Welcome to part two of my post. Previously I spoke about building a security system using a Raspberry Pi Zero and MotioneyeOS. (Read Here) I built and installed the system in February and it was working great. I even caught some Ass-Hat driving over my lawn and trash (Read Here). I ran into one issue with this system. Once Summer was here and the outside temperatures hit 90° (32°c) The processor temperature of the Pi Zero was topping 161° (72°C) and lack of cooling was causing my Pi Zeros to crash
According to the Raspberry Pi foundation the boards are specked to approach 80°C but mine were failing in the mid 70’s. So now to work on a solution.
How to cool your outdoor Motioneye camera
My first attempt was an obvious one – Paint the camera white.
The waterproof boxes I was using to house the camera had a clear cover. To reduce the amount of sunlight, I simply painted the box white
Painting the box was helpful and kept the system cooler , but it still wasn’t enough. The next step was to vent the box simply by drilling a few small holes at the bottom. I know this compromises my “waterproof” concept, but I am hedging my bets if any rain water was to enter the box, it would remain at the bottom and not touch the electronics.
Still not good enough! I want to add a fan, but I only want the fan to run when the CPU hits a specific temperature. There is no need to run the fan on cool nights or during the winter. So I decided to use the GPIO pins on the PI Zero to control the fan.
Controlling the cooling fan via GPIO pins
5 Volt cooling fan
1 NPN Transistor
1 1KΩ Resistor (or equivalent)
Soldering iron / solder
How to assemble
Its probably not a good idea to connect a fan directly to one of the GPIO pins, so I used a simple transistor and resistor to help limit the current being drawn via the pin
Camera systems are so inexpensive these days that it may make sense to purchase a Zmodoor Arlo system from Amazon and call it a day. What fun would that be? I love making little electronic projects and then improving on them as I go. Rather than install a pre-packaged surveillance system, motioneye here we come.
My system consists of four Raspberry Pi units running MotioneyeOS. Three of the four units are Pi Zeros that are my actual cameras, and the fourth is a Pi 3 that aggregates the feeds to one central monitoring station. The benefit of this is there is only one IP/domain that needs to be accessed in order to monitor all the cameras on my system. Continue reading “Motioneye Raspberry Pi Zero Security System”
I’m a network engineer by trade and like many of us enjoy having an extensive home lab where I can run servers, learn and experiment in my free time. Not only do I find it very satisfying to build a “production” infrastructure at home, but it also helps me with my day-to-day work at my real job. A few years back I started converting my home lab to Hyper-V. I found a visualized environment easier to manage, plus I was able to work on various technologies without running multiple pieces of hardware (think electric bill)
Residential Internet Service = ONE IP ADDRESS
The only issue was talking to all my various projects from outside the network. I have residential internet service and am only allowed ONE IP address. This causes issues running services on separate internal servers on the same port and trying to reach them from the internet.
I have not seen this error before and there were no other users in the environment experiencing this issue. My first troubleshooting step was to see if there were any unique applications that were specific to this user.
This particular user is the CFO of the company and logs into a number of banking websites. To enhance security many banks force customers to download additional software to supplement logins in order to prevent intrusion and hack attempts. This user was using a product from IBM
It’s been a while since I have written a blog posting. I guess you can say life sometimes gets in the way and things we enjoy doing get pushed aside. I have a few spare moments today to sit down and write so here goes nothing.
First and foremost Webcommand blog has just turned ONE! I started writing exactly one year ago today. When I built this server I was setting a goal to write 5 blog posts a week about 260 in a year. Well I realized its harder to come up with content then I thought. I also realized it is even harder to monetize the site as well (your donations are welcome) However I did manage to write 100 blog posts in the first year and I deem that a success!
Today on the anniversary of Webcommands birth and 100th post I would like to pay tribute to my favorite blogs and give each of them a brief shout out.
Cleaning out the basement yet again I stumbled on an old 20″ iMac. By today’s standards this thing is a huge piece of junk. 250GB hard drive, 1GB RAM, Core 2 processor. At 11 years old its better suited as a boat anchor then a functional computer. However the standard equipment iMac Keyboard does function as a blue tooth keyboard and can be used with other devices.
I happen to like the iMac keyboard, it feels a little small at first, however once you get accustomed to the feel it makes a great companion to any device.
The keyboard is relatively easy to pair to your device if you follow these simple steps.
I found this USB key to my heart while surfing the Internet the other day and thought it was a very unique item. A fun loving gesture to tell that special geek in your life how much you care about them.
Malware and viruses are always just a wrong click away, and to keep yourself protected you need to be on top of the latest trends that are targeting home and business users. This past month I have been noticing an increase in PDF attachment attacks around the office. As with previous email based attacks this is simply the latest attempt to infiltrate your network security by using the weakest link. YOU! Yes, in my opinion humans are the most vulnerable vector to attack and successfully enter a network.
How the latest PDF Phishing scam works.
A friend, coworker or client has already been infected with malware. At this point the attacker has taken control over their system and would like to spread his virus via email. The malware quickly enumerates the victims address book and fires off emails to unsuspecting targets with the viral payload attached as a PDF document. As the recipient you open the PDF, jump through a few hoops and the attacker now has control of your computer as well as your email credentials and more.
How to spot a bogus attachment, and prevent infection.
Well folks here’s another retro gaming platform revitalized into a mini computer. The C=64 was and still is my all time favorite platform and this Mini version may be on my purchase list once its released in March. First we saw the NES Classic Editionhit stores before Christmas 2016 and it was an immediate sell out, followed by the Super NES was released last year for $199.99 at Amazon The next logical step was to release the Commodore 64 Mini!
Commodore 64 Mini – will be released with 64 games!
Laptops and Notebook computers cost a fraction of what they did years ago. A decent general purpose laptop can be had today for around $500. However as time marches on our older computers can begin to feel slower due to more resource demanding applications and operating systems.
Maybe its not time to toss out that used laptop! With some easy modifications you can spruce up your laptop and get a few more years of good service life out of it.