Raspberry


Raspberry OS - Software Releases



Pi5



Raspberry Pi -> APT


$ sudo apt update In Linux, every installed package has its details stored on the system. The system tracks changes to each package when a new version is released using either the "apt-get update" or "apt update" command. This command downloads the updated package information as specified in the sources file when executed.

$ sudo apt upgrade The "apt-get upgrade" command is used to upgrade already installed packages to the latest version, based on the information obtained through a previous "apt-get update" or "apt update" command. This command only upgrades existing packages and does not install any new packages Before using "apt-get upgrade", it's recommended to run "apt-get update" to ensure that your system has the latest information about available package updates.

$ sudo apt full-upgrade Basically upgrading a package to its most recent version is the main task of the apt full-upgrade command. However, it may remove the old version package while upgrading it. So it’s not a safer option to run this command in your Ubuntu terminal as it can make changes to the whole system and eventually break your Linux OS. Therefore, run this command with proper caution. So full-upgrade performs the function of upgrade but will remove currently installed packages if this is needed to upgrade the system as a whole.

$ sudo apt remove Remove is identical to install except that packages are removed instead of installed. It will remove the binaries, but leave configuration files, data files, and dependencies installed with it on installation time untouched.

$ sudo apt purge Purge is identical to remove except that packages are removed and purged (any configuration files are deleted too).It will remove about everything regarding the package, but not the dependencies installed with it on installation, which is particularly useful when you want to “start all over” with an application because you messed up the configuration.However, purge won’t touch configuration or data files inside the user’s home folder (e.g. /home/User/hiddenFolders). There is no easy way to get those removed as well. Note that other tools like aptitude will only remember dependency information for packages that it has installed.

$ sudo apt autoremove Autoremove is used to remove packages that were automatically installed to satisfy dependencies for other packages and are now no longer needed.In other words, it will only goes through the catalog and remove any left over packages that were not directly installed and that are not required by packages that are installed. Say that you install apache, it will install a lot of libraries. If you remove apache, all these libraries will be left behind until you run autoremove.

The only thing you should watch for, is if you started using one of the dependencies say “Python” but never actually installed it yourself; then it will be removed.

$ sudo apt clean Clean clears out the local repository of retrieved package files. It removes everything but the lock file from /var/cache/apt/archives/ and /var/cache/apt/archieves/partial/.

$ sudo apt autoclean Like clean, autoclean clears out the local repository of retrieved package files. The difference is that it only removes package files that can no longer be downloaded, and are largely useless. This allows a cache to be maintained over a long period without it going out of control.


Raspberry Pi -> BIOS update (EEPROM)


You can check for available firmware upgrade:
$ sudo rpi-eeprom-update

You can upgrade firmware using:
$ sudo rpi-eeprom-update -a

Then reboot:
$ '''sudo reboot

Check setting via sudu raspi-config or:
$ cat /etc/default/rpi-eeprom-update


Raspberry Pi -> USB Device Boot Mode



Raspberry Pi -> How to Fix Broken Packages



Raspberry Pi -> UPgrade to BullsEye V11



Raspberry Pi -> UPgrade to Bookworm V12



Raspberry SunFounder Cases

PironMan 5 NVMe M.2 SSD PCIe Mini PC Case for Raspberry Pi5


Raspberry Pi Argon Cases

Argon NEO 5 NVME Case for Raspberry Pi5+

Argon ONE V3 M.2 Case for Raspberry Pi5+

Argon ONE V2 M.2 NVME for RPi 4 Case Installation Guide

$ nano /etc/argononed.conf

$ systemctl restart argononed.service


R A S P B E R R Y

A guide-improve-security-raspberry-pi!

      https://linuxhint.com/guide-improve-security-raspberry-pi/ 

How to check CPU speed

      https://low-orbit.net/raspberry-pi-how-to-check-cpu-speed 

Pi -> Disabling IPv6

Firstly, check for presence of IPv6 using ifconfig You should be seeing a few lines containing inet6 addr: ....

To disable, edit a file: sudo nano /etc/sysctl.conf

Add the following line:

net.ipv6.conf.all.disable_ipv6 = 1

For the change to take effect without rebooting: sudo sysctl -p

Verify that IPv6 address does not show up in ifconfig

If you wish to re-enable, change the value in the setting above from 1 to 0 then execute the following two lines:

sudo sysctl -p sudo ifconfig eth0 down && sudo ifconfig eth0 up

If you are doing this over SSH, the current session will of course be cut off. You should be able to reconnect in just a few seconds.


How to start at boot...


Pi -> How to Copy USB image to NVME

Copy USB Image to NVME To copy a USB image to an NVMe drive from the command line on a Raspberry Pi, you can use the dd command. This command is commonly used for copying data between devices. Here's how you can do it:

1. First, ensure that the NVMe drive is detected by the Raspberry Pi. You can check this using the lsblk command, which lists all block devices. The NVMe drive should appear as /dev/nvme0n1.

2. Once you have confirmed the device names, you can use the dd command to copy the image. The basic syntax for this command is:

  • sudo dd if=/dev/[source_device] of=/dev/[destination_device] bs=4M status=progress

Replace [source_device] with the device name of your USB drive (e.g., /dev/mmcblk0) and [destination_device] with the device name of your NVMe drive (e.g., /dev/nvme0n1).

3. For example, if your USB drive is /dev/mmcblk0 and your NVMe drive is /dev/nvme0n1, the command would be:

  • sudo dd if=/dev/mmcblk0 of=/dev/nvme0n1 bs=4M status=progress

This command will copy the contents of the USB drive to the NVMe drive. The bs=4M option sets the block size to 4 megabytes, which can speed up the copying process. The status=progress option provides real-time feedback on the progress of the copy.

4. It is important to note that using dd on a running system is not recommended, as it can lead to data corruption. Ensure that the Raspberry Pi is not running any critical processes during the copy operation.

5. After the copy is complete, you may need to adjust the boot order to ensure that the Raspberry Pi boots from the NVMe drive. This can be done using the raspi-config tool or by modifying the config.txt file.


Pi -> How Disabling CUPS printerserver:

$ sudo systemctl stop cupsd $ sudo systemctl disable cupsd $ sudo reboot


Pi -> Completely Remove CUPS printerserver from Raspberry

To remove CUPS (the printing system) from a Raspberry Pi, you need to stop the CUPS service, remove the CUPS package, and potentially remove leftover configuration files. You may also need to disable snapd from automatically reinstalling CUPS.

Here's a breakdown of the steps:

1. Stop and Disable the CUPS Service:

  • Stop the CUPS service.

Code

    sudo systemctl stop cups
  • Disable the CUPS service to prevent it from starting on boot:

Code

    sudo systemctl disable cups
  • If you have cups-browsed running, stop and disable it as well:

Code

    sudo systemctl stop cups-browsed
    sudo systemctl disable cups-browsed

2. Remove the CUPS Package:

  • Use the apt purge command to remove the CUPS package and its configuration files:

Code

    sudo apt purge cups


 *Remove any packages that were only installed as dependencies of CUPS:

Code

    sudo apt autoremove

3. Prevent Snap from Reinstalling CUPS (if applicable):

  • If you are using Snap, you might need to prevent it from reinstalling CUPS. First, list installed snaps:

Code

    snap list


 *If cups appears in the list, remove it:

Code

    sudo snap remove cups
  • To prevent automatic reinstallation, you can try:

Code

    sudo snap set system experimental.parallel-instances=true
    sudo snap refresh --hold cups

 *You can also blacklist CUPS from being installed by snaps by editing the /etc/apt/preferences.d/no-snap.pref file and adding:

Code

    Package: snapd
    Pin: release a=*
    Pin-Priority: -1
  • Then update APT:

Code

    sudo apt update

Install Pi-Hole DNS Forwarder


PiHole Black & Whitelisting:

Met betrekking tot Pi-hole zijn er diverse betrouwbare bronnen voor blacklists en whitelists, afhankelijk van wat je wilt blokkeren (reclame, tracking, malware, adult content, etc.). Hier zijn enkele van de beste en meest gebruikte lijsten, inclusief waar je ze kunt vinden:

Goede Blacklists voor Pi-hole:

    https://oisd.nl/setup/pihole
Beschrijving: Zeer populaire lijst in Nederland, onderhoudsvriendelijk en accuraat.
Gebruik: Compatibel met Pi-hole.
URL: https://dbl.oisd.nl/

Goede Whitelists voor Pi-hole:

Soms blokkeert een blacklist per ongeluk iets dat je nodig hebt (zoals Google Fonts, banken of streamingdiensten). Je kunt dan handmatig whitelisten, of gebruik maken van samengestelde whitelists.

1. Pi-hole Whitelist op GitHub
GitHub voorbeeld: https://github.com/anudeepND/whitelist
Gebruik: Bevat veel domeinen die ten onrechte geblokkeerd worden door populaire lijsten.

2. Community-maintained whitelists
Reddit (r/pihole) en het Pi-hole Discourse forum hebben lijsten van domeinen die je beter kunt whitelisten,\\ afhankelijk van welke diensten je gebruikt (zoals Google, Spotify, Netflix, etc.).
-Tips voor gebruik:

 -Voeg blocklists toe via het Pi-hole Admin Dashboard → Group Management → Adlists.

-Vermijd het toevoegen van té veel lijsten: sommige overlap zorgt voor tragere prestaties.

-Test met pihole -q domein.com of iets al geblokkeerd wordt.

--Gebruik eventueel tools als https://pi-hole.net/query of je eigen querylog om valse positieven te detecteren.


Als je gewoon een goede algemene blocklijst wilt voor Pi-hole — die effectief is tegen advertenties, tracking en malware, maar weinig valse positieven geeft (dus websites blijven werken zoals bedoeld) — dan is dit een aanrader:

Aanbevolen Algemene Blocklist voor Pi-hole

Gebruik deze ene lijst voor een uitstekende balans tussen effectiviteit en betrouwbaarheid:

Voordelen:
. Zeer actief onderhouden
. Weinig false positives
. Rekening houdend met dagelijks internetgebruik
. Compatibel met streamingdiensten, banken, overheidssites, enz.
. Perfect voor gebruik in Nederland en België

 Nadere informatie op:  https://oisd.nl/setup/pihole

Zo voeg je 'm toe:

 1.Ga naar je Pi-hole Admin Dashboard
2.Ga naar Group Management → Adlists
3.Voeg daar deze URL toe: https://big.oisd.nl 4.Klik op "Add" en daarna via de terminal of webinterface:
* $ pihole -g (om de lijst te herladen)

(Optioneel) Aanvullende betrouwbare lijsten

Als je toch nog iets extra's wilt blokkeren zonder veel risico op fouten:

Maar OISD alleen is meestal al genoeg voor de meeste gebruikers — inclusief bescherming tegen
advertenties, tracking en malware.


Kant en klaar

Hier is je kant-en-klare adlist.txt bestand met de aanbevolen algemene blocklists voor Pi-hole:

  • Instructies om te gebruiken:
    1. Ga naar je Pi-hole Admin Dashboard.
    2. Ga naar Group Management → Adlists.
    3. Klik op “Import” of voeg de inhoud van dit bestand handmatig toe.
    4. Herlaad de lijsten via: $ pihole -g
   -=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Pagina laatst gewijzigd op 20 July 2025 om 13:14
Powered by PmWiki