Moving from WordPress to OctoPress

January 28, 2014

A few months ago I decided to move my personal site and blog from a WordPress platform to Octopress framework.

OctoPress is a blogging framework based on Jekyll that generates static files and can be managed completely from the command line.

Continue reading →

Use SSH-keygen to remove a hostname from known_hosts

August 26, 2013

If you use SSH on a regular basis I'm sure you've received the warning that the "REMOTE HOST IDENTIFICATION HAS CHANGED". This occurs any time the SSH key for the host you are trying to connect to does not match the key saved in your knownhosts file (The knownhosts file is in the .ssh directory within your home directory by default).

Continue reading →

How to fix the "TrueCrypt is already running" error in Linux

August 25, 2013

I recently ran across an error where TrueCrypt wouldn't start on my computer running Arch Linux. When I tried to run TrueCrypt graphically nothing would happen, but when ran from the terminal I received a message telling me that "TrueCrypt is already running". This error is caused when your last TrueCrypt session didn't close cleanly and left a lock file behind in your home directory.

To remove the lock file just run (Replace YOURUSERNAME with the username for your actual account): rm ~/.TrueCrypt-lock-YOURUSERNAME

Continue reading →

Installing Arch Linux on the Raspberry Pi

December 2, 2012

My brand-new Raspberry Pi was delivered last night. I finally got a chance to start playing with it this evening. The first thing I wanted to do was get my favourite Linux distribution Arch installed.

Here's a quick and easy way to get Arch Linux ARM installed onto the Raspberry Pi.

Continue reading →

Blocking SSH Brute Force Attacks in MikroTik RouterOS

October 14, 2012

Mikrotik makes some great networking equipment for both business, and home uses. I've used Mikrotik routers both while consulting and for my own personal and business use. I use SSH to manage my Mikrotik devices and wanted to be able to detect and block any Brute Force SSH login attempts. Here is a quick and easy way to do exactly that:

First Things First

Continue reading →