

Little Red Caboose (preferably the one performed by The Laurie Berkner Band): https://music.youtube.com/watch?v=OEUtoCv_ot8


Little Red Caboose (preferably the one performed by The Laurie Berkner Band): https://music.youtube.com/watch?v=OEUtoCv_ot8


Good luck with all the learning 😉 sounds like a fun journey!


You got it 😉


Sure, building your own breadboard computer is much better than playing with some website… However transistors and relays are kind of similar in function, they both gate whether current flows.
If you are already familiar with transistors, then I agree those are a simpler introduction, however most regular people don’t know anything about a transistor, and they seem a little bit magical.
A relay however can be grasped by most people just by looking at it in operation. Magnet attracts… Electromagnets only attracts when powered… wire doesn’t conduct when not connected… Wire does conduct when connected… Electromagnet can pull or push wire to either connect or disconnect…
If you want the solution for the first task (building a nand gate with relays), you can see my solution here:



Learn how a computer works by building your own from scratch.
Or in some cases ONLY allowing them to reach the Internet. So they can’t access your other devices…


I realised a while ago that it’s way cheaper to hunt for second-hand intel NUCs, and the resulting machine is way more powerful… And the RAM and storage is upgradeable, if the NUC didn’t come with plenty of storage or RAM already…


I have my Firefox configured to force HTTPS, so it’s rather inconvenient to work with any non-HTTPS sites.
Because of that I decided to make my own CA. But since I’m running in Kubernetes and using cert-manager for certs, this was really easy. Add a resource for a self-singed issuer, issue a CA cert, then create an issuer based on that CA cert. 3 Kubernetes resources total: https://cert-manager.io/docs/configuration/ca/ and finally import the CA cert on your various devices.
However this can also be done using LetsEncrypt, with the DNS01 challenge. That way you don’t need to expose anything to the Internet, and you don’t need to import a CA on all of your devices. Any cert you issue will however appear in certificate transparency logs. So if you don’t want anyone to know that you are running a Sonarr instance, you shouldn’t issue a certificate with that in it’s name. A way around that is a wildcard cert. Which you can then apply to all your subservices without exposing the individual service in logs. The wildcard will still be visible in the logs though…


Apparently Kingpin uses an ultrasonic cleaner and hasn’t seen any problems as a result… However he acknowledges that some people say it’s bad for electronics:


I think this might do it: https://youtube.com/watch?v=SVuI-Fn27-U
In the German version he apparently also mentions “no rinse aid”, but that’s apparently missed out in the English version.


Why not select the 2.0 channel audio track?


In addition people often use VLANs for security segregation. For example you might buy a bunch of cheap Chinese security cameras, but want to ensure that they can’t send anything back to the manufacturer. Then you can make a VLAN with no Internet access for the cameras.
Train in the Distance by Paul Simon