How I Use My Raspberry Pi
Inspired by the Things I Do With My Raspberry Pi article, I thought I'd share with you how I use my Raspberry Pi. Actually, I use at least two Raspberry Pis on a regular basis: one serves as a hacking and prototyping platform, while the other one acts as a server on the local network. The latter performs a variety of tasks.
I connected two external USB hard disks to Raspberry Pi via a powered USB hub. The usbmount utility takes care of automatically detecting and mounting the connected disks at the /media/usbX mount points. One disk is used for storing all files and documents, while the other one is reserved for rotating backup. I don't use any dedicated file server software to serve files on the network. Instead, I simply mount the first disk via SSH using the sshfs tool.
Nothing fancy there: Raspberry Pi uses two rsync-based scripts for local rotating backup and off-site backup. A cron job performs the off-site backup hourly and runs rotating backup action daily.
Storing email in the cloud is good, but having a local copy of all emails is even better. So I installed and configured the excellent OfflineImap tool on my Raspberry Pi to pull emails from my IMAP account on a regular basis.
While NewBlur is my web-based RSS aggregator of choice, I installed Miniflux on Raspberry Pi as a fallback option. This lightweight RSS reader is easy to deploy and maintain, and it's perfectly suited for keeping track of a handful of favorite RSS feeds.
Bookmark and File Sharing
My Raspberry Pi also runs the excellent Shaarli application for storing and sharing bookmarks. When I occasionally need to upload and share a file, I use the file hosting PHP script running on Raspberry Pi for that.
Finally, my Raspberry Pi acts as a photo station. Using an Eye-Fi SD card and Eye-Fi app for Android, I push photos from my camera to Raspberry Pi. It then organizes photos using the fotobasher script and backs up the photos.
This is how I use my Raspberry Pi, and I'm eager to hear what you do with your tiny machine. Hit the comments to share your Rasberry Pi projects.comments powered by Disqus
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.