How to change the LED on a Logitech G series mouse in Linux

Some of the Logitech gaming series of mice have RGB LEDs on them that the user can change. Usually, these changes are made within Microsoft Windows, as the Logitech corporation has little to no Linux support, and hasn’t announced any plans to support the platform in the future. As a result, Linux fans with a Logitech G series mouse have to rely on custom, third-party software to set LED settings within Linux.

In this guide, we’ll go over how to customize and change the LED settings on various Logitech G series mice within Linux. Though, please keep in mind that only a few mice are supported with this method, and your results may vary.

Install Piper

There are several user-created shell scripts for Linux that can make it so that users can manipulate the LED settings of a Logitech G series mouse. These scripts are all very handy, but the problem is that often they only support a single device, rather than most of the Logitech G series mice available on the market.

A great tool for Logitech G mice owners to use in place of custom shell scripts on Linux is Piper, a GUI tool that makes it so that users can easily tweak the lighting color of Logitech G series mice, as well as lighting animation effects. Piper also lets users customize mouse button functions as well!

The Piper application is easy to install on many of the mainstream Linux distributions out there. To get it working on what you use, open up a terminal window by pressing Ctrl + Alt + T or Ctrl + Shift + T on the keyboard. Then, follow the command-line instructions that correspond to the operating system you are currently using.


The Piper app is available to a whole host of Linux distributions through primary software sources. On Ubuntu Linux and Debian, this isn’t true. For whatever reason, the developers behind these distributions haven’t felt it necessary to include them.

Even if Piper isn’t readily available on the Ubuntu official software sources, or Debian’s “Main” repository, it’s still possible to install via Flatpak. So, skip down to the “Flatpak” installation instructions, and soon you’ll have Piper running!

Arch Linux

The Piper application is installable on Arch Linux via the “Community” software repository. To enable this repo, open up “pacman.conf” in the Nano text editor with the command below.

sudo nano -w /etc/pacman.conf

Scroll down the configuration file, look for “Community” and remove the # symbol from in front of it. Be sure to also remove any # symbols from the lines directly below it.

Save the edits done in Nano with Ctrl + O, exit with Ctrl + X. Then, install the Piper application on your Arch Linux PC with:

sudo pacman -Syy piper


Ever since Fedora 29, Piper has been in the primary Fedora Linux software repositories. To install the application on your system, use the Dnf command below.

sudo dnf install piper


For OpenSUSE Leap 15.1, and OpenSUSE Tumbleweed, the Piper application is shipped in the “Oss all” software repository. To install the app, use the Zypper command below.

sudo zypper install piper


Piper is available on Flatpak, which is excellent if you’re on Ubuntu, Debian, or even a lesser-known Linux distribution that doesn’t have the app available in their software sources. To install it, enable the Flatpak runtime on your system, and enter the commands below.

flatpak remote-add --if-not-exists flathub

flatpak install flathub org.freedesktop.Piper

Change LED on a Logitech G series mouse

Ensure your Logitech G series mouse is plugged into your Linux PC. Then, open up the Piper application by searching for “Piper” in the application menu. Once the app is up and running, follow the step-by-step instructions below to learn how to change LED colors.

Step 1: Inside of the Piper app window, find the “LEDs” section and select it with the mouse.

Step 2: Look at the diagram of your mouse for the different LED options available to change, and click the gear icon next to it.

Please note that in this guide, there is only one LED available to change in the Piper application. Yours may be different.

Step 3: In the color menu, there are four different menus. “Solid”, “Cycle”, “Breathing”, and “Off”. Click on the mode that you feel best suits your needs. Then, use the menu to set the LED to use the color you like best.

Step 4: Locate the “Apply” button and select it to set the LED color on your Logitech G series mouse.

Close the Piper application as it is no longer needed. From here, your Logitech G series mouse’s LED color should be set correctly. If it isn’t, unplug and replug in the mouse.

Read How to change the LED on a Logitech G series mouse in Linux by Derrik Diener on AddictiveTips – Tech tips to make you smarter

Daily News Roundup: Slack Will Reset Some User Passwords

Slack is resetting some user passwords after it became apparent hackers stole them in a previous breach. The hackers compromised Slack’s systems in 2015, copied encrypted passwords, and installed code to record plaintext passwords as users entered them.

In 2015, Slack discovered that hackers had compromised its systems. The hackers managed to make their way into Slack’s infrastructure and breach a database that stored usernames and passwords.

Thankfully, Slack properly hashed the passwords, which means they are encrypted and far less useful. Unfortunately, the hackers also installed code that would record plaintext passwords as users typed them in. When Slack discovered the problem, it tightened its security, removed the bad code, and reset passwords for anyone it thought had been affected by the breach.

Recently, someone contacted Slack through its bug bounty program with a list of compromised username and password combinations. The list was accurate, and when Slack investigated, it realized these passwords were in use during the 2015 breach. While the company thought it had discovered all compromised passwords at the time and reset them, that wasn’t the case.

Now, as a precaution, Slack is resetting all user passwords created at or before the 2015 breach. Slack says the reset affects about 1% of users and will contact them directly with instructions for the reset.

If Slack does contact you, you should also change your login details everywhere else if you reuse your passwords. If you do reuse passwords, you should stop. Breaches are now a common occurrence, and the safest thing to do is use a unique randomly generated password for every site. We recommend using a password manager for that purpose. [TechCrunch]

RELATED: Why You Should Use a Password Manager, and How to Get Started

In Other News:

  • Firefox will alert users of breached passwords: Speaking of breached passwords, Firefox wants to make you aware of when your passwords are compromised. If you save your passwords to the browser they will be checked against Have I Been Pwned. If Firefox finds any matches, it will notify you. [TechRadar]
  • A vulnerability in Bluetooth could reveal your location: Your Bluetooth devices are supposed to make secure connections, so only you have access to them. Unfortunately, the way many Bluetooth devices generate random connection information doesn’t prevent bad actors from tracking devices. Someone could place a series of beacons in a location, like in a mall, and track your movements. Android isn’t affected, but iOS and Windows is, and Fitbit is the easiest of all to follow. [Engadget]
  • Google removed apps designed for stalking from the Play Store: Google removed seven apps from the Play Store for violating its policies on commercial spyware. The apps touted that once installed; they could track location, record contacts, call logs, and the context of text messages (including encrypted services like WhatsApp) of a spouse, employee, or children. The apps came with instructions to install on a victim’s phone, then obfuscate the app so the phone’s owner wouldn’t know. Good riddance. [Gizmodo]
  • Microsoft showed off holographic language translation: In a novel HoloLens demonstration, Microsoft showed off a digital translator at the Microsoft Inspire partner conference. The hologram looked remarkably like the presenter and spoke with similar mannerisms as well. But it spoke in Japanese, whereas the presented spoke in English. Microsoft says live translation will be possible with this hologram, although the demo was a staged script. Pretty neat stuff. [The Verge]
  • Google starting to warn about apps not meant for children: Google previously told developers they would have to specify an intended age range for their apps. Now the company is starting to roll out “not designed for children” warning on apps that report an age range above children. Developers can even choose to apply the label proactively. Good stuff. [9to5Google]

The zombifying ant fungus is even more horrible than we already thought.

Read the remaining 5 paragraphs

How to Draw and Edit a Freeform Shape in Microsoft PowerPoint

powerpoint logo

PowerPoint gives you complete customization over shapes—merging shapes, changing the curvature of a shape’s lines, and even drawing your own. If you want to do the latter, here’s how.

Draw a Shape in PowerPoint

If you can’t find the shape you’re looking for, then you can draw your own. To do this, head over to the “Insert” tab and then click the “Shapes” button.

Select shapes in Illustrations group

A drop-down menu will appear. Head over to the “Lines” section and locate the last two options. These options are the freeform shape (left) and scribble (right) tools.

freeform and scribble in shapes

Freeform: Shape

Selecting the freeform shape option lets you draw a shape with straight and curved lines. To draw a straight line, click a point on the slide that you would like to start the line, move your cursor to the endpoint, and then click again.

Freeform straight lines GIF

To draw a curved line, click and drag your cursor.

Read the remaining 16 paragraphs

How to Restrict Data in Google Sheets with Data Validation

Google Sheets Hero image.

If you use Google Sheets to collaborate with others, you can prevent people from typing the wrong data in your spreadsheet’s cells. Data validation stops users from inserting anything other than properly-formatted data within specific ranges. Here’s how to use it.

RELATED: How to Create Shareable Download Links for Files on Google Drive

How to Use Data Validation in Google Sheets

Fire up your browser, head to the Google Sheets homepage, open a spreadsheet, and highlight the range you want to restrict.

Highlight all the cells to which you want to add some data validation.

Click “Data,” and then click “Data Validation.”

Click Data, and then click Data Validation.

In the data validation window that opens, click the drop-down menu beside “Criteria.” Here, you can set a specific type of input to allow for the selected cells. For the row we’ve selected, we’re going to make sure people put in a four-digit number for the year a movie was released, so select the “Number” option. You can also select other criteria, such as text only, dates, a pre-defined list of options, items from the specified range, or your custom validation formula.

Click the drop-down menu next to "Criteria" and select the form of validation you want to use.

Read the remaining 16 paragraphs

What Is Reverse SSH Tunneling? (and How to Use It)

SSH prompt on a laptop
Eny Setiyowati/

Need to SSH to an unreachable Linux computer? Have it call you, then burrow down that connection to get your own remote SSH session. We show you how.

When You’ll Want to Use Reverse SSH Tunneling

Sometimes, remote computers can be hard to reach. The site they are located at may have tight firewall rules in place, or perhaps the local admin has set up complex Network Address Translation rules. How do you reach such a computer if you need to connect to it?

Let’s establish some labels. Your computer is the local computer because it is near you. The computer you are going to connect to is the remote computer because it is in a different location than you.

To differentiate between the local and remote computers used in this article, the remote computer is called “howtogeek” and is running Ubuntu Linux (with purple terminal windows). The local computer is called “Sulaco” and is running Manjaro Linux (with yellow terminal windows).

Normally you’d fire up an SSH connection from the local computer and connect to the remote computer. That isn’t an option in the networking scenario we’re describing. It really doesn’t matter what the specific network issue is—this is useful whenever you can’t SSH straight to a remote computer.

But if the networking configuration on your end is straightforward, the remote computer can connect to you. That alone isn’t sufficient for your needs, however, because it doesn’t provide you with a working command-line session on the remote computer. But it is a start. You have an established connection between the two computers.

The answer lies in reverse SSH tunneling.

What Is Reverse SSH Tunneling?

Reverse SSH tunneling allows you to use that established connection to set up a new connection from your local computer back to the remote computer.

Because the original connection came from the remote computer to you, using it to go in the other direction is using it “in reverse.” And because SSH is secure, you’re putting a secure connection inside an existing secure connection. This means your connection to the remote computer acts as a private tunnel inside the original connection.

Read the remaining 41 paragraphs