Ostrich blog

Ostrich blog

  • Connecting a Dahua IP camera to UniFi Protect

    Connecting a Dahua IP camera to UniFi Protect

    Connection Dahua IP camera to a router with a video recorder function Ubiquiti UCG‑Max is a great way to integrate an existing video surveillance system into the ecosystem UniFi Protect,… >>>

    August 27, 2025
  • Raspberry Pi 5 and NVMe SSD: how to set up and work with the new media

    Raspberry Pi 5 and NVMe SSD: how to set up and work with the new media

    Raspberry Pi 5 in combination with PoE/M.2 HAT opens the possibility to use fast NVMe SSD drives. This significantly increases the speed of the system, makes it more reliable compared… >>>

    August 22, 2025
  • Review of the TP-Link Tapo L530E Smart Bulb

    Review of the TP-Link Tapo L530E Smart Bulb

    Smart lighting has long ceased to be exotic. On store shelves you can find dozens of models of light bulbs that can change color, work on a schedule, and connect… >>>

    August 20, 2025
  • Overview of the new EdgeRouter OS v3.0

    Overview of the new EdgeRouter OS v3.0

    I bought a Ubiquiti EdgeRouter X router quite a while ago, sometime in November 2020. I chose this router solely because of its compactness and low price. During the first… >>>

    August 17, 2025
  • Review of Samsung NVMe SSD for Raspberry Pi 5

    Review of Samsung NVMe SSD for Raspberry Pi 5

    I purchased a PoE M.2 HAT+ adapter from Waveshare for my Raspberry Pi 5, which allows not only to power the board via Ethernet, but also to connect an NVMe… >>>

    August 4, 2025
  • Using an SSH key to connect to the UniFi Network

    Using an SSH key to connect to the UniFi Network

    Ubiquiti’s UniFi Network Controller provides a user-friendly interface for network management, but for deeper diagnostics and configuration, command line access via SSH is sometimes required. For security and convenience, you… >>>

    July 27, 2025
  • Review of PoE M.2 HAT for Raspberry Pi 5 from Waveshare

    Review of PoE M.2 HAT for Raspberry Pi 5 from Waveshare

    Raspberry Pi 5 has become a real breakthrough in the world of single-board computers. Updated hardware, a more powerful processor, PCIe support via FPC cable – all this opens up… >>>

    July 10, 2025
  • Comparison of RJ45 connectors Cat 5e, Cat 6 and Cat 6a

    Comparison of RJ45 connectors Cat 5e, Cat 6 and Cat 6a

    At first glance, all RJ-45 connectors look the same, regardless of category. However, in practice, there are significant design differences between them that affect connection quality, cable compatibility, and network… >>>

    June 28, 2025
  • Mission Center – Windows-style task manager

    Mission Center – Windows-style task manager

    The power of the graphical interface In the Linux world, it is traditionally customary to focus on text interfaces: console, htop, top, systemctl – these tools are well known to… >>>

    June 24, 2025
  • How to use Raspberry Pi Connect

    How to use Raspberry Pi Connect

    Introduction One of the most convenient ways to remotely control a Raspberry Pi has traditionally been to use a VNC server, which allows you to access the Raspberry Pi’s graphical… >>>

    June 9, 2025
1 2 3 … 5
Next Page→

Ostrich blog

© 2025

  • YouTube
  • Instagram
  • Twitter

Language switcher

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}