Jump to content

jakkuh_t

Administrator
  • Posts

    929
  • Joined

  • Last visited

Everything posted by jakkuh_t

  1. So much writing omg... ahaha! Hopefully it works for you, let me know if you need any help.
  2. This is an accompanying guide for our recent video (currently on Floatplane) where we setup a DIY VPN server using Pritunl. Note: Image links will be coloured like this: https://google.ca (I still need to finish this, was posting at the end of the day and ran out of time D:) Parts List: A credit card or PayPal account to rent a server with That's it - unless you intend to install Pritunl locally in which case you will need a system or VM to install CentOS onto Stage 1 - VPS Install, Firewall, and Setup (before the video tutorial section): Before you can do any installing, you must deploy a VPS from your chosen provider. For the purposes of this tutorial we will be using Vultr.com (LMG affiliate link), specifically their $3.50/month 1 core, 512MB of memory, 500GB of bandwidth plan (note: this plan is only available at their New York/New Jersey data center). Create an account at Vultr or your chosen VPS provider. Deploy a VPS at your desired tier and location, choosing Centos 7 as your operating system (it appears Pritunl does not yet support CentOS 8, although this may change). This is one of the lightest-weight mainstream operating systems that Pritunl is compatible with right out of the box. Wait a few minutes for the VPS to deploy and start up - you should get an email once it is ready. Once the VPS is running and ready, you'll need to get an SSH client so we can SSH into the VPS to setup the Pritunl VPN server. Download, install and then launch the SSH client of your choice. We will be using PuTTY because it's simple, but any SSH client will do: https://lmg.gg/8KVmQ (https://i.imgur.com/POLV3i4.png) Copy the IP address assigned to your VPS into PuTTY, and click "Open" (https://i.imgur.com/PKYfvD2.png). You can find this in your VPS provider's control panel (https://i.imgur.com/z4To3uM.png). You may be prompted about a "PuTTY Security Alert" with a message about the host key not being cached, this is normal, click Yes (https://i.imgur.com/RRMqhMI.png). After it prompts you with "login as:" enter 'root' Then for password, copy and paste (paste in PuTTY by right clicking with your mouse) in the password supplied in your VPS provider's control panel (https://i.imgur.com/JwQxXHZ.png). You should now be logged in over SSH. Update the server and setup automatic security updates Quickly update the server by running 'yum update -y' (https://i.imgur.com/f7uWUge.png) **OPTIONAL BUT RECOMMENDED**: Setup automatic security updates on your VPS: https://www.howtoforge.com/tutorial/how-to-setup-automatic-security-updates-on-centos-7/ Now that you're SSH'd into the server, while technically optional, we highly recommend setting up some basic security including: changing your root password, setting up a sudo user and blocking root from SSH login, and setting up a firewall. At a bare minimum, you should change the supplied root password. This was provided to you in plain text through your provider's web panel and should be considered insecure until it is changed: Enter 'passwd' in PuTTY and hit enter. Input and then confirm your desired new password (https://i.imgur.com/unLgve8.png). Setup a firewall either in OS, or via the control panel of your VPS provider. We will be using the one supplied by Vultr. On the Vultr.com website, under Products>Firewall click the "Add Firewall Group" button (https://i.imgur.com/plIIpKJ.png) and set the description to something related to VPN so you remember what it is for (ie. "VPN Firewall") Create a firewall rule to allow SSH connections to the VPS (https://i.imgur.com/oxtHuHw.png). Protocol: SSH Port: 22 Source: My IP (or you can set this to Anywhere, but this will allow anyone to attempt to login to your server) Create a firewall rule for the VPN server IP (https://i.imgur.com/R67XT7E.png). Protocol: UDP Port: 1337 (or whatever you decide to use as your VPN port) Source: Anywhere (or you can define a specific IP range if you want to limit access to your VPN to only that range) Create a firewall rule to allow HTTPS connections to the VPN web panel (https://i.imgur.com/WyRmpSC.png). Protocol: HTTPS Port: 443 Source: Anywhere (or you can define a specific IP range if you want to limit access to your VPN web panel to only that range) Create a firewall rule to allow HTTP connections to the VPN web panel for LetsEncrypt SSL, if you want to specify a custom domain (https://i.imgur.com/SXuJuXH.png). Protocol: HTTP Port: 80 Source: Anywhere Then, you must attach the Firewall Group to the VPS for it to take affect. On the Vultr.com website, under Products>Instances>Cloud Instance (the VPS you rented for this)>Settings>Firewall select the Firewall Group we created earlier, with the description you assigned yourself (https://i.imgur.com/FUc91Xw.png). Click "Update Firewall Group" to apply the changes (https://i.imgur.com/9eHNUio.png). Setup a sudo user by creating a new user, setting the users password, and then adding the user to the sudo user group. This new user with only have access to commands that affect it's own user directory (not the rest of the system or other users), unless they prefix commands with 'sudo' (essentially running the command as root), which has password verification. For this to be at all beneficial we must also restrict root from logging in via SSH. Run 'useradd <USERNAME>', replacing '<USERNAME>' with your desired user name (https://i.imgur.com/ziPXvm9.png). Run 'passwd <USERNAME>' replacing '<USERNAME>' with the username of the user you just created (https://i.imgur.com/76nomeh.png). Run 'usermod -aG wheel <USERNAME>' replacing '<USERNAME>' with the username of the user you just created (https://i.imgur.com/60lrNyY.png). Run 'nano /etc/ssh/sshd_config' and change the "PermitRootLogin yes" line to "PermitRootLogin no". This will prevent root login over SSH (https://i.imgur.com/aJzoFvh.png). Use 'Ctrl+X', the 'Y' key, and then the 'Enter' key to close the nano text editor and save changes. Run 'systemctl restart sshd' to apply the above change (https://i.imgur.com/cOkWVJX.png). Close PuTTY, so you can re-login with your sudo user. Re-Login to SSH on PuTTY with your newly created sudo user by following steps 2.2 to 2.5, replacing "root" with whatever username you chose for your sudo user. If you're using your VPS provider's firewall like we did in this tutorial, you will need to disable the CentOS firewall as it will block the VPN's web panel from being accessed. If you plan on using the OS based firewall, we are assuming you know how to configure that yourself. Run 'sudo systemctl disable firewalld' (https://i.imgur.com/6GLlgME.png). Run 'sudo systemctl stop firewalld' (https://i.imgur.com/5TOJyZp.png). Run 'sudo systemctl status firewalld'. This should show the status as "inactive (dead)" (https://i.imgur.com/kTGqsw7.png). Use 'Ctrl+C' to exit this view. Bam, your OS is now secured, auto security updating, and ready to go for Pritunl. Stage 2 - Installing & Trying out Pritunl (this is where the tutorial portion of the video starts) Now that our OS is setup, and you're SSH'd in, it's time to install Pritunl. I'm expecting that these commands could change in the future, so please refer to the official Pritunl documentation here: https://docs.pritunl.com/docs/installation Copy over each piece from the CentOS 7 portion of their install docs to your SSH client individually as shown here: https://drive.google.com/a/linusmediagroup.com/uc?id=14i5tFSPXfOd7B_sKnYgKPmNLiWEiGJOp With Pritunl installed you should be able to access your Pritunl VPN web interface at https://<SERVERIP>/ replacing "<SERVERIP>" with the IP of your VPS, and can now configure the VPN server. Run 'sudo pritunl setup-key' in the PuTTY SSH client. Copy (double left click in PuTTY) the key it supplies into the Pritunl web interface (https://i.imgur.com/8Oqoykd.png). Run 'sudo pritunl default-password' in the PuTTY SSH client. Copy (double left click in PuTTY) the username and password it supplies into the Pritunl web interface (https://i.imgur.com/Q6qePiM.png). You should now be logged in and placed at the "Initial Setup" screen. Choose a username, password, and optionally a custom domain for your server (https://i.imgur.com/ckz8qzO.png). Navigate to the "Users" page and click "Add Organization" to create an Organization, this is essentially a group for users (https://i.imgur.com/qF1kM6W.png). On the same page click "Add User" to create a User(s), while being sure to specify a secure pin (https://i.imgur.com/zbCyJzX.png). Navigate to the "Servers" page and click "Add Server" to create your VPN server (https://i.imgur.com/00nyfI3.png). Set "Name" to whatever you'd like to name the VPN server. Set "Port" to your desired VPN port, this is the one we added a firewall rule for earlier in the tutorial. We are using "1337". Enable "Allow Multiple Devices" Disable "Inter-Client Communication" (this disallows VPN users on the same virtual network from seeing each other, you may wish to keep this feature but if you don't know what this means, just disable it). Click "Add" to save the configuration. Before you can start the server, you must attach the Organization you created earlier to it, so the server knows which users to allow to connect. Click "Attach Organization", and it should auto populate both the organization and server you made earlier, as they're the only ones present in the database (https://i.imgur.com/6MPdOhr.png). Click "Start Server", and bam, your VPN server is now running! With your VPN server configured, you can now download the Pritunl client on your respective device, and the user profile used to connect to it. Navigate to the "Users" page again, and click on the down arrow for the user you'd like to connect with (https://i.imgur.com/dldl5KR.png). Navigate to the https://client.pritunl.com/ website to download the Pritunl client for your respective device, and then install it (https://i.imgur.com/hHtEQiw.png) Launch the Pritunl client, and then drag the <USERNAME>.tar file into the Pritunl client (you can also use the Import Profile button) (https://i.imgur.com/I9Uge7H.png). Click the hamburger menu icon on the profile you added and then click "Connect". Enter your pin, and BAM! You're now connected to your very own VPN server. Note: If the connection doesn't succeed, it's likely you forgot to disable the CentOS file (steps 6.1-6.3.1), or you incorrectly set the port during the Pritunl setup (Stage 2, step 2.6.2), or you incorrectly set the port during the Vultr firewall setup (step 4.2.1.2). Check https://whatismyipaddress.com/ to see if your IP address did indeed change. It should show your location as wherever your VPS is hosted. Yay. Note: If you are trying to setup a VPN server to access your network remotely, there are instruction from Pritunl here: https://docs.pritunl.com/docs/accessing-a-private-network
  3. I honestly installed it, booted it up, and didn't even look at it. Just go for whatever is in your price range, for this application and on these older CPUs chances are its not going to make much difference at all.
  4. Hey man! Here's my current NAS setup: CPU: Intel Xeon E5-2670 v3 (12 core) Motherboard: Supermicro X10SRL-F RAM: 48GB of 2666MHz DDR4 ECC from Kingston Case: Rosewill RSV-L4412 (12 bay hotswap) PSU: Corsair RM1000i w/ sleeved cables (lol) Cache SSD: Samsung 850 Evo 500GB (random one I had kicking around) Hard Drives: 4x12TB IronWolf Pro + 2x8TB Seagate Barracuda + 2x4TB Seagate Barracuda + 1x4TB WD Black (these are all random HDDs I've collected over time) And I'm running Unraid for the OS as I have a mishmash of drives, and don't need it to be super fast or anything.
  5. Linus and Jake finish building and then test out the Ultimate LTT Minecraft Server. Thanks to Protocase for their fabrication work on the chassis. Check them out at https://www.protocase.com/ Thanks to Performance PCs for supplying fittings for this project: https://www.performance-pcs.com/ Buy Silverstone's SX800-LTI SFX PSU: On Amazon: https://lmg.gg/8KVjZ On Newegg: https://lmg.gg/8KVj4 Buy ASUS's Z390-I Motherboard: On Amazon: https://lmg.gg/8KVWT On Newegg: https://lmg.gg/8KVW3 Buy Corsair Double Density Memory: On Amazon: https://lmg.gg/8KVWN On Newegg: https://lmg.gg/8KVWm Buy Corsair SSDs: On Amazon: https://lmg.gg/8KVWL On Newegg: https://lmg.gg/8KVWP Buy Intel's Core i9 9900K: From Silicon Lottery: https://lmg.gg/8KVWj On Amazon: https://lmg.gg/8KVWB On Newegg: https://lmg.gg/8KVW1 Buy Alphacool Radiators: On Amazon: https://lmg.gg/8KVWJ O n Newegg: https://lmg.gg/8KVWW Buy EKWB Watercooling Parts: On Amazon: https://lmg.gg/8KVWZ On Newegg: https://lmg.gg/8KVWp Buy Noctua Fans: On Amazon: https://lmg.gg/8KVW4 On Newegg: https://lmg.gg/8KVWY
  6. Update 2: @Iceman 4_20 did not reply, so the EVGA 650 G5 power supply was redraw to..... @KuroSetsuna29 Congrats!
  7. Update: @Glitchy_Mammal requested their prize be redrawn. @Tbon88 was selected in their place, as reflected in the original winners post update. Thanks everyone!
  8. Alright here are this year's winners for Folding Month. Selected from the LTT team Top 100: 1. @Cbwgoose - Corsair Prize Pack 2. @palespartan - Corsair Prize Pack 3. @yaboistar - Cablemod Pro Cable Kit Huge shout out to all of those peeps for their long term support of the folding team And the rest of the winners, selected randomly, and then randomly assigned a prize. ? 4. @tarfeef101 - Fractal Design Define R6 TG 5. @Bloopidty - Fractal Design Define R6 TG 6. @Yebi - 3 Month Floatplane Sub 7. @Jawa_Juice - EVGA 240mm or 280mm AIO Cooler (requested a redraw for someone else to win :D) New 7. @Redzuzu - EVGA 240mm or 280mm AIO Cooler 8. @LpoolTech - 3 Month Floatplane Sub 9. @ObscureMammal - Cablemod Pro Cable Kit 10. @ky56 - EVGA 650 G5 PSU 11. @MichaelKilvington - Corsair Prize Pack 12. @Glitchy_Mammal - 3 Month Floatplane Sub (requested redraw) New 12. @Tbon88 - 3 Month Floatplane Sub 13. @Iceman 4_20 - EVGA 650 G5 PSU (no response) New 13. @KuroSetsuna29 - EVGA 650 G5 PSU 14. @Yggdrasil128 - EVGA 240mm or 280mm AIO Cooler 15. @pbx2 - Cablemod Pro Cable Kit 16. @Rowbs - 3 Month Floatplane Sub 17. @Corrupt_Liberty - Corsair Prize Pack 18. @Alextmoo - 3 Month Floatplane Sub 19. @PlyLean - EVGA 240mm or 280mm AIO Cooler 20. @Tufty11 - 3 Month Floatplane Sub 21. @notEnoughCores - 3 Month Floatplane Sub 22. @Dissitesuxba11s - EVGA 650 G5 PSU 23. @The Grim Dealer - Cablemod Pro Cable Kit 24. @MrJosh23 - 3 Month Floatplane Sub 25. @LAR_Systems - EVGA 240mm or 280mm AIO Cooler 26. @c4181 - Cablemod Pro Cable Kit 27. @Sam680 - EVGA 650 G5 PSU 28. @Neopentan - Corsair Prize Pack 29. @Titaan - 3 Month Floatplane Sub 30. @Struck - 3 Month Floatplane Sub I will be contacting each person via forum PM, they all have 72 hours to respond, otherwise their prize will be redrawn. EDIT: @Jawa_Juice (#7) requested that I redraw their prize for someone else. @Redzuzu was randomly selected in their place. EDIT 2: @Glitchy_Mammal (#12) requested that I redraw their prize for someone else. @Tbon88 was randomly selected in their place.
  9. Slight update everyone: just waiting on the reply from one of the top 100 folders winners, after which I will announce the rest of the winners.
  10. Oh derp, that was meant to say November 3rd. ? Anyways, I'm drawing the prizes now.
  11. Jake and Linus wire up his house for full 10GbE networking for less than $1000. Buy Indoor CAT6A Cable: From Infinite Cables: https://lmg.gg/8KVpq On Amazon: https://lmg.gg/8KVpC On Newegg: https://lmg.gg/8KVpf Buy Outdoor CAT6A Cable: From Infinite Cables: https://lmg.gg/8KVpH On Amazon: https://lmg.gg/8KVpF On Newegg: https://lmg.gg/8KVp2 Buy CAT6A Accessories: Terminations & Boots (Infinite Cables): https://lmg.gg/8KVpg Keystone Jacks (Infinite Cables): https://lmg.gg/8KVpx Wallplates (Infinite Cables): https://lmg.gg/8KVpG Crimp Tool (Infinite Cables): https://lmg.gg/8KVpv Insulation Cutter (Infinite Cables): https://lmg.gg/8KVpD Buy MikroTik Switches (CRS312-4C+8XG-RM): From Baltic Networks: https://lmg.gg/8KVpd On Amazon: https://lmg.gg/8KVpy Buy ASUS Switches (XG-U2008): On Amazon: https://lmg.gg/8KVps On Newegg: https://lmg.gg/8KVpt Buy Aquantia 10GBit NIC's (10G-Pro): On Amazon: https://lmg.gg/8KVp7 On Newegg: https://lmg.gg/8KVpM
  12. I don't think I ever said we were waiting until Dec 3rd. Will probably draw the prizes later this week when I have some time. Busy week.
  13. Linus and Jake design and test fit our custom ULTIMATE LTT Minecraft server chassis.
  14. We build what might be our SMALLEST custom gaming PC ever, in the new Velkase VK3 / Velka 3. Buy a Velkase: On their site: https://www.velkase.com/products/velka-3 Buy an AMD 3700X CPU: On Amazon: https://geni.us/KHY4Erm On Newegg: https://lmg.gg/8KV1c Buy an ASUS Strix X570-i Motherboard: On Amazon: https://geni.us/Y803S1K On Newegg: https://lmg.gg/8KV15 Buy a Gigabyte RTX 2060 Mini: On Amazon: https://geni.us/tQqcI On Newegg: https://lmg.gg/8KV1z Buy a Noctua L9a AM4 Cooler: On Amazon: https://geni.us/ozdR On Newegg: https://lmg.gg/8KV1P Buy Corsair LPX Memory: On Amazon: https://geni.us/MINRiBs On Newegg: https://lmg.gg/8KV1m Buy Corsair PCIe 4.0 NVMe SSDs: On Amazon: https://geni.us/YeUKfFo On Newegg: https://lmg.gg/8KV11 Buy SilverStone Flex ATX PSUs: On Amazon: https://geni.us/n5VbBC On Newegg: https://lmg.gg/8KV1W
  15. Just in case any of y'all wanted it! Uncompressed DL link: https://drive.google.com/file/d/16zqexgJ59n8g0yQAgOc_RHFMqGYc484H/view
  16. Hey everyone! ? For the second year in a row, I'm here to talk to y'all about Cancer, Alzheimer's, Huntington's disease, Parkinson's. They are terrible diseases that have had an effect on nearly everyone in one way or another, and we want to help. Researching these conditions is an incredibly expensive endeavor, but for many people, donating to fund these causes isn't an option. Thankfully, there is still something we all can do: Folding @ Home With your gaming PC, laptop, server, or really any computer, you can donate processing power from your CPU or GPU when you're not using them to help run calculations on a vast number of medical distributed computation projects. This massive shared computational power can help researchers learn more about these diseases in an effort to better treat them, and it can make a HUGE difference in the fight to conquer them. To achieve this huge collaborative effort, Stanford University started developing the Folding @ Home project, all the way back in the year 2000. It's a simple software you can run on your PC that automagically uses your processing power when idling (or full time if you desire) for the previously mentioned calculations. You can fold with pretty much anything, your dad's old dell prebuilt, a top tier RTX rig, or presumably even a RasPi. Every little bit helps. In exchange for your valiant processing effort, you can earn points that show off your contribution to find the cures all year round, but for a month out of every year, the Forum community runs a friendly Folding competition. Members of the community have donated a bunch of prizes, and you can read about the official forum competition here: https://linustechtips.com/main/topic/1091921-ltt-official-folding-month-2019/ Note: Signups for the forum competition where you can win the community donated prizes, and a forum badge are open until September 30th at 23:30 BST. --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- In addition to the community donated prizes, we've partnered with several vendors to give out even more prizes to participants! Be sure to give each of them a follow as a thank you for their contributions! Corsair (International): 5 x Cosair prize packs including: a K70 RGB MK.2, a Nightsword RGB, and a HS70 Wireless Fractal Design (US & Canada only): 2 x Define R6 Tempered Glass Cases EVGA (International): 4 x 650 G5 Power Supplies 4 x 240mm or 280mm EVGA AIO Liquid Coolers Cablemod (International): 5 x Cablemod Pro Cable Kits (any model) Floatplane (International): 10 x 3 Month LMG Floatplane subscriptions ------ We will be randomly drawing 3 winners from the top 100 folders on the LTT team, and then the rest from the entrants on the form below. To enter the contest, setup the folding client to run on your PC as listed below, then click on the entry below where you will be able to submit a link to your folding profile as well as a photo of your folding rig and we will select the winners according to the above definition. Entries will close on November 4th, 2019s at 5:00 PM PST. Entries are now closed. Contest Info: --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- If you want to sign up for the forum competition, entries close on September 30th at 23:30 BST (this is separate from the hardware giveaway/contest). Sign up now: https://linustechtips.com/main/topic/1091921-ltt-official-folding-month-2019/ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Folding Instructions: Downloading the Folding@Home Client: https://foldingathome.org/start-folding/ Set your username to same as your forum handle, the team number to 223518, and set your passkey, which can be generated here: https://apps.foldingathome.org/getpasskey More Information: https://linustechtips.com/main/topic/876-foldinghome-install-guide-and-links-linustechtips_team-223518/ Monthly Leaderboard: https://stats.foldingathome.org/teams-monthly LinusTechTips Folding Team: https://stats.foldingathome.org/team/223518 --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Be sure to post photos of your folding rigs, your progress, and any questions below!
  17. We try and build the ultimate gaming setup using as many parts from Ikea as possible! Buy ASUS's PG27UQ Monitor: On Amazon: https://lmg.gg/8KVPg On Newegg: https://lmg.gg/8KVPy Buy Logitech G513 Keyboard: On Amazon: https://lmg.gg/8KVPv On Newegg: https://lmg.gg/8KVPs Buy Logitech G Pro Mouse: On Amazon: https://lmg.gg/8KVPd On Newegg: https://lmg.gg/8KVPt Buy Logitech G560 Speakers: On Amazon: https://lmg.gg/8KVPD On Newegg: https://lmg.gg/8KVP7 Purchases made through some store links may provide some compensation to Linus Media Group. Ikea Part List: https://lmg.gg/8KVPx All ROG PC: https://www.youtube.com/watch?v=qXUJSCZiU48
  18. Who has the best PC setup at LMG? These guys compete for Cash and Hardware! Thanks to Intel for sponsoring this video! Check out their content about the benefits of pre-built vs custom PCs, and many other topics, at https://www.intel.com/builtvscustom
  19. We got our hands on the FINAL retail version of ASUS' ROG Phone II, and it looks pretty sweet! Check out the iFixit Essential Electronics Toolkit at https://ifix.gd/2L6qikW or visit https://ifixit.com/Linus for more great tools! Sign up for Private Internet Access VPN at https://lmg.gg/pialinus1 Check out the ROG Phone II on ASUS's website: https://www.asus.com/ca-en/Phone/ROG-Phone-II/
  20. Pi-Hole isn't great at blocking YouTube ads because YouTube's ad URL's change constantly (at least from what I've heard)... Try some Google Fu, there might be some better block lists for YouTube out there, than what is available in the defaults.
  21. We check out Pi-Hole, a software designed to block ads on your entire network, that can run on a $5 computer! Tutorial: Buy Raspberry Pi Zero's: On Amazon: https://lmg.gg/8KVmX On Adafruit: https://lmg.gg/8KVmR Buy Micro SD Cards: On Amazon: https://lmg.gg/8KVmc Buy Raspberry Pi Power Supplies: On Amazon: https://lmg.gg/8KVm5 On Adafruit: https://lmg.gg/8KVmz
  22. This is an accompanying guide for our recent video trying out Pi-Hole. Note: Image links will be coloured like this: https://google.ca Parts List: Raspberry Pi (any model) We will be using a Raspberry Pi Zero (https://lmg.gg/8KV3n) - $5 You can optionally install Pi-Hole in a docker container, or inside a VM, but we will be assuming you are using a Raspi for the rest of this tutorial. Micro SD Card (2gb+, but you should probably just buy a 16GB card because they're so cheap) We'd recommend a cheap SanDisk card (https://lmg.gg/8KV3k) 2.5A Micro USB AC Power Supply You can get these really cheap on eBay, but we aren't making any promises about quality. AdaFruit has a solid one: https://lmg.gg/8KVm8 *Optional*: Micro USB to RJ45 Ethernet Adapter This is in case the RasPi you are using doesn't have an ethernet port or WiFi (if you're using the Pi Zero, you will need one of these) *Optional*: Other stuff that you might need: SD/uSD Card Reader (Unless your laptop, or you already has one) Ethernet Cable (Unless you're using WiFi, you will need one of these) Case for your Raspberry Pi Model (Nice to have to keep it protected, but cardboard also works) Heat sinks for your Raspberry Pi (Nice to have to keep it cool, also helpful if you want to overclock your Pi) A display connection for your Pi (Pi Zero's use Mini HDMI) (We will be doing a headless install, so this is not necessary) Stage 1 - OS Install/Setup: Before we can install Pi-Hole or anything else really, we have to setup our operating system of choice: Raspbian Buster Lite (stretch also works) Download and unzip the "Raspbian Buster Lite" image from the Raspbian website: https://www.raspberrypi.org/downloads/raspbian/ Download and install balenaEtcher, our uSD card writer/burner of choice: https://www.balena.io/etcher/ Plug in your uSD card Launch balenaEtcher, select the Raspbian Buster Lite image, your uSD card, and then click Flash. (https://i.imgur.com/GMSZj8Z.png) If you're doing a headless install like us (no monitor/keyboard required), you'll need to enable SSH before booting up the Raspberry Pi Replug your uSD card to allow Windows to recognize the new Raspbian partition layout You should have a lettered drive pop up marked as "boot" (https://i.imgur.com/4ar0ih3.png) If you don't, ensure your uSD is being detected in Disk Management (https://i.imgur.com/ZPmyyz6.png) Then assign the partition a drive letter: https://lmg.gg/8KVm6 Create a file inside the "boot" folder called "ssh" with no extension (https://i.imgur.com/KDyB4nc.png) If you don't know how to make an extension-less file you can download it here: https://lmg.gg/8KVmb Plug your uSD card into the Raspberry Pi followed by networking, and then power. Since we're doing a headless install, we'll need to search for our raspberrypi's IP address so we can access it over SSH. If you know what you're doing, log in to your router's admin page and check the DHCP client/reservation list for "raspberrypi" If you don't know how to do the above, download Angry IP scanner and run it: https://lmg.gg/8KVmS Look for the hostname "raspberrypi", on that line the IP and MAC address of our Raspberry Pi will also be listed: 10.20.0.77 in our case (https://i.imgur.com/lK2ce0R.png) Now that we've found our Raspberry Pi's IP address + MAC Address, we need to assign it an INTERNAL/LOCAL static IP address. This process is going to vary wildly based on which router/DHCP server you use, so we'd recommend Googling your router's model name/number (can be found on the back) + "how to set static IP" (ex: "Netgear R7000 how to set static ip"). If you're willing and somewhat tech savvy, you might also be able to figure it out on your own. Start by navigating to your router's admin page. The IP for this is typically located on a sticker on the back of your ISP's provided router (along with the admin page's default username and password), but you can also find it by running the command "ipconfig" in command prompt on a Windows PC. Your router's IP will be listed after "default gateway" (https://i.imgur.com/S2Ndc0w.png) Log in to the admin page either with the Iogin credentials listed on the back of the router, or by googling the model number of the router along with "default password". Some routers use a randomly generated default password, so googling will not work for those. Once logged in, look for a tab labeled "DHCP Reservation", "Static IP Assignment", or something along those lines. (https://i.imgur.com/FeMjd4V.png) You may have to go to the Advanced menu to access this. (https://i.imgur.com/6l4kIqH.png) Enter the MAC address we grabbed earlier with Angry IP scanner, and then enter/select your desired static IP address (make sure you're using something not taken by another device on your network). (https://i.imgur.com/znUTbKv.png) Hit Apply (or whatever the equivalent is for your router) Re-plug the power connection for your Raspberry Pi, to allow it to restart and fetch it's newly assigned IP. To access the Raspberry Pi over SSH we will need to download and connect to it with an SSH client Download, install and then launch the SSH client of your choice. We will be using PuTTY because it's simple, but any SSH client will do: https://lmg.gg/8KVmQ (https://i.imgur.com/POLV3i4.png) Enter the newly assigned static IP address of your Raspberry Pi into PuTTY, and click "Open" (https://i.imgur.com/BegMcKC.png) After it prompts you with "login as:" enter "pi" (https://i.imgur.com/jfULCu5.png) Then for password, enter "raspberry". You should now be logged in over SSH. (https://i.imgur.com/Q058Sbw.png) Now that we're logged in over SSH, start by changing the default password, and updating the Raspberry Pi. To change the user password enter the command "passwd" and press enter. You'll then be prompted to enter the current password (this is "raspberry" so enter that) Then enter your desired new password To update the Raspberry Pi, run the command "sudo apt update" - this is going to update the package list to tell us if anything needs to be update. (https://i.imgur.com/ECpLG93.png) Then, to actually upgrade the packages now that the package manager knows which ones need updating, run "sudo apt upgrade -y". (https://i.imgur.com/EYfDhkC.png) Our Raspberry Pi is now updated, set to a secure password and ready to install Pi-Hole onto! Stage 2 - Pi-Hole Install/Setup (this is where the tutorial portion in the video starts) With our RasPi's OS, internet, and SSH ready to go, we can now install Pi-Hole. Copy the Pi-Hole install command from their website, paste it into the SSH client, and click Enter to run it: https://lmg.gg/8KVm9 (https://i.imgur.com/P20CP2I.png) The installer will spit out some status updates until you're brought to the configuration screen (https://i.imgur.com/t0DHzHo.png) Press Enter until you get to the "Choose An Interface" page. The default "eth0" interface for Ethernet users should be selected by default. Press Enter to continue. ("wlan0" should be selected if you're using WiFI - keep in mind WiFi installation is not supported in this tutorial, but if you have some decent Google-Fu you should be able to figure it out) On the next screen, select your upstream DNS provider. This is where requests will be forwarded if they're not blocked by Pi-Hole (ie. if they're not found in it's block/black lists). We will be using Google DNS, and if you don't know what this means, stick with that. Press Enter to continue. The following screen allows you to select which of the default block list's you'd like to use. We will leave these all on, but you can use your arrow keys and space bar to (de)select any of them as you wish. Press Enter to continue. Next up, it will ask you if which IP protocols you want to block ads over, leave this at the default unless you know what you're doing. Press Enter to continue. The next screen will list the IP address of the Raspberry Pi and the IP of your router, assuming you've set a static IP, just click Enter to continue. If you get a screen about an IP conflict, just ignore it and click Enter to continue. You'll then be asked about the web interface, web server, and logging modes. Leave these all at default by clicking Enter. After all that, Pi-Hole is going to do a bunch of stuff, and it might take a couple minutes so sit back until you're greeted with an "Installation Complete!" page. This will list the IP and password for the Pi-Hole web interface. Copy the IP into your browser, and log with the listed password. Huzzah! You now have a functioning Pi-Hole installation Stage 3 - Setting Up Pi-Hole to Run on Your Devices / Whole Network To enable Pi-Hole on a device-by-device basis, you'll need to manually set the DNS IP address in your device settings. For each of these, substitute the IP in the tutorial for the IP of your Raspberry Pi How to set DNS on an iPhone: https://lmg.gg/8KVmw How to set DNS on Android phones (your phone manufacturers skin may slightly vary): https://lmg.gg/8KVmh To enable Pi-Hole on a Router level, meaning it will work on all your devices automatically, you'll need to configure your router's DHCP server's default DNS settings. This process is going to vary wildly based on which router/DHCP server you use, so we'd recommend Googling your router's model name/number (can be found on the back) + "how to set DNS servers" (ex: "Netgear R7000 how to set DNS servers"). Stage 4 - Using Pi-Hole + Common Whitelisting To enable some common whitelisted false-positives run the command listed here: https://github.com/anudeepND/whitelist For some great info on the Pi-Hole web interface read the lower portion of this tutorial: https://www.smarthomebeginner.com/pi-hole-tutorial-whole-home-ad-blocking/#Configuring_Your_Router_8211_Whole_Home_Ad_Blocking
×