of a frequency through which wireless networks can send and receive data. The 2.4Ghz band is made up of 14 channels, 3 of which are non-overlapping channels. In the illustration the non-overlapping channels are shown with solid lines while the others are dotted. The 5Ghz band has 23 channels, 8 of which are defined for indoor routers and access points.</p>
<p>The 2.4GHz band provides a wide coverage area and is better at penetrating solid objects. It has a maximum data speed of 150Mbps. Unfortunately, 2.4GHz frequencies can suffer more interference and disturbance.</p>
<p>The 5 GHz frequencies support higher data speeds with reduced interference, put provide narrower coverage area and are less capable of penetrating solid objects.</p>
</div>
</section>
<section id="step2" class="step" data-stepid="SPD41GUKWNJLR5P">
<h2 class="step-title">Step 2: ESP8266 D1 Mini</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18833" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FQHN2V3KWOZ151F.webp" alt="" width="932" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FQHN2V3KWOZ151F.webp 932w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FQHN2V3KWOZ151F-400x300.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FQHN2V3KWOZ151F-768x577.webp 768w" sizes="(max-width: 932px) 100vw, 932px" /></div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>The D1 Mini Module is based on the <a href="https://en.wikipedia.org/wiki/ESP8266" rel="nofollow noopener noreferrer">ESP8266</a> SOC. The ESP8266 SOC includes a microcontroller core, Wi-Fi circuitry, and an integrated TCP/IP protocol stack. The ESP8266 is capable of running code directly on its MCU core, or the ESP8266 can act as a communication peripheral to provide WiFi functionality to another microcontroller.</p>
<p><strong>ESP8266 with the Arduino IDE</strong></p>
<p>The D1 Mini Module can be programmed through the Arduino IDE. To set up the ESP8266 support within the Arduino IDE, follow Steps 1-5 of <a href="https://randomnerdtutorials.com/how-to-install-esp8266-board-arduino-ide/" rel="nofollow noopener noreferrer">this tutorial</a>.</p>
<p>In the IDE, select Tools &gt; Board &gt; ESP8266 Boards &gt; LOLIN WEMOS D1 R2 &amp; mini</p>
<p>Under Tools &gt; Port select the COM port that appears when the D1 Mini is plugged in</p>
<p><strong>Blink an LED</strong></p>
<p>Open and upload the sketch: File &gt; Example &gt; ESP8266 &gt; Blink</p>
<p>Once uploaded, the Blink sketch will flash the blue LED on the D1 Mini</p>
<p>You can experiment with changing both delay calls in the blink sketch to 2000, run the code, and then change them both to 200 and run the code again. Verify that the LED flashes ten times faster with the 200ms delays compared to the 2000ms delays.</p>
<p><strong>Scan Wi-Fi Networks</strong></p>
<p>The best thing about the ESP8266 is Wi-Fi support, so let&#8217;s try it out. Grab the <em>NetScan8266.ino</em> sketch attached here. Program it into the D1 Mini.</p>
<p>Open Tools &gt; Serial Monitor and set the baud rate to 9600.</p>
<p>The ESP8266 will scan for all 2.4GHz networks and then list out the SSID and <a href="https://en.wikipedia.org/wiki/Received_signal_strength_indication" rel="nofollow noopener noreferrer">RSSI</a> of each one to the serial monitor.</p>
</div>
<div class="downloads">
<h3 class="sr-only">Attachments</h3>
<ul id="attachments" class="ible-files unstyled list-unstyled">
<li class="file-info clearfix"><a class="thumb-wrapper" href="https://content.instructables.com/F04/B895/KWOZ1599/F04B895KWOZ1599.ino" download="NetScan8266.ino"><span class="file-thumb"><img decoding="async" class="tiny-img ls-is-cached lazyloaded" src="https://content.instructables.com/static/image/file.default.gif" alt="download {{ file.name }}" data-src="https://content.instructables.com/static/image/file.default.gif" /></span><span class="title">NetScan8266.ino</span></a>
<div class="file-actions"><a class="btn pull-right" href="https://content.instructables.com/F04/B895/KWOZ1599/F04B895KWOZ1599.ino" download="NetScan8266.ino">Download</a></div>
</li>
</ul>
</div>
</section>
<section id="step3" class="step" data-stepid="S9ETL82KWNJLR5Z">
<h2 class="step-title">Step 3: Assemble the Wi-Fi Nugget</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]">
<div class="photoset-image"><a class="gallery-link" href="https://content.instructables.com/FSN/DP53/KWQEE31O/FSNDP53KWQEE31O.png?auto=webp&amp;frame=1&amp;width=1024&amp;fit=bounds&amp;md=MjAyMS0xMi0wMyAwNToxNjozMy4w" rel="photoset73" data-download="https://content.instructables.com/FSN/DP53/KWQEE31O/FSNDP53KWQEE31O.png?auto=webp&amp;frame=1&amp;md=MjAyMS0xMi0wMyAwNToxNjozMy4w" data-fileid="FSNDP53KWQEE31O"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18832" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FSNDP53KWQEE31O.webp" alt="" width="931" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FSNDP53KWQEE31O.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FSNDP53KWQEE31O-400x301.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FSNDP53KWQEE31O-768x577.webp 768w" sizes="(max-width: 931px) 100vw, 931px" /></a></div>
</div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>The Wi-Fi Nugget is a cool hacking platform based on the D1 Mini module with an added OLED display, four push buttons, and an RGB WS2812B LED.</p>
<p>The Open Source Hardware Wi-Fi Nugget was designed by <a href="https://linktr.ee/skickar" rel="nofollow noopener noreferrer">skickar</a> and <a href="https://www.youtube.com/c/AlexLynd" rel="nofollow noopener noreferrer">alexlynd</a>. MOAR Nuggets can be purchased from <a href="https://retia.io/products/wi-fi-nugget-assembled" rel="nofollow noopener noreferrer">Retia</a>.</p>
<p><strong>Assembly Notes:</strong></p>
<p>Start with the four pushbuttons. They are not polarized and can be oriented in either direction.</p>
<p>Next set the LED. It must be correctly oriented, so find the little white triangle on one corner of he LED itself and the corner marking on the PCB silk screen. Turn the LED so that these line up.</p>
<p>Next solder on the ESP8266 D1 Mini using the header pins. After soldering, trim the pins close the Nugget PCB</p>
<p><strong><em>ALWAYS WEAR SAFETY GLASSES WHEN CUTTING PINS</em></strong></p>
<p>The last item to solder is the 1.3 inch OLED Display. Prior to soldering the OLED, it is a good idea to put some electrical tape (or carboard or plastic or whatever) between the display and the D1 mini pins that protrude underneath. This can help prevent things from shorting out and also makes the finished product feel nice and solid.</p>
<p><strong>Shall We Play A Game?</strong></p>
<p>This one has nothing to do with LANs, but games are always fun.</p>
<p>Give the attached <em>arkanug.ino</em> a shot.</p>
<p>Note that <em>arkanug</em> requires first setting up the library ssd1306 (by Alexey Dynda) through the Arduino IDE library manager.</p>
</div>
<div class="downloads">
<h3 class="sr-only">Attachments</h3>
<ul id="attachments" class="ible-files unstyled list-unstyled">
<li class="file-info clearfix"><a class="thumb-wrapper" href="https://content.instructables.com/F5P/KLTS/KWQEEBVO/F5PKLTSKWQEEBVO.ino" download="arkanug.ino"><span class="file-thumb"><img decoding="async" class="tiny-img ls-is-cached lazyloaded" src="https://content.instructables.com/static/image/file.default.gif" alt="download {{ file.name }}" data-src="https://content.instructables.com/static/image/file.default.gif" /></span><span class="title">arkanug.ino</span></a>
<div class="file-actions"><a class="btn pull-right" href="https://content.instructables.com/F5P/KLTS/KWQEEBVO/F5PKLTSKWQEEBVO.ino" download="arkanug.ino">Download</a></div>
</li>
</ul>
</div>
</section>
<section id="step4" class="step" data-stepid="SYV0W9QKWNJLR63">
<h2 class="step-title">Step 4: Wi-Fi Nugget Projects</h2>
<div class="mediaset">
<div class="videoset-wrapper">
<div class="videoset">
<div class="videoset-cell">
<div class="videoset-item"></div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>This video demonstrates the power and versatility of the little ESP8266 SoC as a security tool.</p>
<p>Wi-Fi Nugget <a href="https://github.com/HakCat-Tech/ESP8266-Packet-Monitor" rel="nofollow noopener noreferrer">Packet Monitor</a> code</p>
<p>Wi-Fi Nugget <a href="https://youtu.be/WAG7yCbEFtw" rel="nofollow noopener noreferrer">Quick Start</a> video</p>
<p>Find additional videos and projects on <a href="https://www.youtube.com/channel/UC3s0BtrBJpwNDaflRSoiieQ" rel="nofollow noopener noreferrer">HAK5 YouTube Channel</a></p>
<p>Search for &#8220;WiFi Nugget&#8221; on YouTube</p>
</div>
</section>
<section id="step5" class="step" data-stepid="ST8B9XJKWNJLR67">
<h2 class="step-title">Step 5: Rtlduino RTL8720DN Dual-Band IoT Module</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]">
<div class="photoset-image"><a class="gallery-link" href="https://content.instructables.com/FMP/O7XR/KWQEEGAI/FMPO7XRKWQEEGAI.png?auto=webp&amp;frame=1&amp;width=1024&amp;fit=bounds&amp;md=MjAyMS0xMi0wMyAwNzozMDo0Ni4w" rel="photoset79" data-download="https://content.instructables.com/FMP/O7XR/KWQEEGAI/FMPO7XRKWQEEGAI.png?auto=webp&amp;frame=1&amp;md=MjAyMS0xMi0wMyAwNzozMDo0Ni4w" data-fileid="FMPO7XRKWQEEGAI"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18835" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FMPO7XRKWQEEGAI.webp" alt="" width="931" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FMPO7XRKWQEEGAI.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FMPO7XRKWQEEGAI-400x301.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FMPO7XRKWQEEGAI-768x577.webp 768w" sizes="(max-width: 931px) 100vw, 931px" /></a></div>
</div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>The Rtlduino development board includes the BW16 dual-band Wi-Fi+Bluetooth SoC module. The BW16 is based on the RTL8720DN chip from Realtek (<a href="https://files.seeedstudio.com/products/102110419/Basic%20documents/UM0401_RTL872xD_Datasheet_v3.4_watermark.pdf" rel="nofollow noopener noreferrer">datasheet</a>). The RTL8720 supports dual band (2.4GHz and 5GHz) Wireless LAN (Wi-Fi) and Bluetooth Low Energy (BLE 5.0). The RTL8720 incorporates two processing cores:</p>
<p>The first core is a high-performance MCU called the KM4. This high-performance core is ARM Cortex-M33 instruction set compatible (Armv8-M). The KM4 MCU is a 32-bit core supporting enhanced debug features, floating point computation, DSP instructions and incorporates a 3-stage pipeline.</p>
<p>The second core is a low power MCU called the KM0. This low-power core is ARM Cortex-M23 instruction set compatible (Armv8-M). The KM0 MCU is an energy-efficient &#8220;coprocessor&#8221; operating on a simple instruction set and reduced code size while remaining code-compatible and tool-compatible with the high-performance KM4 core.</p>
<p>Features:</p>
<ul>
<li>Dual Band Wi-Fi: 2.4GHz and 5GHz</li>
<li>802.11a/b/g/n</li>
<li>Supports HT20/HT40 mode</li>
<li>Low-power modes: beacon monitoring, receiver, suspend</li>
<li>Built-in AES/DES/SHA hardware engine</li>
<li>TrustZone-M and Secure Boot</li>
<li>SWD debug protection and prohibit mode</li>
<li>BLE and BT5.0 Bluetooth</li>
<li>High-Power Bluetooth Amplifier (7dBm)</li>
<li>Shared Wi-Fi and BT Antenna</li>
<li>Wi-Fi Modes: STA/AP/STA+AP</li>
</ul>
<p>Reference: <a href="https://docs.ai-thinker.com/en/rtl87xx" rel="nofollow noopener noreferrer">BW16 Documentation</a> (Ai-Thinker)</p>
<p><strong>MAKING FIRST CONTACT:</strong></p>
<p>We suggest making first contact with, and reprogramming, the Rtlduino module prior to soldering the module or connecting anything to its pins. Simply connect the microUSB port on the Rtlduino to your PC and launch a serial terminal program such as the Arduino IDE Serial Monitor or PuTTY. Set the baud rate of the terminal to 38,400.</p>
<p>The terminal should display &#8220;AT COMMAND READY&#8221; and a # prompt from the Rtlduino. You can type &#8220;AT&#8221; through the terminal and receive an &#8220;OK&#8221; in response.</p>
<p>This AT command interface (reminiscent of Hayes modems and initial ESP8266 offerings) is provided by the firmware loaded into the Rtlduino at the factory. You can remove this firmware and run your own programs.</p>
</div>
</section>
<section id="step6" class="step" data-stepid="SHFFKOWKWOZ014A">
<h2 class="step-title">Step 6: Rtlduino &#8211; Removing the Factory Firmware</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18834" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FOI5WO6KWQEEG9R.webp" alt="" width="931" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FOI5WO6KWQEEG9R.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FOI5WO6KWQEEG9R-400x301.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FOI5WO6KWQEEG9R-768x577.webp 768w" sizes="(max-width: 931px) 100vw, 931px" /></div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>There are three different methods suggested <a href="https://forum.amebaiot.com/t/resources-bw16-troubleshooting-guide/678" rel="nofollow noopener noreferrer">on this forum</a> for clearing the factory firmware on the Rtlduino. We have had success with Method 1 which performs an over the air (OTA) flash using your Wi-Fi network. The process is a little convoluted, so we&#8217;ve attempted to restate it below:</p>
<p><strong>STEP 1. Download the AmebaD SDK</strong></p>
<p>The SDK can be found at the <a href="https://github.com/ambiot/ambd_sdk" rel="nofollow noopener noreferrer">ambiot GitHub</a>.</p>
<p><strong>STEP 2. C</strong><strong>onnect the Rtlduino to your Wi-Fi Network</strong></p>
<p>This is done through the Rtlduino AP command interface</p>
<p>From the serial terminal, enter the AT Command: ATPN=SSID,password</p>
<p>Wait for the response: #ATPN OK</p>
<p>Note that the Wi-Fi network used needs to be the same one that your PC is on</p>
<p><strong>STEP 3. Generate the OTA.bin File</strong></p>
<p>Among the SDK files downloaded above, navigate to the folder &#8220;tools\AmbaD\Image_Tool&#8221;</p>
<p>Run image_tool.exe</p>
<p>Click the &#8220;Generate&#8221; tab</p>
<p>In the &#8220;Generate Target&#8221; dropdown, select OTA_All</p>
<p>Check the box next to &#8220;Bin 3&#8221;</p>
<p>On that same line, hit browse and navigate to that same &#8220;Image_Tool&#8221; folder</p>
<p>From that folder, select &#8220;imgtool_flashloader_amebad.bin&#8221;</p>
<p>Hit &#8220;Generate&#8221;</p>
<p>To save the output file, navigate to &#8220;tools\DownloadServer&#8221; among the same SDK files</p>
<p>Save the file into that folder as &#8220;ota.bin&#8221;</p>
<p><strong>STEP 4. Find the IP Address of your PC</strong><br />
Open a Windows Command Prompt</p>
<p>Run &#8220;ipconfig&#8221;</p>
<p>Make a note of the full address shown as &#8220;IPv4 Address&#8221;</p>
<p><strong>STEP 5. Launch the OTA Download Server</strong></p>
<p>From the Windows Command Prompt, change the directory to:<br />
“\tools\DownloadServer” (where you saved ota.bin)</p>
<p>Run start.bat</p>
<p>The tool will display &#8220;Listening on Port (NNNN) &#8230; Waiting for client&#8230;&#8221;</p>
<p>Make a note of that port number.</p>
<p><strong>STEP 6. Connect the OTA Client (the Rtlduino)</strong></p>
<p>Go back to the serial terminal window</p>
<p>Enter the AT Command:</p>
<p>ATSO=IP_address,port_number</p>
<p>The response should show: ”Erase is ongoing…&#8221; and then eventually complete.</p>
<p><strong>STEP 7. Check the Rtlduino Firmware Image</strong></p>
<p>Press the reset button (RST) on the Rtlduino to check the serial output has updated</p>
</div>
</section>
<section id="step7" class="step" data-stepid="SUB7KVFKWOZ0AFG">
<h2 class="step-title">Step 7: Rtlduino &#8211; Configure and Test Arduino Tools</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]">
<div class="photoset-image"><a class="gallery-link" href="https://content.instructables.com/FDY/FAH5/KWOZ0PM0/FDYFAH5KWOZ0PM0.png?auto=webp&amp;frame=1&amp;fit=bounds&amp;md=MjAyMS0xMi0wMiAxMzozMjozNy4w" rel="photoset85" data-download="https://content.instructables.com/FDY/FAH5/KWOZ0PM0/FDYFAH5KWOZ0PM0.png?auto=webp&amp;frame=1&amp;md=MjAyMS0xMi0wMiAxMzozMjozNy4w" data-fileid="FDYFAH5KWOZ0PM0"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18836" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FDYFAH5KWOZ0PM0.webp" alt="" width="931" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FDYFAH5KWOZ0PM0.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FDYFAH5KWOZ0PM0-400x301.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FDYFAH5KWOZ0PM0-768x577.webp 768w" sizes="(max-width: 931px) 100vw, 931px" /></a></div>
</div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>First we need to link together two serial ports of the Rtlduino. These are the Main Serial UART and the Log UART. We can link these two ports using two female-female jumpers on the pins shown in the image. The Serial_RX pin is connected to the Log_RX pin. The Serial_TX pin is connected to the Log_TX pin.</p>
<p>Next, install the Arduino IDE (this is probably already done)</p>
<p>Visit the GitHub repo for the <a href="https://github.com/ambiot/ambd_arduino" rel="nofollow noopener noreferrer">Ameba Arduino SDK</a></p>
<p>Follow the instructions there for adding the additional board manager URL into the IDE</p>
<p>Follow the instructions to install the board manager for &#8220;Realtek Ameba Boards&#8221;</p>
<p>In the IDE, Select Tools &gt; Board &gt; AmebaD ARM Boards &gt; RTL8720DN(BW16)</p>
<p>Select the appropriate COM port</p>
<p>Open File &gt; Examples &gt; Basics &gt; Blink</p>
<p>Hit the upload icon (arrow button)</p>
<p>After compiling the code, the IDE will show &#8220;Please enter the upload mode (wait 5s)&#8221;</p>
<p>Press and hold both buttons on the Rtlduino, release the RST button, wait a second, release the Burn button</p>
<p>Hit the RST button again to reset the board and run the newly flashed blink sketch</p>
<p>Repeat the process whenever uploading a sketch to the Rtlduino</p>
<p>The Rtlduino actually has three different on-board LEDs. The define LED_BUILTIN in the blink sketch defaults to LED_G (green). Try replacing all three instances of LED_BUILTIN in the blink sketch with LED_R or LED_B.</p>
</div>
</section>
<section id="step8" class="step" data-stepid="S5GABT5KWNJLR6K">
<h2 class="step-title">Step 8: Rtlduino &#8211; TFT Display Interface PCB</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18837" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/F2F7ELJKWQEEGLK.webp" alt="" width="931" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/F2F7ELJKWQEEGLK.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/F2F7ELJKWQEEGLK-400x301.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/F2F7ELJKWQEEGLK-768x577.webp 768w" sizes="(max-width: 931px) 100vw, 931px" /></div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p><strong>Assembly</strong></p>
<p>1) Apply two solder blobs to short across the serial port pads linking RX to RX and TX to TX. These connections replace the jumper wires used in the previous step.</p>
<p>2) Insert the four pin header into the PCB. Position the header with the black plastic and the long pins on the TFT side of the PCB and the short pins protruding through to the side of the PCB with the HackerBox logo. Solder the four header pins.</p>
<p>3) Insert the Rtlduino module onto the side of the PCB with the HackerBox logo. Solder the Rtlduino header pins.</p>
<p>4) Insert the TFT display module on the other side of the PCB. Position the TFT module so that it is floating a bit away from the black PCB by imagining that the yellow and black plastic header insulators are 1.5-2 times thicker than they are. Keep the red PCB and the black PCB parallel while soldering the first few pins. Solder the entire long TFT header to the black PCB and then solder the four pin header to the TFT module.</p>
<p><strong>Install a Library for the TFT Display</strong></p>
<p>Using the IDE Library Manager, install the library &#8220;Adafruit ILI9341&#8221;</p>
<p><strong>Test the TFT Display with Fractals</strong></p>
<p>Open the sketch File &gt; Examples &gt; Adafruit ILI9341 &gt; mandelbrot</p>
<p>About 18 lines down under the comment &#8220;//use SPI&#8221; find the #define for TFT_DC</p>
<p>change #define TFT_DC from 10 to 8</p>
</div>
</section>
<section id="step9" class="step" data-stepid="S3USCJRKWUORRX6">
<h2 class="step-title">Step 9: Rtlduino TFT &#8211; PCB Specs</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18838" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/F0R9B0GKWUORS0W.webp" alt="" width="932" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/F0R9B0GKWUORS0W.webp 932w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/F0R9B0GKWUORS0W-400x300.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/F0R9B0GKWUORS0W-768x577.webp 768w" sizes="(max-width: 932px) 100vw, 932px" /></div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>The extra jumpers points on the PCB can be shorted to connect the SD card socket</p>
<p>The blue numbers in the image indicate the definitions of the Rtlduino pins within the Arduino environment</p>
<p>Arduino pins 6 and 7 are not needed by the TFT display and may be used for other I/O connections. Arduino pin 7 connects to the jumper pad labeled PA25 on the black PCB. Arduino pin 6 connects to the circular test pad labeled PB3 on the black PCB.</p>
</div>
</section>
<section id="step10" class="step" data-stepid="S91RIAPKWNJLR6P">
<h2 class="step-title">Step 10: Rtlduino &#8211; Dual Frequency Wi-Fi Mapping</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18839" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FFB1G5NKWOZ0WP1.webp" alt="" width="853" height="640" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/FFB1G5NKWOZ0WP1.webp 853w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FFB1G5NKWOZ0WP1-400x300.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/FFB1G5NKWOZ0WP1-768x576.webp 768w" sizes="(max-width: 853px) 100vw, 853px" /></div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>Grab the attached <strong><em>DualWiFiMapper.ino</em></strong> sketch and burn it to the Rtlduino.</p>
<p>Feel the power of dual frequency Wi-Fi support?</p>
<p>We can now work with both 2.4GHz and 5GHz wireless channels.</p>
</div>
<div class="downloads">
<h3 class="sr-only">Attachments</h3>
<ul id="attachments" class="ible-files unstyled list-unstyled">
<li class="file-info clearfix"><a class="thumb-wrapper" href="https://content.instructables.com/FF6/7IC7/KWQEF30J/FF67IC7KWQEF30J.ino" download="DualWiFiMapper.ino"><span class="file-thumb"><img decoding="async" class="tiny-img ls-is-cached lazyloaded" src="https://content.instructables.com/static/image/file.default.gif" alt="download {{ file.name }}" data-src="https://content.instructables.com/static/image/file.default.gif" /></span><span class="title">DualWiFiMapper.ino</span></a>
<div class="file-actions"><a class="btn pull-right" href="https://content.instructables.com/FF6/7IC7/KWQEF30J/FF67IC7KWQEF30J.ino" download="DualWiFiMapper.ino">Download</a></div>
</li>
</ul>
</div>
</section>
<section id="step11" class="step" data-stepid="S5B0577KWNJLR6Z">
<h2 class="step-title">Step 11: Wardriving</h2>
<div class="mediaset">
<div class="photoset-wrapper">
<div class="photoset">
<div class="photoset-row items-1 ">
<div class="photoset-item photoset-cell" data-imagenotes="[]">
<div class="photoset-image"><a class="gallery-link" href="https://content.instructables.com/F6B/5QKW/KWQEF0KM/F6B5QKWKWQEF0KM.png?auto=webp&amp;frame=1&amp;width=1024&amp;fit=bounds&amp;md=MjAyMS0xMi0wMyAwOTozMDo0OC4w" rel="photoset97" data-download="https://content.instructables.com/F6B/5QKW/KWQEF0KM/F6B5QKWKWQEF0KM.png?auto=webp&amp;frame=1&amp;md=MjAyMS0xMi0wMyAwOTozMDo0OC4w" data-fileid="F6B5QKWKWQEF0KM"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18840" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/F6B5QKWKWQEF0KM.webp" alt="" width="931" height="700" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/F6B5QKWKWQEF0KM.webp 931w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/F6B5QKWKWQEF0KM-400x301.webp 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/F6B5QKWKWQEF0KM-768x577.webp 768w" sizes="(max-width: 931px) 100vw, 931px" /></a></div>
</div>
</div>
</div>
</div>
</div>
<div class="step-body">
<p>Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone (or an SoC). Software for wardriving is freely available on the internet.</p>
<p>The term Wardriving is derived from the original wardialing. Wardialing is a method popularized by the film WarGames and is, in fact, named after the film. Wardialing consists of dialing every phone number in a specific sequence in search of modems.</p>
<p>Wardrivers often use a Wi-Fi-equipped device together with a GPS device to record the location of wireless networks. The results can then be uploaded to websites like WiGLE, openBmap or Geomena where the data is processed to form maps of the network neighborhood. There are also clients available for smartphones running Android that can upload data directly. For better range and sensitivity, antennas are built or bought, and vary from omnidirectional to highly directional. <a href="https://www.instructables.com/HackerBox-0073-LAN-Lord/" target="_blank" rel="noopener">source</a></p>
</div>
</section>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Block Internet ads at home with Pi-hole</title>
		<link>https://goodshepherdmedia.net/block-internet-ads-at-home-with-pi-hole/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Fri, 04 Oct 2024 08:17:10 +0000</pubDate>
				<category><![CDATA[Computer Hacks]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[Digital Pioneers]]></category>
		<category><![CDATA[Gaming]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Hardware Pioneers]]></category>
		<category><![CDATA[Home & Garden]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Software Pioneers]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[Block Internet ads]]></category>
		<category><![CDATA[Block Internet ads at home]]></category>
		<category><![CDATA[Block Internet ads NO PLUGIN]]></category>
		<category><![CDATA[Block Internet ads with hardware]]></category>
		<category><![CDATA[Pi-hole]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18772</guid>

					<description><![CDATA[Enhance Your Network with Pi-hole: Ad Blocking and Privacy Solutions Internet advertisements have become very obtrusive and more apparent over the last several years. Users conducting research from various sources on the web are often met with a vexatious experience full of distractions. Children watching YouTube videos that have inappropriate advertisement content embedded in the [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="elementor-heading-title elementor-size-large"><b>Enhance Your Network with Pi-hole: Ad Blocking and Privacy Solutions</b></h1>
<p><iframe title="How to block internet ads and tracking in 2022 | installing Pi-hole on a Raspberry Pi" width="640" height="360" src="https://www.youtube.com/embed/G7jmu3E8ETg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Internet advertisements have become very obtrusive and more apparent over the last several years. Users conducting research from various sources on the web are often met with a vexatious experience full of distractions. Children watching YouTube videos that have inappropriate advertisement content embedded in the videos are also becoming a concern for many parents. Normally users will install ad-blocking software and extensions on their operating systems and web browsers. Most of the software installed for ad-blocking purposes ends up not being updated and extensions for web browsers often stop working when the web browser itself has been updated.</p>
<p>A more efficient solution is now available thanks to single board computing.  The Raspberry Pi being the most readily available single board computer. For a mere $16 anyone can have a multi-platform, network-wide ad blocker on their local network. This software plays very nice in both office and home networks. Pi-hole offers a wonderful dashboard with real time analytics if you’re someone who loves numbers.</p>
<p>Below is an example of a Raspberry Pi, with Pi-hole installed showing real time stats via an LCD installed on the Raspberry Pi:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-18774" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/PiHole-on-Rasp-Pi.jpg" alt="" width="529" height="397" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/PiHole-on-Rasp-Pi.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/PiHole-on-Rasp-Pi-400x300.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/PiHole-on-Rasp-Pi-768x576.jpg 768w" sizes="(max-width: 529px) 100vw, 529px" /></p>
<h3><span style="color: #3366ff;"><em><strong>So what is needed to get this project going?</strong></em></span></h3>
<ul>
<li><a href="https://www.amazon.com/CanaKit-Raspberry-Complete-Starter-Kit/dp/B01C6Q2GSY">Raspberry Pi Kit</a> – $16</li>
<li><a href="http://www.ebay.com/itm/Purple-1-2-40Ft-Cat5E-Giga-Lan-Network-Ethernet-CMX-Outdoor-FTP-Shielded-Cable-/232012317971?var=&amp;hash=item3605030513:m:mKaIJBJ0Q1D6TtuNxjiMhgg">Ethernet Cable</a> (Optional) – $6</li>
<li><a href="https://www.seeedstudio.com/blog/2019/01/29/12-popular-raspberry-pi-displays-and-touch-screens/">Screen for Raspberry Pi</a> (Optional) -$20</li>
</ul>
<p>After you have purchased these components it’s very simple to install Pi-hole.</p>
<p><iframe title="4 Reasons Why Pi-Hole Should Be Your Next Raspberry PI Project" width="640" height="360" src="https://www.youtube.com/embed/QOSSjsbDx-w?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>You can install an Operating System image on your Raspberry Pi. Step-by-step directions are provided and the entire process takes less than 10 minutes to complete.</p>
<p>Installing Pi-hole:</p>
<ol>
<li>Install Pi-hole on the Raspberry Pi. The program can be downloaded <a href="https://pi-hole.net/">here</a> or via the install “curl -sSL https://install.pi-hole.net | bash|”” command.</li>
<li>Configure your router DHCP settings to force clients in using your PI-hole as their DNS server. You can also manually configure each device but that takes much more time than blocking ads on the whole network at once. This step sounds more difficult than it actually is. The only thing that you have to change are some ports and DNS settings on your router. Most routers have this setting displaying on the main page and it can be changed within a matter of a few seconds. A straightforward guide is provided on <a href="https://discourse.pi-hole.net/t/how-do-i-configure-my-devices-to-use-pi-hole-as-their-dns-server/245">Pi-Holes official site</a>.</li>
<li>Completion! Your Pi-hole blocks all advertisements at a DNS level. This means your whole network is protected and any device connected will automatically block online commercials even inside Apps and programs. You have freed your laptop, iPhone, Nexus tablet and desktop PC from all online commercials! Enjoy faster loading times on all your favorite websites and apps.</li>
</ol>
<p>If you’d like to pull up Pi-holes nifty dashboard and see how many advertisements were blocked from your entire network you’ll see a clean interface exactly like the one below :</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18776" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/PiHole.png" alt="" width="772" height="397" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/PiHole.png 772w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/PiHole-400x206.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/PiHole-768x395.png 768w" sizes="(max-width: 772px) 100vw, 772px" />Fun Facts About Pi-hole :</p>
<p>– The code is completely open, and you are able to modify it in any way you’d like. (Yay for open-source!)<br />
– Pi-hole is very lightweight as it only handles DNS queries and returns a blank HTML file so it doesn’t need much processing power. (Yay for efficiency!)<br />
– Pi-hole will run on most Debian-based distros and is the preferred platform for it.(Yay for compatibility!) <a href="https://bluefletch.com/pi-hole-the-antimatter-of-advertisements/" target="_blank" rel="noopener">source</a></p>
<hr />
<h3><span style="color: #ff0000;"><strong><em>Block Internet ads at home with Pi-hole</em></strong></span></h3>
<h1>LETS DIVE DEEPER&#8230;.</h1>
<p><iframe title="How to Set Up a Pi-Hole System on a Raspberry Pi - Block Ads and More!" width="640" height="360" src="https://www.youtube.com/embed/roYduABVjo8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div id="preamble">
<div class="sectionbody">
<p>Internet advertising can often be a nuisance. It takes up valuable bandwidth. It weighs your browser down with trackers. It reports your data back to untrustworthy third parties.</p>
<p>On some devices, like laptops and phones, you can use ad blockers to protect yourself (and your sanity). But on many smart devices, like TVs, refrigerators, <a href="https://revcook.com/products/instaglo-r180-toaster">toasters</a>, and <a href="https://www.kohler.com/en/products/toilets/shop-toilets/numi-2-0-one-piece-elongated-smart-toilet-dual-flush-30754-pa">toilets</a>, you can’t install an ad blocker.</p>
<p>Pi-hole simplifies ad blocking by operating at the <em>network</em> level, instead of on individual devices. That way, you aren’t restricted by which devices can install an ad-blocker; instead, you can protect devices on your network from ever accessing ads in the first place.</p>
</div>
</div>
<div class="sect1">
<p><iframe title="World&#039;s Greatest Pi-hole Tutorial - Easy Raspberry Pi Project!" width="640" height="360" src="https://www.youtube.com/embed/cE21YjuaB6o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>How does Pi-hole work?</h2>
<h1><img loading="lazy" decoding="async" class=" wp-image-18775 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Pi-hole-2.jpg" alt="" width="578" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Pi-hole-2.jpg 686w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Pi-hole-2-400x225.jpg 400w" sizes="(max-width: 578px) 100vw, 578px" /></h1>
<div class="sectionbody">
<p>Pi-hole blocks ads by acting as a <a href="https://en.wikipedia.org/wiki/DNS_sinkhole">DNS sinkhole</a>.</p>
<p>To understand what a DNS sinkhole is, you need to understand what DNS is. Here are a few key terms:</p>
<div class="dlist"><em><span style="color: #ff0000;">IP address: </span><span style="color: #0000ff;">unique numeric address of a web resource (e.g. <code>104.22.23.160</code>)</span></em></div>
<div class="dlist">
<div class="dlist">
<p><em><span style="color: #ff0000;">DNS: </span><span style="color: #0000ff;">Domain Name System, associates domain names with IP addresses</span></em></p>
<div class="dlist">
<p><em><span style="color: #ff0000;">DNS server: </span><span style="color: #0000ff;">a server that translates domain names into IP addresses</span></em></p>
<div><em><span style="color: #ff0000;">Domain Name:</span> <span style="color: #3366ff;">unique alphanumeric address of a web resource (e.g. <code>raspberrypi.com</code>)</span></em></div>
<div><strong><strong><span style="color: #3366ff;"><br />
When you type <code>www.raspberrypi.com</code> into your browser, your computer asks a DNS server where to find that domain. The DNS server responds with an IP address (e.g. <code>104.22.23.160</code>). Then your computer queries that IP address for the resource you’re looking for.</span></strong></strong>We use domain names because IP addresses aren’t very human-readable; it’s a lot easier to read and write &#8220;raspberrypi.com&#8221; than four bytes&#8217; worth of numbers.Usually, your computer queries a DNS server hosted somewhere on the internet. It might be hosted by your internet provider, a website hosting company, or any company that runs a lot of servers. Your machine submits a domain, and the DNS server returns the IP address corresponding to that domain. The DNS server doesn’t care if the domain provides something you want (like the article you’re trying to read) or an ad. It just resolves domains into IP addresses.</p>
<p>Here’s where Pi-hole comes in. Pi-hole stands between your network and a DNS server. Consider a client device, like your smart toilet, performing a DNS lookup for a domain. The Pi-hole in your network acts like a DNS server; DNS lookups from all client devices, whether that’s your smart toilet or your phone, go to the Pi-hole.</p>
<p>But Pi-hole doesn’t store a perfect up-to-date mapping of all domain names to all IP addresses. Instead, Pi-hole queries a <em>real</em> DNS server outside of your network. However, before it queries that real DNS server, Pi-hole checks a blocklist. If the domain passes this filter, Pi-hole requests the IP address from the DNS server, and returns it to the client device on your network. If the domain doesn’t pass the filter — if it’s included on the blocklist — Pi-hole returns a non-routable address such as <code>0.0.0.0</code>.</p>
<p>The following diagram shows a lookup via a Pi-hole for the <em>unblocked</em> domain <code>raspberrypi.com</code>:</p>
<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone wp-image-18777" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns_success-1024x209-1.png" alt="" width="784" height="160" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns_success-1024x209-1.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns_success-1024x209-1-400x82.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns_success-1024x209-1-768x157.png 768w" sizes="(max-width: 784px) 100vw, 784px" /></figure>
</div>
<p>The following diagram shows a lookup via a Pi-hole for the <em>blocked</em> domain <code>raspberryads.com</code>:</p>
<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone wp-image-18778" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns_blocked-1024x209-1.png" alt="" width="784" height="160" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns_blocked-1024x209-1.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns_blocked-1024x209-1-400x82.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns_blocked-1024x209-1-768x157.png 768w" sizes="(max-width: 784px) 100vw, 784px" /></figure>
</div>
<p>TL;DR: Pi-hole blocks requests made to ad domains from your network, before the requests ever leave your network. Your client devices <strong>can’t</strong> connect to domains that host ads, but <strong>can</strong> connect to domains that host useful content.</p>
</div>
</div>
<div class="sect1">
<h2 id="overview">Overview</h2>
<div class="sectionbody">
<p>To install a Pi-hole in your network, you’ll need to do the following things:</p>
<div class="olist arabic">
<ol class="arabic">
<li>Configure a Raspberry Pi running Raspberry Pi OS.</li>
<li>Set up <a href="https://github.com/pi-hole/pi-hole">Pi-hole</a> software on your Raspberry Pi.</li>
<li>Direct DNS queries on your network to your Raspberry Pi.</li>
</ol>
</div>
</div>
</div>
<div class="sect1">
<h2 id="supplies">Supplies</h2>
<div class="sectionbody">
<div class="ulist">
<ul>
<li>Raspberry Pi</li>
<li>suitable power supply (see <a href="https://www.raspberrypi.com/documentation/computers/getting-started.html#power-supply">the documentation for details</a>)</li>
<li>microSD card (see <a href="https://www.raspberrypi.com/documentation/computers/getting-started.html#sd-cards">the documentation for details</a>)</li>
<li>adapter to connect your microSD card with <em>your usual computer</em></li>
<li>USB cable (check your 3D printer for details)</li>
</ul>
</div>
<p>For the initial SD card setup, you will need:</p>
<div class="ulist">
<ul>
<li>Another computer connected to your network. We’ll refer to this as <em>your usual computer</em> to distinguish it from the Raspberry Pi computer you are setting up.</li>
</ul>
</div>
<div class="sect2">
<h3 id="choose-a-raspberry-pi">Choose a Raspberry Pi</h3>
<p>You can use any Raspberry Pi model for this. We recommend <a href="https://www.raspberrypi.com/products/raspberry-pi-zero-2-w/">Zero 2 W</a> if you can’t decide which model to use.</p>
</div>
</div>
</div>
<div class="sect1">
<h2 id="configure-your-raspberry-pi">Configure your Raspberry Pi</h2>
<div class="sectionbody">
<p>To begin, <a href="https://www.raspberrypi.com/documentation/computers/getting-started.html#installing-the-operating-system">follow the Getting Started documentation to set up your Raspberry Pi</a>. For your operating system, choose <strong>Raspberry Pi OS Lite (32-bit)</strong> to run headless (without a mouse and keyboard).</p>
<p>During the OS customisation stage, edit settings as follows:</p>
<div class="ulist">
<ul>
<li>Enter a <strong>hostname</strong> of your choice (we suggest <code>pi-hole</code> for this tutorial)</li>
<li>Enter a <strong>username</strong> and <strong>password</strong>; you’ll need these later to authenticate</li>
<li>Check the box next to <strong>Configure wireless LAN</strong> so your Pi can automatically connect to Wi-Fi</li>
<li>Enter your network <strong>SSID</strong> (name) and <strong>password</strong>; you can find these in your Wi-Fi settings or on a sticker on your router</li>
<li>Check the box next to <strong>Enable SSH</strong> so we can connect to the Pi without a mouse and keyboard</li>
</ul>
</div>
</div>
</div>
<div class="sect1">
<h2 id="connect-via-ssh">Connect via SSH</h2>
<div class="sectionbody">
<p>Open a terminal on your computer. If you use a Windows computer, you may need to install a terminal; we suggest <a href="https://putty.org/">PuTTY</a>. Enter the following command to connect to your Raspberry Pi, replacing the <code>&lt;username&gt;</code> placeholder with your own username that you chose in Imager:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash"><span class="token function">ssh</span> <span class="token operator">&lt;</span>username<span class="token operator">&gt;</span>@pi-hole.local</span></span></code></pre>
</div>
</div>
<p>If <code>ssh</code> asks you if you’re sure you want to continue connecting, reply <code>yes</code>. Enter the password you chose during advanced configuration when prompted.</p>
<p>You’ll know you’ve connected successfully when you see the following prompt with your configured username and hostname:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token output">&lt;username&gt;@&lt;hostname&gt;:~ $</span></code></pre>
</div>
</div>
<p>Now that you’ve connected to your Raspberry Pi, run two commands to make sure that all of your packages are up to date:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash"><span class="token function">sudo</span> <span class="token function">apt</span> update</span></span>
<span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash"><span class="token function">sudo</span> <span class="token function">apt</span> full-upgrade</span></span></code></pre>
</div>
</div>
<p>Once the package update commands finish running, reboot your Raspberry Pi to allow all changes to take effect:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash"><span class="token function">sudo</span> <span class="token function">reboot</span></span></span></code></pre>
</div>
</div>
<p>Running this command will disconnect you from the Raspberry Pi SSH session. Wait a few seconds for your Raspberry Pi to reboot, and enter the <code>ssh</code> connection command again to reconnect to your device.</p>
<div class="admonitionblock tip" role="note">
<h5 class="label">tip</h5>
<div class="inner">On most terminals, press the <strong>Up</strong> arrow key, then the <strong>Enter</strong> key to re-run the most recent command.</div>
</div>
</div>
</div>
<div class="sect1">
<h2 id="install-pi-hole">Install Pi-hole</h2>
<div class="sectionbody">
<p>Run the following single-line command to run the Pi-hole setup script:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash"><span class="token function">curl</span> -sSL https://install.pi-hole.net <span class="token operator">|</span> <span class="token function">bash</span></span></span></code></pre>
</div>
</div>
<p>The setup script is relatively self-explanatory, but follow these tips if you aren’t sure how to proceed:</p>
<div class="ulist">
<ul>
<li>When warned about needing a static IP address, click <strong>Continue</strong> to proceed; we’ll deal with this later</li>
<li>When prompted to select an interface, select <code>wlan0</code> to use your Raspberry Pi’s Wi-Fi connection</li>
<li>When prompted to choose an upstream DNS provider, choose <strong>OpenDNS</strong></li>
<li>Include <strong>StevenBlack’s Unified Hosts List</strong></li>
<li>Install the Admin Web Interface</li>
<li>Install <code>lighttpd</code> and the required PHP modules to run the Admin Web Interface</li>
<li>Enable query logging</li>
<li>When prompted to choose a privacy level, choose <strong>Anonymous mode</strong></li>
</ul>
</div>
<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone wp-image-18779" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2023-10-04-at-15.39.45-1024x630-1.png" alt="" width="692" height="426" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2023-10-04-at-15.39.45-1024x630-1.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2023-10-04-at-15.39.45-1024x630-1-400x246.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2023-10-04-at-15.39.45-1024x630-1-768x473.png 768w" sizes="(max-width: 692px) 100vw, 692px" /></figure>
</div>
<p>When you see &#8220;Installation complete!&#8221;, the setup is complete. This screen shows the IP address of your Pi-hole, a link to the admin interface, and your administrator password.</p>
<div class="ulist">
<ul>
<li>Save this password somewhere safe, like a password manager — you’ll need it to work with your Pi-hole in the future</li>
<li>Save the IP address — you’ll need it to configure a static IP address shortly</li>
</ul>
</div>
<p>Pi-hole only provides a single administrator account, so there’s no username. Press the <strong>Control</strong> key (<strong>Command</strong> on macOS) and click the link to the admin interface that uses an IP address. It’ll look something like <code>http://192.168.1.24/admin</code>. Don’t use the <code>pi.hole</code> domain link yet; until we configure the Pi-hole as our DNS provider, it won’t work. The link should open in your browser. You can also copy and paste the link into a browser if control + click doesn’t work in your terminal. Use the admin password from the setup script output to authenticate. You can now see your Pi-hole admin console! We recommend bookmarking this console for future maintenance.</p>
</div>
</div>
<div class="sect1">
<h2 id="configure-your-network-to-use-your-pi-hole">Configure your network to use your Pi-hole</h2>
<div class="sectionbody">
<div class="admonitionblock warning" role="note">
<h5 class="label">warning</h5>
<div class="inner">
<p>The tasks below require you to change global settings in your wireless network. You might break your internet connection (for a little while). Proceed with caution!</p>
</div>
</div>
<p>To complete these tasks, visit the admin interface for your router. You can usually access the admin interface through your router’s IP address. Here are a couple of common ways to find that interface:</p>
<div class="ulist">
<ul>
<li>Run the following command on your Raspberry Pi to output your router’s IP address:
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash">nmcli -f IP4.GATEWAY device show wlan0</span></span></code></pre>
</div>
</div>
</li>
<li>Check for a sticker on your router — look for a value called &#8220;admin URL&#8221; or similar</li>
</ul>
</div>
<p>Once you’ve found the IP address, log in to your router’s admin interface by typing the address (sometimes with the suffix <code>/admin</code>) into your browser. Enter your username and password (if you don’t know these, you may be able to find them on a sticker on your router). Now that you’ve got your Pi-hole configured, you have three choices to use it to block ads. All of them involve getting Pi-hole between your network and the internet:</p>
<div class="ulist">
<ul>
<li>configure Pi-hole as the DNS server for your network</li>
<li>configure Pi-hole as the DHCP provider for your network</li>
<li>manually point devices at Pi-hole for DNS</li>
</ul>
</div>
<p>It’s easiest to use your Pi-hole as a DNS server. However, some routers don’t provide a setting to control the default DNS server. If you can’t set a DNS server, try configuring Pi-hole as your DHCP provider. And if you can’t do that either, you can always manually point devices at the Pi-hole for DNS — it’s not as good as full-network ad blocking, but it’s a lot better than nothing.</p>
</div>
</div>
<div class="sect1">
<h2 id="configure-pi-hole-as-your-networks-dns-server">Configure Pi-hole as your network’s DNS server</h2>
<div class="sectionbody">
<p>This is the most common way of configuring a Pi-hole. For this method, you’ll first assign your Raspberry Pi a static IP address from your router’s interface, then point your router’s DNS server settings to the Pi-hole’s static IP address. With this setup, your router controls IP reservations across your network, but devices on the network send DNS queries to your Pi-hole instead of to a DNS server on the internet.</p>
<div class="sect2">
<h3 id="assign-your-raspberry-pi-a-static-ip-address">Assign your Raspberry Pi a static IP address</h3>
<p>IP addresses are unique numeric codes that allow you to directly interact with devices on your network. For instance, many routers automatically assign themselves the first address in the IP block they are using, such as <code>192.168.1.1</code>. Most networks use Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to devices automatically. These IP addresses are known as <strong>dynamic</strong> IP addresses, because they can change at any time.</p>
<p>To run a Pi-hole on your network, we recommend assigning your Pi-hole a <strong>static</strong> IP address. A static IP address never changes. This allows devices on your network always to find the Pi-hole at the same address.</p>
<p>To start, run the following command on your Raspberry Pi:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash"><span class="token function">hostname</span> -I</span></span></code></pre>
</div>
</div>
<p>You should see output similar to the following:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash"><span class="token number">192.168</span>.1.24</span></span></code></pre>
</div>
</div>
<p>This value is the current (dynamic) IP address of your Raspberry Pi on the network.</p>
<p>To assign a static IP address, you also need the MAC address of your Raspberry Pi. A device’s MAC address is a hardware identifier that your router uses to uniquely identify it. Run the following command to find the MAC address of your Raspberry Pi:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token command"><span class="token shell-symbol important">$</span> <span class="token bash language-bash">nmcli -f GENERAL.HWADDR device show wlan0</span></span></code></pre>
</div>
</div>
<p>You should see output similar to the following:</p>
<div class="listingblock">
<div class="content">
<pre class="highlight language-shell-session" tabindex="0"><code class="language-shell-session" data-lang="shell-session"><span class="token output">GENERAL.HWADDR:                         A8:42:EA:58:E0:1C</span></code></pre>
</div>
</div>
<p>The value on the right is the MAC address of your Raspberry Pi. Now that we know your Raspberry Pi’s MAC address and IP address, we can configure your router so it always associates the Raspberry Pi’s MAC address with its current IP address. Effectively, we’re turning the current dynamic address into a static one using the MAC address. In your router’s admin interface, configure a static IP address for your Raspberry Pi. There are several ways to accomplish this, depending on your router:</p>
<div class="ulist">
<ul>
<li>You might be able to find this setting in the &#8220;Advanced&#8221; section of the router admin interface. Look for a list called &#8220;DHCP Reservations&#8221;, and enter your Raspberry Pi’s IP address and MAC address.</li>
<li>Look for a list of connected devices and find your Raspberry Pi’s IP address or MAC address. Select the option to &#8220;Always use this IP address&#8221; to make the IP address reservation static.</li>
<li>Check the documentation for your router model for specific instructions.</li>
</ul>
</div>
</div>
<div class="sect2">
<h3 id="set-pi-hole-as-your-networks-default-dns-server">Set Pi-hole as your network’s default DNS server</h3>
<p>Once you’ve assigned your Raspberry Pi a static IP address, you can configure individual devices to use Pi-hole as a DNS server in their network settings. But this process is tedious, and some devices don’t provide an easily accessible DNS server setting. However, there is an easier way: most routers automatically suggest a DNS server for devices connected to your network. All you have to do is change the suggested server in your router’s settings, and your entire network should start using your Pi-hole for DNS.</p>
<p>Look for a setting called DNS in your router’s admin interface. You may be able to find the setting in a section called &#8220;Internet&#8221;, &#8220;DHCP&#8221;, &#8220;Internet Connection&#8221;, or &#8220;DDNS&#8221;.</p>
<p>Enter your Pi-hole’s IP address in the DNS (or similarly named) field.</p>
<p>If your router provides multiple custom DNS fields, add your Pi-hole address in each field.</p>
<div class="admonitionblock important" role="note">
<h5 class="label">important</h5>
<div class="inner">
<p>Whatever you do, don’t add any separate DNS entries after the Pi-hole entries — this can break Pi-hole’s ad blocking functionality. When your Pi-hole blocks a domain, it returns a non-routable address such as <code>0.0.0.0</code>, and some devices will query the secondary DNS server when the first server returns such a non-routable address. If your secondary DNS server isn’t a Pi-hole, every single request blocked by Pi-hole will succeed on the secondary server, and ads will load as if you weren’t running an ad blocker at all.</p>
</div>
</div>
</div>
</div>
</div>
<div class="sect1">
<h2 id="configure-pi-hole-as-your-networks-dhcp-provider">Configure Pi-hole as your network’s DHCP provider</h2>
<div class="sectionbody">
<p>If your router doesn’t support configuration for static IP addresses or DNS servers, you may still be able to use your Pi-hole automatically across your network. First, check whether you can change the network DHCP server in your router settings. If you can, you can use your Pi-hole <em>both</em> as a DNS server <em>and</em> as the DHCP server that handles IP address reservations across your network.</p>
<p>First, navigate to the Pi-hole admin console. If you type your Raspberry Pi’s IP address into your browser, it should redirect you there.</p>
<p>In the left side menu, select the &#8220;Settings&#8221; page.</p>
<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" class="alignnone wp-image-18780" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2022-06-15-at-16.39.42.png" alt="" width="970" height="606" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2022-06-15-at-16.39.42.png 2880w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2022-06-15-at-16.39.42-400x250.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2022-06-15-at-16.39.42-1024x640.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2022-06-15-at-16.39.42-768x480.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2022-06-15-at-16.39.42-1536x960.png 1536w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2022-06-15-at-16.39.42-2048x1280.png 2048w" sizes="(max-width: 970px) 100vw, 970px" /></figure>
</div>
<p>In the DHCP tab, in the &#8220;DHCP Settings&#8221; block, check the &#8220;DHCP server enabled&#8221; box.</p>
<p>Pi-hole should pre-populate the IP address range with the IP block that your router currently uses, and the router IP address with the router’s current IP address. You can leave these values as they are. Click the <strong>Save</strong> button in the bottom left to start hosting a DHCP server from Pi-hole.</p>
<p>Finally, visit your router’s admin interface, and set your Pi-hole’s IP address as the DHCP provider for your network. When your Pi-hole is functioning as the DHCP provider, your router delegates all IP-related tasks to it. This includes DNS server configuration, so your Pi-hole can suggest <em>itself</em> as the default DNS server for all devices on your network. Check the documentation for your router model for specific instructions.</p>
</div>
</div>
<div class="sect1">
<h2 id="manually-point-devices-at-pi-hole-for-dns">Manually point devices at Pi-hole for DNS</h2>
<div class="sectionbody">
<p>On many devices, you can configure DNS settings in Wi-Fi preferences. Look in the &#8220;Advanced&#8221; section of your Wi-Fi or wired connection preferences for a DNS server setting. Put your Raspberry Pi’s IP address in this field. Your device should immediately start issuing DNS queries to the Pi-hole.</p>
<p>Unless you’ve configured a static IP address for your Raspberry Pi, this IP address can change at any time without warning. Follow the instructions under &#8220;Assign your Raspberry Pi a static IP address&#8221; in the DNS section above to configure a static IP address — this will prevent your device from losing its connection to the Pi-hole (and most of the internet!) when your Pi-hole’s dynamic IP address changes.</p>
</div>
</div>
<div class="sect1">
<h2 id="is-my-pi-hole-working">Is my Pi-hole working?</h2>
<div class="sectionbody">
<p>With a Pi-hole acting as the DNS server for your network, many pages will load without ads at all. Most privacy-invading trackers won’t work either. You’ll still see cookie and app install banners, because those can’t be blocked at the DNS level. To check to see if your Pi-hole is working correctly:</p>
<div class="ulist">
<ul>
<li>Check out <a href="https://adblock-tester.com/">Adblock Tester</a>. Without Pi-hole, many browsers score near 0; with Pi-hole, you should see a score at or near 100.</li>
<li>Try visiting <a href="http://pi.hole/admin/login.php">http://pi.hole/admin/login.php</a>. Pi-hole always routes the <code>pi.hole</code> domain to your Raspberry Pi when you use Pi-hole as your DNS server.</li>
<li>Visit any site where you normally see ads and visually confirm that ads are no longer there.</li>
<li>Check the proportion of &#8220;queries blocked&#8221; on the Pi-hole dashboard. Many networks see between 10% and 50% of queries blocked!</li>
<li>Check the DNS server used by other computers in your network. You should be able to find this information in &#8220;Details&#8221; or &#8220;Advanced&#8221; Wi-Fi settings. If you see your Raspberry Pi’s IP address, your configuration worked!</li>
</ul>
</div>
<p>If you’ve completed all of the setup steps but you’re still seeing ads (or, worse, DNS queries don’t resolve), try the trusty solution of turning your router off and on again. This should disconnect all devices from your network and renew all DHCP leases, putting your new settings into effect for every device. Congratulations! Your home network is now protected from ads. Put a slice of bread in your smart toaster, watch a movie on your smart TV, and flush your smart toilet in the comfort of privacy and security. <a href="https://www.raspberrypi.com/tutorials/running-pi-hole-on-a-raspberry-pi/" target="_blank" rel="noopener">source</a></p>
</div>
</div>
<p>&nbsp;</p>
<h2 class="">1. Install a supported operating system</h2>
<p class="large_text">You can run Pi-hole in a container, or deploy it directly to a supported operating system via our automated installer.</p>
<div id="supported-os" class="content-right-image-section content-image-right content-relative dark-text-section" data-label="Supported OS" data-id="content-image-right" data-category="content" data-ovid="ovid-content-4-2908" data-darkreader-inline-bgimage="" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="content-right-image-gridcol">
<div class="content-right-image-textcol dynamic-color" data-type="column">
<p class=""><a class="button color1" href="https://github.com/pi-hole/docker-pi-hole/#running-pi-hole-docker" target="_blank" rel="noopener noreferrer" data-icon="">Docker install</a></p>
<p class=""><a class="button color1" href="https://docs.pi-hole.net/main/prerequisites/#supported-operating-systems" target="_blank" rel="noopener noreferrer" data-icon="">Supported operating systems</a></p>
</div>
<div class="content-right-image-imgcol" data-type="column"><picture class="" data-lazy-loaded="1"></picture><img loading="lazy" decoding="async" class="alignnone wp-image-18781" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/supported-os-min.jpg" alt="" width="320" height="213" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/supported-os-min.jpg 600w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/supported-os-min-400x267.jpg 400w" sizes="(max-width: 320px) 100vw, 320px" /></div>
</div>
</div>
</div>
<div id="how-to-install" class="content-right-image-section content-image-right-undefined" data-label="How to install" data-id="content-image-right-undefined" data-category="content" data-ovid="ovid-how-to-install-2-2513" data-darkreader-inline-bgcolor="" data-darkreader-inline-bgimage="">
<div class="gridContainer">
<div class="content-right-image-gridcol">
<div class="content-right-image-textcol dynamic-color" data-type="column">
<h2 class="">2. Install Pi-hole</h2>
<p class="large_text">Our intelligent, automated installer asks you a few questions and then sets everything up for you.  Once complete, move onto step 3.</p>
<p class=""><a class="button color1" href="https://github.com/pi-hole/pi-hole/#one-step-automated-install" target="_blank" rel="noopener noreferrer" data-icon="">Install Pi-hole</a></p>
</div>
</div>
</div>
</div>
<div id="configure" class="content-right-image-section content-image-right-2" data-label="Configure" data-id="content-image-right-2" data-category="content" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="content-right-image-gridcol">
<div class="content-right-image-textcol dynamic-color" data-type="column">
<h2 class="">3. Use Pi-hole as your DNS server</h2>
<p class="large_text">Configure your router’s DHCP options to force clients to use Pi-hole as their DNS server, or manually configure each device​ to use the Pi-hole as their DNS server.</p>
<p class=""><a class="button color1" href="https://docs.pi-hole.net/main/post-install" target="_blank" rel="noopener noreferrer" data-icon="">Use Pi-hole as your DNS server</a></p>
</div>
<div class="content-right-image-imgcol" data-type="column"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18782" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns-router.png" alt="" width="571" height="227" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns-router.png 571w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/dns-router-400x159.png 400w" sizes="(max-width: 571px) 100vw, 571px" /></div>
</div>
</div>
</div>
<div id="done" class="content-right-image-section content-image-right-3" data-label="Done" data-id="content-image-right-3" data-category="content" data-ovid="ovid-how-to-install-4-1818" data-darkreader-inline-bgcolor="" data-darkreader-inline-bgimage="">
<div class="gridContainer">
<div class="content-right-image-gridcol">
<div class="content-right-image-textcol dynamic-color" data-type="column">
<h2 class="">4. Block ads everywhere, even on the go</h2>
<p class="large_text">By pairing your Pi-hole with a VPN, you can have ad blocking on your cellular devices, helping with limited bandwidth data plans.</p>
<p class=""><a class="button color1" href="https://docs.pi-hole.net/guides/vpn/overview" target="_blank" rel="noopener noreferrer" data-icon="">Pi-hole + VPN</a></p>
</div>
<div class="content-right-image-imgcol" data-type="column"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18783" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/vpn-300x300-1.jpg" alt="" width="300" height="300" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/vpn-300x300-1.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/vpn-300x300-1-150x150.jpg 150w" sizes="(max-width: 300px) 100vw, 300px" /></div>
</div>
</div>
</div>
<div id="why-use-pihole" class="features-coloured-icon-boxes-section stripped-coloured-icon-boxes content-relative" data-label="Why Use Pihole" data-id="stripped-coloured-icon-boxes" data-category="overlapable" data-overlap="true" data-ovid="ovid-overlapable-2-184" data-darkreader-inline-bgimage="" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="features-coloured-icon-boxes-innerrow flexbox-list dark-text" data-type="row">
<div class="features-coloured-icon-boxes-featurecol cp3cols color6">
<div class="features-coloured-icon-boxes-iconcontainer" data-content-item-container="true"></div>
<h4 class="">Network-wide protection</h4>
<p class="">Instead of browser plugins or other software on each computer, <b>install Pi-hole in one place</b> and your entire network is protected.</p>
</div>
<div class="features-coloured-icon-boxes-featurecol cp3cols">
<div class="features-coloured-icon-boxes-iconcontainer" data-content-item-container="true"></div>
<h4 class="">Block in-app advertisements</h4>
<p class="">Network-level blocking allows you to <b>block ads in non-traditional places</b> such as mobile apps and smart TVs, regardless of hardware or OS.</p>
</div>
<div class="features-coloured-icon-boxes-featurecol cp3cols">
<div class="features-coloured-icon-boxes-iconcontainer" data-content-item-container="true"></div>
<h4 class="">Improve network performance</h4>
<p class="">Since <b>advertisements are blocked <i>before</i> they are downloaded</b>, network performance is improved and will feel faster.</p>
</div>
<div class="features-coloured-icon-boxes-featurecol cp3cols">
<div class="features-coloured-icon-boxes-iconcontainer" data-content-item-container="true"></div>
<h4 class="">Monitor statistics</h4>
<p class="">Our Web interface offers control of your Pi-hole and a central place to view statistics.  We also include an API for extending these stats.</p>
</div>
</div>
</div>
</div>
<div id="team-1" class="team-small-section" data-label="Team" data-id="team-small-section" data-category="team" data-ovid="ovid-team-1-1463">
<div class="gridContainer dynamic-color">
<div class="team-small-textcol" data-type="column">
<div id="web-interface" class="about-image-section-pro" data-label="Web interface" data-id="about-image-section-pro" data-category="about" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="row about-image-gridcol-pro">
<div class="about-image-textcol-pro" data-type="column">
<h2 class="">Web Interface</h2>
<p class="">In addition to blocking advertisements, Pi-hole has an informative Web interface that shows stats on all the domains being queried on your network.</p>
</div>
<div class="" data-type="column"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18784" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Dashboard.png" alt="" width="1851" height="790" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Dashboard.png 1851w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Dashboard-400x171.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Dashboard-1024x437.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Dashboard-768x328.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Dashboard-1536x656.png 1536w" sizes="(max-width: 1851px) 100vw, 1851px" /></div>
</div>
</div>
</div>
<div id="dhcp-server" class="about-image-section-pro about-image-section-pro-5" data-label="DHCP Server" data-id="about-image-section-pro-5" data-category="about" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="row about-image-gridcol-pro">
<div class="about-image-textcol-pro" data-type="column">
<h2 class="">Built-in DHCP Server</h2>
<p class="">Pi-hole works fine with an existing DHCP server, but you can use Pi-hole’s to keep your network management in one place.</p>
</div>
<div class="" data-type="column"><picture class=""></picture><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18785" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.39.58.png" alt="" width="1192" height="934" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.39.58.png 1192w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.39.58-400x313.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.39.58-1024x802.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.39.58-768x602.png 768w" sizes="(max-width: 1192px) 100vw, 1192px" /></div>
</div>
</div>
</div>
<div id="whitelist-and-blacklist" class="about-image-section-pro about-image-section-pro-undefined" data-label="Whitelist and Blacklist" data-id="about-image-section-pro-undefined" data-category="about" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="row about-image-gridcol-pro">
<div class="about-image-textcol-pro" data-type="column">
<h2 class="">Manage White And Black Lists</h2>
<p class="">Fine-tune your experience by blacklisting or whitelisting domains.  Extend this capability with <a class="" href="https://docs.pi-hole.net/regex/overview">powerful regex statements</a>.</p>
</div>
<div class="" data-type="column"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18787" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-22-11.17.24.png" alt="" width="648" height="609" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-22-11.17.24.png 648w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-22-11.17.24-400x376.png 400w" sizes="(max-width: 648px) 100vw, 648px" /></div>
</div>
</div>
</div>
<div id="query-log" class="about-image-section-pro about-image-section-pro-1" data-label="Query Log" data-id="about-image-section-pro-1" data-category="about" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="row about-image-gridcol-pro">
<div class="about-image-textcol-pro" data-type="column">
<h2 class="">Query Log</h2>
<p class="">See all the domains being queried on your network, where they originated, and more.</p>
</div>
<div class="" data-type="column"><picture class=""></picture><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18788" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.50.40.png" alt="" width="1249" height="896" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.50.40.png 1249w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.50.40-400x287.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.50.40-1024x735.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-19-17.50.40-768x551.png 768w" sizes="(max-width: 1249px) 100vw, 1249px" /></div>
</div>
</div>
</div>
<div id="statistics" class="about-image-section-pro about-image-section-pro-4" data-label="Statistics" data-id="about-image-section-pro-4" data-category="about" data-ovid="ovid-about-us-4-1823" data-darkreader-inline-bgcolor="" data-darkreader-inline-bgimage="">
<div class="gridContainer">
<div class="row about-image-gridcol-pro">
<div class="about-image-textcol-pro" data-type="column">
<h2 class="">Long Term Statistics</h2>
<p class="">Queries are stored in a database and can be queried at any time.  Learn about what’s happening on your network over time.</p>
</div>
<div class="" data-type="column"><picture class="about-image-img-pro aligncenter"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18789" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/long-term-stats1-e1597224606922.png" alt="" width="929" height="469" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/long-term-stats1-e1597224606922.png 929w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/long-term-stats1-e1597224606922-400x202.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/long-term-stats1-e1597224606922-768x388.png 768w" sizes="(max-width: 929px) 100vw, 929px" /></picture></div>
</div>
</div>
</div>
<div id="audit-log" class="about-image-section-pro about-image-section-pro-3" data-label="Audit Log" data-id="about-image-section-pro-3" data-category="about" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="row about-image-gridcol-pro">
<div class="about-image-textcol-pro" data-type="column">
<h2 class="">Audit Log</h2>
<p class="">Keep track of the most queried domains and add them to a white or blacklist from a central page.</p>
</div>
<div class="" data-type="column"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18790" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/audit-log1.png" alt="" width="2032" height="1510" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/audit-log1.png 2032w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/audit-log1-400x297.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/audit-log1-1024x761.png 1024w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/audit-log1-768x571.png 768w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/audit-log1-1536x1141.png 1536w" sizes="(max-width: 2032px) 100vw, 2032px" /></div>
</div>
</div>
</div>
<div id="privacy-modes" class="about-image-section-pro about-image-section-pro-6" data-label="Privacy Modes" data-id="about-image-section-pro-6" data-category="about" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="row about-image-gridcol-pro">
<div class="about-image-textcol-pro" data-type="column">
<h2 class="">Privacy Modes</h2>
<p class="">Choose from four different privacy modes that works for your environment.</p>
</div>
<div class="" data-type="column"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18791" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-20-12.30.34.png" alt="" width="993" height="495" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-20-12.30.34.png 993w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-20-12.30.34-400x199.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-20-12.30.34-768x383.png 768w" sizes="(max-width: 993px) 100vw, 993px" /></div>
</div>
</div>
</div>
<div id="other-settings" class="about-image-section-pro about-image-section-pro-7" data-label="Other Settings" data-id="about-image-section-pro-7" data-category="about" data-darkreader-inline-bgcolor="">
<div class="gridContainer">
<div class="row about-image-gridcol-pro">
<div class="about-image-textcol-pro" data-type="column">
<h2 class="">Other Settings</h2>
<p class="">Control and configure other settings from the Web interface.</p>
</div>
<div class="" data-type="column"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-18792" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-20-12.26.29.png" alt="" width="1001" height="849" srcset="https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-20-12.26.29.png 1001w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-20-12.26.29-400x339.png 400w, https://goodshepherdmedia.net/wp-content/uploads/2024/10/Screenshot-2018-12-20-12.26.29-768x651.png 768w" sizes="(max-width: 1001px) 100vw, 1001px" /></div>
</div>
</div>
</div>
</div>
</div>
</div>
<p><a href="https://pi-hole.net/" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p><iframe title="Block Ads using a Raspberry Pi with Pi-Hole" width="640" height="360" src="https://www.youtube.com/embed/_rZhCLh3WyY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><iframe title="Quick and Easy Pi-hole Setup" width="640" height="360" src="https://www.youtube.com/embed/4X6KYN1cQ1Y?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><iframe title="How to Set up a Network wide Ad-blocker with Pi hole" width="640" height="360" src="https://www.youtube.com/embed/zpJoNNVYM10?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><iframe title="how to build own network-wide ad blocker using pi-hole &amp; raspberry pi [Hindi]" width="640" height="360" src="https://www.youtube.com/embed/mmlVtYIv38U?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><iframe title="Raspberry Pi / Pi-hole / Diet-Pi / Network wide Ad Blocker !!!!" width="640" height="360" src="https://www.youtube.com/embed/RO2_eZlVrj4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is a pwnagotchi? The AI WiFi DeAuther Tool That Lives of a WiFi</title>
		<link>https://goodshepherdmedia.net/what-is-a-pwnagotchi-the-ai-wifi-deauther-tool-that-lives-of-a-wifi/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Wed, 02 Oct 2024 07:29:11 +0000</pubDate>
				<category><![CDATA[Classical]]></category>
		<category><![CDATA[Claude (Anthropic)]]></category>
		<category><![CDATA[Cloning / Propagation]]></category>
		<category><![CDATA[Community Hero's]]></category>
		<category><![CDATA[Cool Tech & Gadgets 📱⌚🎧⚡]]></category>
		<category><![CDATA[GGPD - Garden Grove PD]]></category>
		<category><![CDATA[Hackers / Master Programmers]]></category>
		<category><![CDATA[Home Computing]]></category>
		<category><![CDATA[Home Defense / Safety]]></category>
		<category><![CDATA[Science & Engineering]]></category>
		<category><![CDATA[Sigma Male]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Tools Questions]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Wood Working]]></category>
		<category><![CDATA[🌞On This Day!🌞]]></category>
		<category><![CDATA[🔐Hacking Technology]]></category>
		<category><![CDATA[🔒 Evidence Locker🏦]]></category>
		<category><![CDATA[🙂Fun Facts🙂]]></category>
		<category><![CDATA[🛜🌐💻⌨ Pen Test Tools]]></category>
		<category><![CDATA[🛜🌐💻⌨ Wireless Pen Test]]></category>
		<category><![CDATA[🛠️Fix Stuff🛠️]]></category>
		<category><![CDATA[pwnagotchi]]></category>
		<category><![CDATA[Tool That Lives of a WiFi]]></category>
		<category><![CDATA[WiFi DeAuther]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=18765</guid>

					<description><![CDATA[What is a pwnagotchi? The AI WiFi DeAuther Tool That Lives of a WiFi Pwnagotchi was created by , a hacker, maker, security researcher, AI and physics nerd that we all love and appreciate. It&#8217;s a super cute lil&#8217; buddy which eats wifi connections and lives on a small computer which can fit in your [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1><em><strong>What is a pwnagotchi? </strong></em></h1>
<h2><span style="color: #0000ff;"><em><strong>The AI WiFi DeAuther Tool That Lives of a WiFi</strong></em></span></h2>
<p><iframe title="Hacker Builds a Wifi Cracker by Himself &#x1f92f; #hack #hacking #podcast" width="640" height="360" src="https://www.youtube.com/embed/LEbFuekxLaE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Pwnagotchi was created by , a hacker, maker, security researcher, AI and physics nerd that we all love and appreciate.</p>
<p>It&#8217;s a super cute lil&#8217; buddy which eats wifi connections and lives on a small computer which can fit in your pocket.</p>
<p><a class="relative pointer-events-auto a cursor-pointer underline " href="https://twitter.com/pwnagotchi" target="_blank" rel="noopener nofollow ugc">Pwnagotchi</a> is an &#8220;AI&#8221; that learns from the WiFi environment and instruments bettercap in order to maximize the WPA key material (any form of handshake that is crackable, including <a class="relative pointer-events-auto a cursor-pointer underline " href="https://www.evilsocket.net/2019/02/13/Pwning-WiFi-networks-with-bettercap-and-the-PMKID-client-less-attack/" target="_blank" rel="noopener nofollow ugc">PMKIDs</a>, full and half WPA handshakes) captured.</p>
<p>Get started building one by checking out the official project on GitHub: <a class="relative pointer-events-auto a cursor-pointer underline " href="https://github.com/evilsocket/pwnagotchi" target="_blank" rel="noopener nofollow ugc">https://github.com/evilsocket/pwnagotchi</a></p>
<p>Unofficial list of Pwnagotchi builds and parts with notes:<br />
<a class="relative pointer-events-auto a cursor-pointer underline " href="https://www.reddit.com/r/pwnagotchi/comments/11bxv0n/i_created_pwnnotes_a_simple_collaborative/" target="_blank" rel="noopener nofollow ugc">https://www.reddit.com/r/pwnagotchi/comments/11bxv0n/i_created_pwnnotes_a_simple_collaborative/</a></p>
<p><a class="highlight" href="https://twitter.com/pwnagotchi">Pwnagotchi</a> is an <a class="highlight" href="https://hackernoon.com/intuitive-rl-intro-to-advantage-actor-critic-a2c-4ff545978752">A2C</a>-based “AI” powered by <a class="highlight" href="https://www.bettercap.org/">bettercap</a> and running on a <a class="highlight" href="https://www.raspberrypi.org/products/raspberry-pi-zero-w/">Raspberry Pi Zero W</a> that learns from its surrounding WiFi environment in order to maximize the <a class="highlight" href="https://pwnagotchi.ai/intro/#wifi-handshakes-101">crackable WPA key material it captures</a> (either through passive sniffing or by performing deauthentication and association attacks). This material is collected on disk as PCAP files containing any form of handshake supported by <a class="highlight" href="https://hashcat.net/hashcat/">hashcat</a>, including full and half WPA handshakes as well as <a class="highlight" href="https://www.evilsocket.net/2019/02/13/Pwning-WiFi-networks-with-bettercap-and-the-PMKID-client-less-attack/">PMKIDs</a>.</p>
<p>Learn more about <a class="highlight" href="https://www.evilsocket.net/2019/10/19/Weaponizing-and-Gamifying-AI-for-WiFi-Hacking-Presenting-Pwnagotchi-1-0-0/">the project and how it started on the author’s blog</a>.</p>
<h1 id="pwnagotchi-org">pwnagotchi org</h1>
<p>Pwnagotchi is an A2C-based “AI” powered by bettercap and running on a Raspberry Pi Zero W that learns from its surrounding WiFi environment in order to maximize the crackable WPA key material it captures (either through passive sniffing or by performing deauthentication and association attacks). This material is collected on disk as PCAP files containing any form of handshake supported by hashcat, including full and half WPA handshakes as well as PMKIDs.</p>
<table>
<thead>
<tr>
<th>quick</th>
<th>links</th>
</tr>
</thead>
<tbody>
<tr>
<td><a class="highlight" href="https://pwnagotchi.org/getting-started/index.html">Getting Started</a></td>
<td><a class="highlight" href="https://pwnagotchi.org/3rd-party-images/index.html">3rd Party Images</a></td>
</tr>
<tr>
<td><a class="highlight" href="https://pwnagotchi.org/3rd-party-plugins/index.html">3rd Party Plugins</a></td>
<td><a class="highlight" href="https://pwnagotchi.org/3d-printable-cases/index.html">3D Printable Cases</a></td>
</tr>
<tr>
<td><a class="highlight" href="https://pwnagotchi.org/common-issues/index.html">Common Issues</a></td>
<td><a class="highlight" href="https://pwnagotchi.org/customization/index.html">Customization</a></td>
</tr>
<tr>
<td><a class="highlight" href="https://pwnagotchi.org/modifications/index.html">Modifications</a></td>
<td><a class="highlight" href="https://pwnagotchi.org/opwngrid/index.html">Opwngrid</a></td>
</tr>
<tr>
<td><a class="highlight" href="https://pwnagotchi.org/contributing/index.html">Contributing</a></td>
<td><a class="highlight" href="https://pwnagotchi.org/hall-of-fame/index.html">Hall of Fame</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Instead of merely playing <a class="highlight" href="https://becominghuman.ai/getting-mario-back-into-the-gym-setting-up-super-mario-bros-in-openais-gym-8e39a96c1e41?gi=c4b66c3d5ced">Super Mario or Atari games</a> like most reinforcement learning based “AI” <em>(yawn)</em>, Pwnagotchi tunes <a class="highlight" href="https://github.com/evilsocket/pwnagotchi/blob/master/pwnagotchi/defaults.toml#L137">its own parameters</a> over time to <strong>get better at pwning WiFi things</strong> in the real world environments you expose it to.</p>
<div class="notices tip">
<p><strong>Learn more about <a class="highlight" href="https://pwnagotchi.ai/intro/#how-does-pwnagotchi-work">how Pwnagotchi works</a> and why it <a class="highlight" href="https://pwnagotchi.ai/intro/#wifi-handshakes-101">eats WPA handshakes</a> in the <i class="fas fa-star-of-life"></i> <a class="highlight" href="https://pwnagotchi.ai/intro/">Introduction</a> doc. You can also read about <a class="highlight" href="https://www.evilsocket.net/2019/10/19/Weaponizing-and-Gamifying-AI-for-WiFi-Hacking-Presenting-Pwnagotchi-1-0-0/" target="_blank" rel="noopener">the story of the project</a>.</strong></p>
</div>
<h2 id="butwhy">But…why?<i class="fas fa-link fa-lg"></i></h2>
<p>To give hackers an excuse to learn about reinforcement learning and WiFi networking—and have a reason to get out for more walks.</p>
<p>Also? <strong>It’s cute as f—</strong>.</p>
<div class="notices info">
<p><strong>In case you&#8217;re curious about the name:</strong> <em>Pwnagotchi</em> (ポーナゴッチ) is a portmanteau of <em>pwn</em> and <em>-gotchi</em>. It is a nostalgic reference made in homage to a very popular children&#8217;s toy from the 1990s called the <a class="highlight" href="https://en.wikipedia.org/wiki/Tamagotchi">Tamagotchi</a>. The Tamagotchi (たまごっち, derived from <em>tamago</em> (たまご) &#8220;egg&#8221; + <em>uotchi</em> (ウオッチ) &#8220;watch&#8221;) is a cultural touchstone for many Millennial hackers as a formative electronic toy from our collective childhoods.</p>
<p>Were <em>you</em> lucky enough to possess a Tamagotchi as a kid? Well, with your Pwnagotchi, you too can enjoy the nostalgic delight of being strangely emotionally attached to a handheld automata <em>yet again!</em> Except, this time around&#8230;you get to #HackThePlanet. &gt;:D <a href="https://pwnagotchi.ai/" target="_blank" rel="noopener">source</a></p>
</div>
<h2><a href="https://www.pwnagotchi.com/products/pwnagotchi-ready-to-ship-_1298795928_?variant=44066693447996" target="_blank" rel="noopener">Buy</a> yours today! or <a href="https://www.etsy.com/market/pwnagotchi" target="_blank" rel="noopener">Here</a></h2>
<p><img loading="lazy" decoding="async" class="wp-image-18768 alignright" src="https://goodshepherdmedia.net/wp-content/uploads/2024/10/source.gif" alt="" width="657" height="370" /></p>
<p><iframe title="Hacking WiFi networks in seconds With AI | Real Experiment Pwnagotchi" width="640" height="360" src="https://www.youtube.com/embed/TDvX5DE7D-Q?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><iframe title="Pwnagotchi - The Open Source Wi-Fi Hand Shake Hacker" width="640" height="360" src="https://www.youtube.com/embed/2DIPVpcjR1I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
