Moving from WordPress to OctoPress
A few months ago I decided to move my personal site and blog from a WordPress platform to Octopress framework.
OctoPress is a blogging framework based on Jekyll that generates static files and can be managed completely from the command line.
Continue reading →Use SSH-keygen to remove a hostname from known_hosts
If you use SSH on a regular basis I'm sure you've received the warning that the "REMOTE HOST IDENTIFICATION HAS CHANGED". This occurs any time the SSH key for the host you are trying to connect to does not match the key saved in your knownhosts file (The knownhosts file is in the .ssh directory within your home directory by default).
Continue reading →How to fix the "TrueCrypt is already running" error in Linux
I recently ran across an error where TrueCrypt wouldn't start on my computer running Arch Linux. When I tried to run TrueCrypt graphically nothing would happen, but when ran from the terminal I received a message telling me that "TrueCrypt is already running". This error is caused when your last TrueCrypt session didn't close cleanly and left a lock file behind in your home directory.
To remove the lock file just run (Replace YOURUSERNAME with the username for your actual account): rm ~/.TrueCrypt-lock-YOURUSERNAME
Installing Arch Linux on the Raspberry Pi
My brand-new Raspberry Pi was delivered last night. I finally got a chance to start playing with it this evening. The first thing I wanted to do was get my favourite Linux distribution Arch installed.
Here's a quick and easy way to get Arch Linux ARM installed onto the Raspberry Pi.
Continue reading →Blocking SSH Brute Force Attacks in MikroTik RouterOS
Mikrotik makes some great networking equipment for both business, and home uses. I've used Mikrotik routers both while consulting and for my own personal and business use. I use SSH to manage my Mikrotik devices and wanted to be able to detect and block any Brute Force SSH login attempts. Here is a quick and easy way to do exactly that: