Shirts, CDs, & Case Badges for GNU/Linux

All The Other Good Stuff
libreCMC microSD Cards and Upgrade Services
Have you been looking forward to a new release of libreCMC, but found it too tiring or technically cumbersome to perform an upgrade yourself? We now offer libreCMC upgrade services. We can ship a new microSD card configured to your liking for our Gigabit TPE-R1400 router and for our other wireless router models you can mail us what you have for flashing and configuring. We'll wipe everything from it, upgrade it to the latest release of libreCMC, and then configure the router to your preferred setup as specified by selecting from the available options below. We have many configurations to choose from.

  • Reduce the risk of messing up a complex router configuration

  • We offer a select set of popular configurations so even rather complex setups can be accommodated

  • Support for our USB 4G modems: Share your 4G cellular connection with other users

  • Support for our USB 4G modems w/ outgoing traffic transparently passed through our VPN servers

  • Support for mesh configurations: Get wifi to those pesky corners of the house where wireless doesn't ordinarily reach

  • Support for our PenguinVPN service: All traffic is transparently passed through our privacy friendly VPN service

Note: Postage for shipping routers to ThinkPenguin, Inc is not included. Return shipping however is included. Upon purchase we will send an email containing an RMA # and shipping information. At checkout please include your prior order # if you've already purchased our PenguinVPN service and are having us setup the PenguinVPN service again using your previously purchased subscription.

Support is available for 6 months from the date of purchase of upgrade services/microSD cards.

Warning: Please be aware we are not offering custom configurations or porting custom configurations. We are only offering new releases of libreCMC with a stock configuration or a configuration that was an option with our routers when originally purchased (or has since become available as an option). This means it's almost like your getting a new router, at least in terms of software, and the configuration. All other data a router had and any user-customized settings will be erased.
Powered by Tails Aluminum Case Badge
Show your support for Tails with a high quality aluminum case badge!

  • Aluminum base

  • Secure adhesive

  • 1.175 x 0.75 in / 3.175 x 1.9 cm

  • We ship world-wide


For large quantity orders contact sales for a quote.
Powered by Debian Aluminum Case Badge
Show your support for Debian GNU/Linux with a high quality aluminum case badge!

  • Aluminum base

  • Secure adhesive

  • 1.175 x 0.75 in / 3.175 x 1.9 cm

  • We ship world-wide


For large quantity orders contact sales for a quote.
The Ultimate Kali Linux Book: A Hackers Distro (TPE-KLIBK24)
Embark on an exciting journey into the world of Kali Linux - the central hub for advanced penetration testing. Hone your pen testing skills and exploit vulnerabilities or conduct advanced penetration tests on wired and wireless enterprise networks. In the latest third edition, this book goes further to guide you on how to setup your labs and explains breaches using enterprise networks. This book is for newcomers and those curious about penetration testing. This guide is your fast track to learning pen testing with Kali Linux.

  • Build a penetration testing lab and perform vulnerability assessments

  • Learn the various approaches a penetration tester can take

  • Discover information from Open Source Intelligence data sources

  • Use Nmap to discover security weaknesses on a target system or network

  • Become well-versed in exploiting vulnerable web applications

  • Learn to install and configure a recent release of Kali Linux (2024)

  • Establish a firm foundation in ethical hacking


Please note: For those outside the US depending on what you are ordering please be aware adding this book to your shopping cart will limit your shipping options to ones that may be much more expensive if not ordering it with a computer. This book is primarily intended for shipping to customers within the US and will ship via USPS media mail due to its weight and cost unless other goods are purchased alongside it. Media mail may take longer to deliver than our normal postal shipping options.
Mastering Ubuntu Server (TPE-UBUSER4)
Explore the versatile, powerful Linux Server distribution Ubuntu 22.04 with this comprehensive guide. Mastering Ubuntu Server is a great fit for anyone jumping in to managing Ubuntu servers. It's also focused on a recent LTS release ensuring that whats in the book matches the real world usage.

Mastering Ubuntu Server is a book that will teach you everything you need to know in order to manage real Ubuntu-based servers in actual production deployments. This book will take you from initial installation to deploying production-ready solutions to empower your small office network, or even a full data center. You'll see examples of running Ubuntu Servers in the cloud, be walked through set up of popular applications (such as NextCloud), host your own websites, and deploy network resources such as DHCP, DNS, and others. You'll also see how to containerize applications via LXD to maximize efficiency and learn how to build Kubernetes clusters.


Here are some of the topics covered in Mastering Ubuntu Server:

  • Learn to install Ubuntu Server on physical servers including mini board computers

  • Deploy Ubuntu Server in the cloud and host websites on your own server

  • Deploy your applications to their own containers and scale your infrastructure

  • Set up popular applications such as NextCloud

  • Automate deployments and configuration with Ansible to save time

  • Containerize applications via LXD to maximize efficiency

  • Discover best practices and troubleshooting techniques


Please note: For those outside the US depending on what you are ordering please be aware adding this book to your shopping cart will limit your shipping options to ones that may be much more expensive if not ordering it with a computer. This book is primarily intended for shipping to customers within the US and will ship via USPS media mail due to its weight and cost unless other goods are purchased alongside it. Media mail may take longer to deliver than our normal postal shipping options.
Gentoo USB Flash Drive Installation Media (TPE-GENFLSDV)
Gentoo was founded in 1999 and is best known of being the older and leading source-based distributions. It's geared at folks who want to eek out a bit of additional speed from their system through optimization and compiling of the system from source code. While not a distribution for the faint of heart it's a very popular distribution among the most technical of users who value getting the max out of their computer.
  • The Gentoo community has a tendency to build optimized code to gain efficiency over binary-based distributions.

  • Some may find this undesirable, but not everything has to be built from source any more as select packages are available in binary form.

  • Compiling from source may not be hard, but it does take more time to install a program when it's got to be built from source.

  • Gentoo is more customizable and allows users to configure which software features they wish to install, instead of the "one size fits all".

  • Gentoo is a rolling release based distribution favoring incremental updates rather than six month release cycles like many distros.
Please note: Gentoo is geared toward advanced users and support is not included with this product offering. You are picking up a USB flash drive with Gentoo only.
Slint USB Flash Drive Installation Media (TPE-SLNTFLSDV)
Slint is an easy-to-use versatile distribution that leads the way in properly supporting users who are blind. While many distributions include assistive technologies it's rarely if ever a priority that each new release works flawlessly or at all for users who are blind. For Slint bugs pertaining to assistive technologies are show stoppers, not just an afterthought on some public relation's checklist or done for compliance reasons to get some government contract. Slint not only includes the typical assistive technologies on the desktop, but also includes kernel modules to ensure users who are visually impaired can install the distribution themselves. At least for users who are relatively confident in their technical abilities. The distribution also includes an amazing set of documentation on using the included assistive technologies.
  • Slint is a stable distribution based on Slackware with accessibility software that is regularly updated.

  • Slint includes the MATÉ and LXQt desktop environments and has XFCE available on demand.

  • Slint can be used in console and graphical modes and can be switched between these modes without restarting.

  • Easy-to-use tools facilitate system administration and updates are fully automatic, under user control.

  • By default, a compressed swap space in RAM allows doubling the usable memory.

  • If installed on USB media Slint is portable from one computer to another. The media can be fully encrypted too.

  • Slint can be installed on any 64-bit machine with at least 2G of memory, and 50G disk space, without secure boot.

Please note: This product offering is made available without support, but if such support is desired it can be purchased separately.
There is no cloud: it's just someone else's computer t-shirt

If you don't get the joke we've got another t-shirt for you, but basically the meaning of the t-shirt is that surrendering control of your data via the use of cloud services puts you and potentially others in danger.

Many "cloud" companies are scanning for what they think is illicit content, but all the while endangering a mostly innocent customer base. There are different potential technologies at play here, but one of the core technologies that have been utilized is based around something called hashing. At a basic level hashing is taking a file as input and outputting a unique string or number called a hash. A hash in theory can be thought of as equivalent to a fingerprint. It's a number or string that can be used to verify that a file is what you've examined on a prior occasion and that no changes have been made. Each file has a different hash and no two files should have the same hash. Unfortunately companies and governments around the world have created hashes of content they have deemed to be illegal- or potentially useful for industrial espionage and other purposes. Cloud companies have begun utilizing these lists of hashes to scan for what they believe to be illegal content stored on their cloud services. In other words- your private data.

Now you might be thinking you've got nothing to worry about as you don't store anything illicit in the cloud. However this isn't the case at all. While in theory two files should never have the same hash the practical reality of it is that two files can have the same hash. This is what is called a collision and with enough data such as is the case with cloud hosting platforms you are guaranteed to end up with false positives. That is more false positives than not. While this isn't the only technology to be concerned about it's one of the big ones. These collisions are resulting in innocent people being raided and accused of hideous crimes that never happened. Depending on the technology there have been false positive rates as high as 85% meaning that potentially as many as 85% of the accused are completely innocent.

The non-profit Electronic Frontier Foundation has reported on at least one example of this or a similar technology being utilized that has wrongly endangered a completely innocent man and his family.

Product details:

Gildan - Ultra Cotton™ T-Shirt
Color: Dark Heather
100% cotton

Red Hat Enterprise Linux 9 Administration (TPE-RDHT9)
This book is a comprehensive Linux system administration guide. It examines Red Hat Enterprise Linux 9. Though administrative tools are covered, the emphasis is developing the skills required to administer your RHEL environment on-premises and in the cloud while preparing for the RHCSA exam. It covers topics from installation, administering user accounts, to security like SELinux.
  • Illustrated: Excellent for to-be administrators of Red Hat Enterprise Linux 9

  • Up-to-date: The book covers recent releases of Red Hat Enterprise Linux
Please note: Not available for shipping outside of the United States.
Penguin Laptop Bag For 14-15.6" Laptops, Black & Blue (TPE-PENLAPBAG)
  • Stylish, sturdy sleeve is designed to protect laptops up to 15.6"

  • Features a slim, lightweight design perfect for those always on the go

  • Padded sleeve provides protection against minor bumps and the interior protects from scratches/dust

  • Includes a front pocket ideal for storing computer accessories and power adapters

  • The padded sleeve means it can be used on its own or slipped inside the included bag as shown for hands-free carrying

* Note: Laptop not included

* Note: Only available for shipping to US addresses unless customers are ordering this product with a laptop