With Instructables you can share what you make with the world, and tap into an ever-growing community of creative experts.
We have a be nice comment policy. Please be positive and constructive.
We noticed you attached photosto your comment.
there is always, ALWAYS, at least one vulnerability; no matter how strong your firewall is. There is no such thing as a hack proof device, although it's a common misconception.
also: Challenge accepted.
Raspberry pi Day 7
Compile C/C++ Programs On Linux
How to boot Linux from USB
Raspberry pi Day 10
Getting Started With PetaLinux
How to install Linux on a Chromebook
Build an Embedded Linux System in few Steps
Short Linux Tutorial
Install Liquorix in Debian-based Linux
Maintaining Your Crouton Linux System
Posted:May 8, 2011
Join 2 million + to receive instant DIY inspiration in your inbox.
Download our apps!
© 2016 Autodesk, Inc.