Raspberry OS - Software Releases
- RPi Software Releases https://en.wikipedia.org/wiki/Raspberry_Pi_OS
Pi5
- Pi5 Docs https://www.raspberrypi.com/documentation/computers/raspberry-pi-5.html#raspberry-pi-connector-for-pcie
- Pi5 Pinouts https://community.element14.com/products/raspberry-pi/m/files/148385
- Manage Activity LED's on PI5 https://astroisk.nl/protecting-night-vision-disabling-activity-leds-on-a-raspberry-pi-5/
- Raspberry BOOT ORDER on PI5 https://community.volumio.com/t/guide-prepare-raspberry-pi-for-boot-from-usb-nvme/65700
- Raspberry Pi Mount a USB Drive Tutorial https://pimylifeup.com/raspberry-pi-mount-usb-drive/
Raspberry Pi -> APT
$ sudo apt update In Linux, every installed package has its details stored on the system. The system tracks changes to each package when a new version is released using either the "apt-get update" or "apt update" command. This command downloads the updated package information as specified in the sources file when executed.
$ sudo apt upgrade The "apt-get upgrade" command is used to upgrade already installed packages to the latest version, based on the information obtained through a previous "apt-get update" or "apt update" command. This command only upgrades existing packages and does not install any new packages Before using "apt-get upgrade", it's recommended to run "apt-get update" to ensure that your system has the latest information about available package updates.
$ sudo apt full-upgrade Basically upgrading a package to its most recent version is the main task of the apt full-upgrade command. However, it may remove the old version package while upgrading it. So it’s not a safer option to run this command in your Ubuntu terminal as it can make changes to the whole system and eventually break your Linux OS. Therefore, run this command with proper caution. So full-upgrade performs the function of upgrade but will remove currently installed packages if this is needed to upgrade the system as a whole.
$ sudo apt remove Remove is identical to install except that packages are removed instead of installed. It will remove the binaries, but leave configuration files, data files, and dependencies installed with it on installation time untouched.
$ sudo apt purge Purge is identical to remove except that packages are removed and purged (any configuration files are deleted too).It will remove about everything regarding the package, but not the dependencies installed with it on installation, which is particularly useful when you want to “start all over” with an application because you messed up the configuration.However, purge won’t touch configuration or data files inside the user’s home folder (e.g. /home/User/hiddenFolders). There is no easy way to get those removed as well. Note that other tools like aptitude will only remember dependency information for packages that it has installed.
$ sudo apt autoremove Autoremove is used to remove packages that were automatically installed to satisfy dependencies for other packages and are now no longer needed.In other words, it will only goes through the catalog and remove any left over packages that were not directly installed and that are not required by packages that are installed. Say that you install apache, it will install a lot of libraries. If you remove apache, all these libraries will be left behind until you run autoremove.
The only thing you should watch for, is if you started using one of the dependencies say “Python” but never actually installed it yourself; then it will be removed.
$ sudo apt clean Clean clears out the local repository of retrieved package files. It removes everything but the lock file from /var/cache/apt/archives/ and /var/cache/apt/archieves/partial/.
$ sudo apt autoclean Like clean, autoclean clears out the local repository of retrieved package files. The difference is that it only removes package files that can no longer be downloaded, and are largely useless. This allows a cache to be maintained over a long period without it going out of control.
Raspberry Pi -> BIOS update (EEPROM)
You can check for available firmware upgrade:
$ sudo rpi-eeprom-update
You can upgrade firmware using:
$ sudo rpi-eeprom-update -a
Then reboot:
$ '''sudo reboot
Check setting via sudu raspi-config or:
$ cat /etc/default/rpi-eeprom-update
Raspberry Pi -> USB Device Boot Mode
Raspberry Pi -> How to Fix Broken Packages
Raspberry Pi -> UPgrade to BullsEye V11
Raspberry Pi -> UPgrade to Bookworm V12
Raspberry SunFounder Cases
PironMan 5 NVMe M.2 SSD PCIe Mini PC Case for Raspberry Pi5
- PironMan 5 Cases https://www.sunfounder.com/collections/1-raspberry-pi-5-collection
- PironMan 5 Documentation https://docs.sunfounder.com/projects/pironman5/en/latest/
- PironMan 5 Software https://docs.sunfounder.com/projects/pironman5/en/latest/pironman5/set_up/set_up_rpi_os.html
Raspberry Pi Argon Cases
Argon NEO 5 NVME Case for Raspberry Pi5+
- Link to: https://argon40.com/products/argon-neo-5-m-2-nvme-for-raspberry-pi-5
- Manual: https://argon40.com/blogs/argon-resources/argon-neo-5-m-2-nvme-pcie-case-for-rpi-5-manual
Argon ONE V3 M.2 Case for Raspberry Pi5+
- Link to: https://argon40.com/products/argon-one-v3-m-2-nvme-case
- Manual: https://argon40.com/blogs/argon-resources/argon-one-v3-case-and-m-2-nvme-pcie-case-manual
Argon ONE V2 M.2 NVME for RPi 4 Case Installation Guide
- Link to: https://argon40.com/products/argon-one-m-2-case-for-raspberry-pi-4
- Manual: https://argon40.com/blogs/argon-resources/argon-one-m-2-nvme-case-installation-guide
- Info: https://www.yodeck.com/docs/how-to-articles/configure-argon-1-case-with-fan-and-power-button/
$ nano /etc/argononed.conf
$ systemctl restart argononed.service
R A S P B E R R Y
A guide-improve-security-raspberry-pi!
https://linuxhint.com/guide-improve-security-raspberry-pi/
How to check CPU speed
https://low-orbit.net/raspberry-pi-how-to-check-cpu-speed
Pi -> Disabling IPv6
Firstly, check for presence of IPv6 using ifconfig You should be seeing a few lines containing inet6 addr: ....
To disable, edit a file: sudo nano /etc/sysctl.conf
Add the following line:
net.ipv6.conf.all.disable_ipv6 = 1
For the change to take effect without rebooting: sudo sysctl -p
Verify that IPv6 address does not show up in ifconfig
If you wish to re-enable, change the value in the setting above from 1 to 0 then execute the following two lines:
sudo sysctl -p sudo ifconfig eth0 down && sudo ifconfig eth0 up
If you are doing this over SSH, the current session will of course be cut off. You should be able to reconnect in just a few seconds.
How to start at boot...
- https://www.dexterindustries.com/howto/run-a-program-on-your-raspberry-pi-at-startup/
- https://learn.sparkfun.com/tutorials/how-to-run-a-raspberry-pi-program-on-startup/all
Pi -> How to Copy USB image to NVME
Copy USB Image to NVME To copy a USB image to an NVMe drive from the command line on a Raspberry Pi, you can use the dd command. This command is commonly used for copying data between devices. Here's how you can do it:
1. First, ensure that the NVMe drive is detected by the Raspberry Pi. You can check this using the lsblk command, which lists all block devices. The NVMe drive should appear as /dev/nvme0n1.
2. Once you have confirmed the device names, you can use the dd command to copy the image. The basic syntax for this command is:
- sudo dd if=/dev/[source_device] of=/dev/[destination_device] bs=4M status=progress
Replace [source_device] with the device name of your USB drive (e.g., /dev/mmcblk0) and [destination_device] with the device name of your NVMe drive (e.g., /dev/nvme0n1).
3. For example, if your USB drive is /dev/mmcblk0 and your NVMe drive is /dev/nvme0n1, the command would be:
- sudo dd if=/dev/mmcblk0 of=/dev/nvme0n1 bs=4M status=progress
This command will copy the contents of the USB drive to the NVMe drive. The bs=4M option sets the block size to 4 megabytes, which can speed up the copying process. The status=progress option provides real-time feedback on the progress of the copy.
4. It is important to note that using dd on a running system is not recommended, as it can lead to data corruption. Ensure that the Raspberry Pi is not running any critical processes during the copy operation.
5. After the copy is complete, you may need to adjust the boot order to ensure that the Raspberry Pi boots from the NVMe drive. This can be done using the raspi-config tool or by modifying the config.txt file.
Pi -> How Disabling CUPS printerserver:
$ sudo systemctl stop cupsd $ sudo systemctl disable cupsd $ sudo reboot
Pi -> Completely Remove CUPS printerserver from Raspberry
To remove CUPS (the printing system) from a Raspberry Pi, you need to stop the CUPS service, remove the CUPS package, and potentially remove leftover configuration files. You may also need to disable snapd from automatically reinstalling CUPS.
Here's a breakdown of the steps:
1. Stop and Disable the CUPS Service:
- Stop the CUPS service.
Code
sudo systemctl stop cups
- Disable the CUPS service to prevent it from starting on boot:
Code
sudo systemctl disable cups
- If you have cups-browsed running, stop and disable it as well:
Code
sudo systemctl stop cups-browsed
sudo systemctl disable cups-browsed
2. Remove the CUPS Package:
- Use the apt purge command to remove the CUPS package and its configuration files:
Code
sudo apt purge cups *Remove any packages that were only installed as dependencies of CUPS:
Code
sudo apt autoremove
3. Prevent Snap from Reinstalling CUPS (if applicable):
- If you are using Snap, you might need to prevent it from reinstalling CUPS. First, list installed snaps:
Code
snap list *If cups appears in the list, remove it:
Code
sudo snap remove cups
- To prevent automatic reinstallation, you can try:
Code
sudo snap set system experimental.parallel-instances=true
sudo snap refresh --hold cups
*You can also blacklist CUPS from being installed by snaps by editing the /etc/apt/preferences.d/no-snap.pref file and adding:
Code
Package: snapd
Pin: release a=*
Pin-Priority: -1
- Then update APT:
Code
sudo apt update
Install Pi-Hole DNS Forwarder
- Pihole.net Website https://pi-hole.net/
- You're running Pi-Hole wrong! Setting up your own Recursive DNS Server! https://www.youtube.com/watch?v=FnFtWsZ8IP0
PiHole Black & Whitelisting:
Met betrekking tot Pi-hole zijn er diverse betrouwbare bronnen voor blacklists en whitelists, afhankelijk van wat je wilt blokkeren (reclame, tracking, malware, adult content, etc.). Hier zijn enkele van de beste en meest gebruikte lijsten, inclusief waar je ze kunt vinden:
Goede Blacklists voor Pi-hole:
- 1. Firebog
Website: https://firebog.net
Beschrijving: Bevat een samengestelde lijst van vele betrouwbare blocklists, ingedeeld in categorieën
(ad/tracking, suspicious, etc.).
Aanrader: Kies lijsten uit de “TICKED” sectie voor stabiele lijsten die weinig valse positieven veroorzaken.
- 2. StevenBlack’s hosts file
GitHub: https://github.com/StevenBlack/hosts
Beschrijving: Combineert meerdere lijsten (zoals adaway, malwaredomains, etc.) tot één samengestelde lijst.
Gebruik: Geschikt voor algemene bescherming tegen advertenties en tracking.
Toevoegen aan Pi-hole: https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
- 3. Energized Protection
Website: https://energized.pro
Beschrijving: Diverse lijsten beschikbaar (Basic, Ultimate, Porn, Social, etc.).
Gebruik: Je kunt zelf bepalen hoe agressief je filtering is.
Voorbeeld URL: https://block.energized.pro/basic/formats/domains.txt
- 4. OISD.nl
Website: https://oisd.nl\\
https://oisd.nl/setup/pihole
Beschrijving: Zeer populaire lijst in Nederland, onderhoudsvriendelijk en accuraat.
Gebruik: Compatibel met Pi-hole.
URL: https://dbl.oisd.nl/
Goede Whitelists voor Pi-hole:
Soms blokkeert een blacklist per ongeluk iets dat je nodig hebt (zoals Google Fonts, banken of streamingdiensten). Je kunt dan handmatig whitelisten, of gebruik maken van samengestelde whitelists.
1. Pi-hole Whitelist op GitHub
GitHub voorbeeld: https://github.com/anudeepND/whitelist
Gebruik: Bevat veel domeinen die ten onrechte geblokkeerd worden door populaire lijsten.
2. Community-maintained whitelists
Reddit (r/pihole) en het Pi-hole Discourse forum hebben lijsten van domeinen die je beter kunt whitelisten,\\ afhankelijk van welke diensten je gebruikt (zoals Google, Spotify, Netflix, etc.).
-Tips voor gebruik:
-Voeg blocklists toe via het Pi-hole Admin Dashboard → Group Management → Adlists.
-Vermijd het toevoegen van té veel lijsten: sommige overlap zorgt voor tragere prestaties.
-Test met pihole -q domein.com of iets al geblokkeerd wordt.
--Gebruik eventueel tools als https://pi-hole.net/query of je eigen querylog om valse positieven te detecteren.
Als je gewoon een goede algemene blocklijst wilt voor Pi-hole — die effectief is tegen advertenties, tracking en malware, maar weinig valse positieven geeft (dus websites blijven werken zoals bedoeld) — dan is dit een aanrader:
Aanbevolen Algemene Blocklist voor Pi-hole
Gebruik deze ene lijst voor een uitstekende balans tussen effectiviteit en betrouwbaarheid:
- OISD Full
URL: https://dbl.oisd.nl/
Voordelen:
. Zeer actief onderhouden
. Weinig false positives
. Rekening houdend met dagelijks internetgebruik
. Compatibel met streamingdiensten, banken, overheidssites, enz.
. Perfect voor gebruik in Nederland en België
Nadere informatie op: https://oisd.nl/setup/pihole
Zo voeg je 'm toe:
1.Ga naar je Pi-hole Admin Dashboard
2.Ga naar Group Management → Adlists
3.Voeg daar deze URL toe: https://big.oisd.nl 4.Klik op "Add" en daarna via de terminal of webinterface:
* $ pihole -g (om de lijst te herladen)
(Optioneel) Aanvullende betrouwbare lijsten
Als je toch nog iets extra's wilt blokkeren zonder veel risico op fouten:
- StevenBlack (standaard variant)
URL: https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
- Firebog - Ticked Recommended List (Minimal extra filtering)
URL:'' https://firebog.net
Maar OISD alleen is meestal al genoeg voor de meeste gebruikers — inclusief bescherming tegen
advertenties, tracking en malware.
Kant en klaar
Hier is je kant-en-klare adlist.txt bestand met de aanbevolen algemene blocklists voor Pi-hole:
- Instructies om te gebruiken:
1. Ga naar je Pi-hole Admin Dashboard.
2. Ga naar Group Management → Adlists.
3. Klik op “Import” of voeg de inhoud van dit bestand handmatig toe.
4. Herlaad de lijsten via: $ pihole -g
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
