How to Verify Your VPN Connection is Secure – NoobsLab

How To Verify Your VPN Connection Is Secure

It seems like everyone offers a Virtual Private Network (VPN) service these days. With the rising demand for true anonymity on the internet, service providers with suboptimal routing pathways, and increased demands for privacy and security, just about everyone recommends the use of a VPN. Whether you’re new to the concept or you’ve been operating from a proxied IP for years, verifying and ensuring the security of your connection will always be a top priority.

Some of the responsibility for a secure VPN rests in the hands of the service provider. There are steps that the provider can take to ensure “true” anonymity and security. The other half of the equation rests in the hands of the VPN user. There are a variety of settings, protocols, and options that can be configured to provide the maximum amount of security and privacy on most VPNs.

What makes a VPN service secure?

When evaluating the security of a VPN service and its connection, you’re going to be looking for a few things:

Administrative Logging:

  • Administrative Logging: Whether or not your IP and its activities are logged and stored by the VPN service. Different services will have different policies on this, and just how secure your privacy is will vary from service to service. Some countries impose additional restrictions on the number of days logged for VPN activities, while others may have no restrictions.

Tunneling Protocol:

  • Tunneling Protocol: Different protocols offer different amounts of encryption security and connection speed. Services that offer a variety of protocols are going to be more flexible and allow you to select the connection protocol that fits your own security vs. usability needs.

Consistent Connection and Uptime:

  • Consistent Connection and Uptime: For most paid services, this won’t be a concern, but every VPN suffers the occasional drop in connection or a server down. In order for your location and activity to truly be protected, you need to have a constant connection to the service itself. Whenever your connection drops, you fall back to your own personal internet connection. There are ways to mitigate the privacy impact of this loss in connection, but the first line of defense is a good service provider with a high percentage uptime and a consistent connection.

Selecting a good VPN (like Surfshark) with strong security policies and a verified track record is important, and ensuring you look carefully at each services’ offerings is the first step in securing your VPN connection.

A closer look at VPN service security

Logging Policies

This may be the most important aspect of privacy and security when it comes to your VPN service. The entire idea behind running your connection through a VPN is to maintain anonymity and drastically reduce the likelihood that your activities or identity can be obtained by malicious individuals. The most effective way for a service to provide this level of security is to maintain zero logs on your activity.

An actual “zero-logging” policy is virtually impossible to find. It’s the nature of networking that some activity needs to be logged in some capacity for service and diagnostics. You’re going to be looking for a service that has a minimal amount of logging and concrete policies on the way this information is handled.

Again, this can vary based on the country the service is located as well as the policies of the service itself. While searching for a VPN, you’ll want to carefully examine the Terms of Service for each provider. Look for specifics on how long your information is retained, what is logged, and in what situations this information can be provided to others. This includes official requests from government agencies. The less information that can be given and the shorter it’s retained the better.

Protocols

Most VPNs will offer multiple tunneling protocols to connect to their service. The popular options are Point-to-Point Tunneling Protocol (PPTP), Layer-2 Tunneling Protocol (L2TP), and OpenVPN. Each has its own advantages and disadvantages, and you’ll need to select a service that offers the protocol that fits your needs.

PPTP connections are fastest, but also offer the least amount of security. For a large number of users, this may even be the preferred choice because its lower security overhead provides faster data transfer. If you’re seeking a more secure option, take a look at the other protocols.

L2TP is going to be the slowest but offers strong security. Its speed is lessened by the slow encryption used by the protocol, resulting in a trade of raw speed for security.

OpenVPN creates a balance between security and speed. It’s fast enough for the vast majority of users and also offers comparable security to the L2TP protocol.

Connection and Uptime

Networking is not an exact science. Switches can die, the software can have bugs, and data can slow to a crawl. A service provider with a well-established networking infrastructure will be able to get around most of these events and provide consistent uptime to their customers.

For the majority of paid services, uptime shouldn’t be much of a concern, but it’s always worth looking for more information on how a service is performing in this regard.

How to secure your VPN connection

Once you’ve selected a service, there are a few simple steps you can take to further reduce the risk of your privacy being compromised. These solutions will generally be configured through the application provided to you by your VPN service, or through a third-party application if you’ve chosen to not use your service’s software.


DNS Leaks:

Whenever you’re on the internet, your computer uses a DNS server to translate web addresses into IPs it can connect to. When you’re connected through a VPN, these requests should originate from the location of your VPN. Sometimes you can get a “leak” in DNS resolutions that cause your requests to come from your actual location instead of your VPN. There are websites and applications that can help you

monitor for DNS leaks

. Many VPN providers and applications give an option to monitor and correct DNS leaks. Check your configuration options and be sure any setting related to monitoring or correcting these leaks is turned on.

IPv6 Leaks: Similar to IPv4, but with far greater address space, IPv6 is used to assign addresses to devices on the internet. The vast majority of the internet is still using IPv4 but sometimes your IPv6 address is used instead. This address may not be protected by your VPN. To stop these leaks, simply disable IPv6 in your VPN applications settings.

VPN Kill Switch: Sometimes you may lose connection to your VPN service. When this happens, your activities become completely unmasked. To prevent the loss of privacy from losing connection to your VPN, go into your connection applications settings and turn on the kill switch feature. This may be labeled differently depending on how you are connecting to your VPN, but you’re generally looking for the setting that will disconnect you from any connected servers if your VPN loses its connection.

Test your IP: A simple solution for verifying that your VPN is working properly is to simply go to a website that will tell you your IP. You can find a range of these on the internet, including ones found on speed test sites and major internet service providers. Just look to see if the listed IP is your actual IP or not.

Source

Download Vim Linux 8.1.0470

Vim (also known as Vi Improved) is an open source graphical and command-line utility that aims to deliver a full-featured text editor designed for experienced programmers and developers of any kind who are looking for a versatile tool to write code. Keep in mind though, that Vim is not a word processor.

A Vi clone

Vim provides the power of the de-facto UNIX editor Vi, with a more complete feature set. It is useful whether you’re already using Vi or you write code with any other text editor of your choice. It is highly configurable, specially crafted to deliver efficient text editing on a mainstream operating system (see the section below for supported OSes).

Features at a glance

Key features includes vertically split windows, Vimdiff, folding, flexible indenting, Unicode support, comprehensive documentation, a powerful plugin architecture, as well as support for numerous scripting languages.

Getting started with Vim

Vim is not your regular text editor, especially if you were one of those people who used to work with pretty applications like Gedit, Leafpad, Sublime Text or UberWriter, nor Nano. It is a very sophisticated application that requires you to read its documentation, but if you’ve used Vi before, you’ll be just fine to upgrade to Vim.

A programmer’s editor

Vi Improved (Vim) is often called a “programmer’s editor,” and therefore it is extremely useful for and highly acclaimed by developers who want an entire IDE (Integrated Development Environment) into a single, easy-to-use software. However, Vim is perfect for all kinds of text editing, from editing configuration files to composing emails.

Supported operating systems and availability

Vim is not a GNU/Linux only application, as it officially supports many other operating systems, including BSD, Solaris, Amiga, OS/2, Mac OS X and Microsoft Windows. It is available for download as a universal sources archive and runs well on both 32-bit and 64-bit hardware platforms.

Source

Intel Core i9 9900K Linux Benchmarks – 15-Way Intel/AMD Comparison On Ubuntu 18.10

Intel sent over the Core i9 9900K as their first 9th Gen Coffeelake-S CPU hitting store shelves today. With the embargo on that now expired, let’s have a look at how well this eight-core / sixteen-thread processor performs under Linux.

 

The Core i9 9900K is Intel’s new answer for competing with the likes of the AMD Ryzen 7 2700X, but does come at a higher price point of $499 USD. While the Core i9 9900K is a Coffeelake refresh, rather than being six cores / twelve threads, they are matching AMD’s precedent set by the Ryzen 7 processors in having eight cores / sixteen threads. This 14nm 8C / 16T processor has a base clock frequency of 3.6GHz with a turbo frequency at 5.0GHz, a 16MB L3 cache and supports dual-channel DDR4-2666 memory.

 

 

The Core i9 9900K has the same UHD Graphics 630 as existing Coffeelake/Kabylake processors. This LGA-1151 processor has a 95 Watt TDP and retail price of $499 USD. The 12nm FinFET 8C/16T AMD Ryzen 7 2700X as a reminder has a base clock frequency of 3.7GHz, 4.3GHz max boost clock, 16MB L3 cache, and a 105 Watt TDP. The biggest difference with the 2700X is the price with it retailing for just above $300 USD.

 

 

Most Intel motherboard vendors should be putting out BIOS updates (if not already) enabling the new 9th Gen CPUs to work in existing Coffeelake LGA-1151 motherboards. But there is also the new Z390 chipset rolling out as well. Z390 motherboards won’t be much of an upgrade if you already have a Z370 board, but some of the additions are useful including: better overclocking, USB 3.1 Gen 2 support, and integrated Intel Wireless-AC.

 

 

The motherboard I have been using for most of my pre-launch testing is the ASUS PRIME Z390-A. After the great experience using the ASUS PRIME Z370-A on Linux over the past year (and it still continues working great!), ASUS kindly sent over the Z390-A motherboard for this i9-9900K testing.

 

 

To no surprise given Intel’s always punctual Linux support and Z390 not being a whole lot different from previous Coffeelake motherboards, the ASUS Z390-A motherboard has been working out great under Ubuntu 18.04, Ubuntu 18.10, Fedora 29, and the like. The one caveat to point out is the unfortunate problem we have with most new Intel/AMD motherboards and that is the lack of sensor support for being able to read thermal/voltage/fan sensors with the stock mainline kernel drivers.

 

 

The ASUS PRIME Z390-A has two M.2 slots, Intel Optane memory support, USB 3.1 Gen 2 Type-C connections, and other features building off the success of the Z370-A. The ASUS PRIME Z390-A is priced well compared to other Z390 motherboards at launch with it going for about $190 USD. I’ll provide another update on the ASUS PRIME Z390-A in a few weeks but with the time I’ve spent with it so far this month and enduring a lot of benchmarks, the Z390-A has proven to be a great contender for Linux desktop systems.

 

Source

Linux Scoop — Neptune 5.0 Neptune 5.0 the…

Neptune 5.0 – See What’s New

Neptune 5.0 the Linux distribution focused on KDE plasma has been release. This release uses the latest KDE Plasma 5.12 desktop environment along with the KDE Applications 17.12 and KDE Frameworks 5.43.0 software suites. It also promises new ways to run the latest software versions.

Powered by the long-term supported Linux 4.14 series kernel ported from Debian Stretch’s Backports repository, Neptune 5.0 ships not only with the latest and greatest Plasma LTS release but also features our known Neptune Artwork with beautiful designs for all applications no matter if GTK+2, GTK+3 or Qt4 or Qt5 applications. Combined with our Icon Theme this provides a truly marvelous user experience.

Neptune 5.0 release notes | Download Neptune 5.0

Source

How to Find All Failed SSH login Attempts in Linux ?

Each attempt to login to SSH server is tracked and recorded into a log file by the rsyslog daemon in Linux. The most basic mechanism to list all failed SSH logins attempts in Linux is a combination of displaying and filtering the log files.

The most simple command to list all failed SSH logins is the one shown below.

#grep “Failed password” /var/log/auth.log

Sample output.

grep “Failed password” /var/log/auth.log

Sep 26 09:49:11 linuxforfreshers.com sshd[32138]: Failed password for ravi from 192.168.101.26 port 33325 ssh2

Oct 2 23:04:25 linuxforfreshers.com sshd[25028]: Failed password for root from 192.168.101.211 port 55800 ssh2

In order to display extra information about the failed SSH logins, issue the command as shown in the below example.

#egrep “Failed|Failure” /var/log/auth.log

In CentOS or RHEL, the failed SSH sessions are recorded in /var/log/secure file. Issue the above command against this log file to identify failed SSH logins.

#egrep “Failed|Failure” /var/log/secure

Sample output

Dec 29 16:11:01 localhost sshd[32526]: Failed password for root from 192.168.101.111 port 31729 ssh2

Dec 29 16:11:04 localhost sshd[32526]: Failed password for root from 58.218.198.264 port 31729 ssh2

Source

How to Save PHP Sessions in Memcached

Memcached is a high performance storage engine designed for storing chunks for data, so it is great for storing sessions in it. The upside of doing this you notice a performance benefit from not writing these disk or a database is that you gain a performance increase. The downside is that memcached isn’t saving anything, so if memcached restarts all of the users will need to login again.

This guide assumes you have a working installation. If you do not please see How to install Memcached.

Configure PHP for Memcache

Make sure the memcache PHP extension is installed

php -i|grep memcache

If nothing returns go ahead and install it:

pecl install memcache

Find the location of your php.ini

# php -i|grep “Loaded Configuration File”
Loaded Configuration File => /usr/local/php7/etc/php.ini

Open the php.ini file and add the following line at the top:

extension=”memcache.so”

Configure PHP To Store Session Data In Memcached

You will want to edit your php.ini again and find the following lines:

session.save_handler =
session.save_path =

You will then want to update them to the following and uncomment them:

session.save_handler = memcache
session.save_path = ‘tcp://127.0.0.1.1:11211’

The reason we selected the PHP extension memcache vs memcached, is that the memcached extension is not available in PHP 7. Go ahead and save the file.

Restart your webserver

service nginx restart

or

service httpd restart

And your session data should now be stored in memcached

Aug 6, 2017LinuxAdmin.io

Source

Kali Linux 2017.1 E17 Installation on Oracle VirtualBox

Kali Linux 2017.1 E17 Installation on Oracle VirtualBox
Kali Linux 2017.1 E17 Installation on Oracle VirtualBox

This video tutorial shows

Kali Linux 2017.1 E17 (Enlightenment) installation

on

Oracle VirtualBox

step by step. This tutorial is also helpful to install Kali Linux 2017 E17 on physical computer or laptop hardware. We also install

Guest Additions

on Kali Linux 2017 for better performance and usability features such as Automatic Resizing Guest Display, Shared Folder, Seamless Mode and Shared Clipboard, Improved Performance and Drag and Drop.

Kali Linux 2017.1 E17 Desktop Installation Steps on VirtualBox:

  1. Create Virtual Machine on Oracle VirtualBox
  2. Start Kali Linux 2017.1 E17 Installation
  3. Setup Kali Linux E17 Networking
  4. Install Lightdm Display Manager
  5. Install Guest Additions
  6. Test Guest Additions Features: Automatic Resizing Guest Display and Shared Clipboard

Installing Kali Linux 2017.1 E17 on Oracle VirtualBox

 

Kali Linux 2017.1 New Features and Improvements

Kali Linux is a Debian-based distribution which features several security and forensics tools. Kali Linux 2017.1 features drivers for RTL8812AU wireless chipsets, improved GPU support and there are now Azure and AWS images of Kali Linux for cloud instances. Kali Linux 2017.1 brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages, an updated kernel that provides more and better hardware support, as well as a slew of updated tools.

Kali Linux Website:

https://www.kali.org/

What is Enlightenment (E17) Desktop Environment?

Enlightenment, also known simply as E, is a compositing and stacking window manager for the X Window System. Since version 20, Enlightenment is also a Wayland compositor. Enlightenment includes functions to provide a graphical shell, and it can be used in conjunction with programs written for GNOME or KDE. When used together with the Enlightenment Foundation Libraries (EFL), Enlightenment can refer to an entire desktop environment.

The window manager is a lean, fast, modular and very extensible window manager for X11 and Linux. It is classed as a “desktop shell” providing the things you need to operate your desktop (or laptop), but is not a whole application suite. This covers launching applications, managing their windows and doing other system tasks like suspending, reboots, managing files etc. Enlightenment is built on top of EFL, using the libraries we wrote for it to do its UI as well as to run the entire compositor itself. This means that any improvements to EFL turn up in the compositor as well.

Enlightenment Website

https://www.enlightenment.org/

Hope you found this Kali Linux 2017.1 E17 installation on Oracle VirtualBox tutorial helpful and informative. Please consider sharing it. Your feedback and questions are welcome!

Source

Kvantum | SparkyLinux

20 Oct, 2018

There is a new package available for Sparkers: Kvantum.

What is Kvantum?

Kvantum is an SVG-based theme engine for Qt4/Qt5 and KDE, i.e. a program for styling Qt applications with SVG images, with an emphasis on elegance, usability and practicality.

Kvantum comes with a default dark theme, inspired by the default theme of Enlightenment. Creation of realistic themes like that for KDE was my first reason to make Kvantum but it allows themes with very different looks and feels, whether they be photorealistic or cartoonish, 3D or flat, embellished or minimalistic, or something in between.

Kvantum also has extra themes, that are installed as root with Qt5 installation and can be selected and activated by using Kvantum Manager.

The core idea of Kvantum, namely using of SVG images for drawing Qt widgets, is taken from QuantumStyle (not developed anymore but continued as QSvgStyle at https://github.com/DexterMagnific/QSvgStyle).

Installation:
apt update
apt install kvantum

The Kvantum package is available for Sparky 4 and Sparky 5 as well.

Kvantum

The project developer is Pedram Pourang, a.k.a. Tsu Jan.
The home page of Kvantum: github.com/tsujan/Kvantum
Source

How to Listen to WAV Files on Ubuntu

There are a number of available media file types all over the internet, each of them having their own features and disadvantages. Thanks to the community that powers the Linux platform, there are a number of available apps that are able to play the majority of them for you.

WAV (Waveform Audio File Format) is an audio file format. WAV is an IBM and Microsoft standard file format for storing an audio bitstream on the PC platform. There are a lot of available unpopular file formats and WAV is one of them.

Using WAV files hold a few disadvantages. For example, WAV file format has a size limitation – up to 4GB. Some programs even lower the limit – up to 2GB. Uncompressed WAV files also tend to be larger, making them not suitable for sharing over the internet. However, for retaining the sound quality, WAV is very powerful. That’s why it’s only used when disk space isn’t a bottleneck.

However, there are a number of media players you can use to play a WAV file.

Playing WAV file

For playing a WAV file, there are a number of available players. Check out the best media players for Ubuntu. Almost all the media players are available for other Linux distros as well. WAV, despite not being used as widely as MP3 or others, all the players in the list supports the file format. You won’t have any trouble listening to WAV files.

In the following demo, I’ll be using Rhythmbox – one of the most popular music players for Linux distros. Start Rhythmbox –

Now, go to File >> Add Music. You can also use the keyboard shortcut “Ctrl + O”.

Search for the WAV music file you need to listen to.

The music is there! Select the music and click the “Play” button.

Voila! Enjoy your favorite music!

Source

Odroid-H2 is world’s first Gemini Lake hacker board

Hardkernel unveiled the Odroid-H2, the first hacker board with an Intel Gemini Lake SoC. The Ubuntu 18.10 driven SBC ships with 2x SATA 3.0, 2x GbE, HDMI and DP, 4x USB, and an M.2 slot for NVMe.

When the Odroid-H2 goes on sale in November at a price that will be “higher than $100,” Hardkernel will join a small group of vendors that have launched a community backed x86-based SBC. This first open spec hacker board built around Intel’s new Gemini Lake SoC — and one of the first Gemini Lake SBCs of any kind — follows earlier Arm-based Odroid winners such as the Odroid-C2 Raspberry Pi pseudo clone and the octa-core Odroid-XU4.

Odroid-H2, front and back
(click images to enlarge)

 

The Odroid project had hoped to be launching its second or third-gen x86 board by now. In 2015, the project started working on an Odroid-H SBC based on the Intel Cherry Trail Atom x5-Z8500 — a close cousin to the Chery Trail x5-Z8350 found on Aaeon’s UP board and smaller

UP Core

hacker boards. However, it found that the “Z8500 had a very fine pitch of BGA which raised PCB cost and manufacturing cost twice more than expected.” In addition, “LPDDR3 RAM sourcing was another big hurdle,” says the Odroid-H2 announcement.

In 2016, the company built an Odroid-H1 based on an Intel Braswell Celeron N3160, which is found on the Udoo X86 board. The board was successfully used in a dedicated project, but Hardkernel decided not to release it publicly due to DDR3 shortages and concerns that Braswell was no longer competitive. The project considered an AMD Ryzen 5 2500U, but it was too expensive.

Then Intel announced Gemini Lake, which seemed to be just right. “It was slower than Ryzen but much faster than Intel Apollo Lake, and the price was reasonable,” says the project.


Odroid-N1
prototype

Earlier this year, Hardkernel had another false start with an Odroid-N1 board featuring a Rockchip RK3399 SoC. We included it in our reader survey of 116 Linux/Android hacker boards, but by the time we announced the survey results in late June, the Odroid project had scrapped the N1, once again due to RAM sourcing issues. The Odroid-H2 announcement, however, notes that an Odroid-N2 is under development based on an undisclosed SoC with cutting edge Cortex-A73 cores.

With the Odroid-H2 launch set for only a few weeks away, we’re confident that the third time around the x86 merry-go-round will be the charm. Hardkernel may need to work on its supply chain management, but it tends to make high quality, well supported boards backed up by a thriving community.

Inside the Odroid-H2

At this point, the presumably soon to be open sourced Odroid-H2 has only a partial spec list, but the block diagram fills in most of the holes. The 110 x 110 x 43mm Odroid-H2 taps the second fastest Desktop version of the Gemini Lake SoC family with the Celeron J4105, a quad-core 14nm-fabricated SoC with an official clock rate of 1.5GHz/2.5GHz burst that the Odroid project pegs at 2.3GHz. By comparison, the new, Linux-friendly Cirrus7 Nimbini v2 Gemini Edition mini-PC uses the dual-core Celeron J4005 or top-of-the-line, quad-core, 1.5GHz Pentium Silver J5005.

Odroid-H2 (left) and backside loaded with 8GB RAM and an NVMe SSD
(click images to enlarge)

 

Gemini Lake, which is the follow-on to the Apollo Lake Atom family, is due to arrive soon in DFRobot’s delayed LattePanda Delta board. (The similar, Kaby Lake based

LattePanda Alpha

just shipped with Ubuntu or Windows 10.) In addition to fueling the new Nimbini mini-PC, Gemini Lake has shipped on a few computers such as the Windows-equipped

Alldocube KNote 5

2-in-1 tablet PC and

Beelink S2

mini-PC.

The Odroid-H2 will ship with the Ubuntu 18.10 (Cosmic Cuttlefish) release that just showed up yesterday. The Odroid project notes that you can “run Dolphin on Ubuntu and enable Vulkan GPU driver.” It also shows several benchmark results, as well as a demo of the SBC running a smooth Nintendo Wii emulation.

One argument for x86 hacker boards is that Linux drivers tend to work more reliably than on a typical Arm board. The downsides are high price and high power consumption. However, the Odroid project is claiming a reasonable 14W consumption under CPU stress and a 4W idle.

The Odroid-H2 stands out with its dual-channel memory, with support for up to 32GB DDR4. The photo shows a standard 8GB model with two 4GB modules. It also offers dual SATA 3.0 ports, bootable eMMC, and an M.2 slot that supports PCIe x4 and NVMe storage.

Dual [email protected] displays are provided via the HDMI 2.0 and DP 1.2 ports, and there’s an audio jack with S/PDIF support. You also get dual GbE ports, which is pretty standard on commercial x86 boards, but is still something special in the community hacker board world.

There’s no WiFi, so if you use the M.2 slot for storage, you’ll need to tap one of the four USB ports. The Odroid-H2 is equipped with a pair each of USB 3.0 and 2.0 ports, as well as a rather skimpy 20-pin GPIO connector. Clearly this less of an IoT tinkering board than it is a media and gaming platform.

There’s a wide-range 14-20V DC input, a power management IC, and a real-time clock. A large heatsink keeps the CPU running smoothly at 2.3GHz even at 70°C. Since the heatsink is so high anyway, the design can afford to stack the coastline ports in towers like a mini-PC. So you get has a compact footprint, but a high profile.

Odroid-H2 block diagram (left) and Type IV enclosure
(click images to enlarge)

 

The Odroid project devotes much of the announcement to showing off four different enclosure types. Some are rather elaborate, including a Type-IV chassis that supports dual 2.5-inch drives or a single 3.5-incher.

Preliminary specifications for the Odroid-H2 include:

  • Processor — Intel Celeron J4105 — 4x 14nm Gemini Lake cores @ 2.3GHz; 10W TDP; Intel UHD Graphics 600 (Gen 9.5, GT1) @ 700MHz; SSE4.2 accelerator (SMM, FPU, NX, MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, AES)
  • Memory — Dual-channel DDR4-PC19200 (2400MT/s) RAM up to 32GB via 2x slots
  • Storage:
    • eMMC slot (bootable)
    • 2x SATA 3.0 slots
    • M.2 slot (PCIe x4) with NVMe support
  • Networking — 2x GbE ports (Realtek RTLG111G)
  • Media I/O:
    • HDMI 2.0 port at up to [email protected]
    • DisplayPort 1.2 port at up to [email protected]
    • Dual simultaneous display support
    • Audio jack (headphone, mic, SPDIF) with ALC662 5.1 ch. HDA codec)
  • Other I/O:
    • 2x USB 3.0 host ports
    • 2x USB 2.0 host ports
    • 20-pin expansion port (3.3V) with 2x UART, 2x I2C, etc.
  • Other features — Heatsink; RTC with battery; multiple enclosure types
  • Power — 14-20V DC input; PMIC; power and reset buttons; 4W consumption at idle, 14W with CPU, 22W with CPU and GPU
  • Operating temperature — undisclosed, but claimed to operate at 2.3GHz even at 70°C
  • Weight — 320 g with heatsink, full RAM and NVMe SSD
  • Dimensions — 110 x 110 x 43mm
  • Operating system — Ubuntu 18.10 with Linux Kernel 4.18

Further information

The Odroid-H2 will launch in November for more than $100 (probably closer to $150). More information may be found on Hardkernel’s Odroid-H2 announcement.

Source

WP2Social Auto Publish Powered By : XYZScripts.com