SSH key: Permissions 0660 for '~/.ssh/id_rsa' are too open.
If you are trying to login to your remote host using a key but it doesn’t work and you get “Permissions are too open” error then this is for you.
Permissions [xxxx] for '~/.ssh/id_rsa' are too open. It is required that your private key files are NOT accessible by others. This private key will be ignored. bad permissions: ignore key: ~/.ssh/id_rsa Permission of private keys should be set to 600. Run the following two commands from the .…
Read more ⟶
Spotting Lying Liars
This is just a basic run down of gestures and verbal cues that may indicate someone is being untruthful, and not indication that someone is lying, just that they are more likely to be lying.
Physical expression will be limited and stiff. Their movements will be eratic and quick. Sweat and higher heartbeat. Speak quickly, and want to change subject or leave as soon as they can. Change the subject, a liar will follow along willingly and be more relaxed.…
Read more ⟶
Facts about English Words
There are some pretty interesting facts about common (and a few that are not so common) words in English. Here are some you might not have noticed/known:
1 out of every 8 letters written is an e. “Deeded” is the only word that is made using only two different letters, each used three times. “Dreamt” is the only word that ends in “mt”. “Lollipop” is the longest word that can be typed using only the right hand.…
Read more ⟶
Changing/Deleting Product Key for Microsoft Office
Office 2002 - Office 2007 To delete/reset the Product Key of Office 2007 or previous we have to go into the Registry. To open the registry, click Start, and then click Run. Type regedit in the open box and click Ok.
Browse to the following key of the Registry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\\Registration It is a good practice to backup the Registry keys before modifying them so make a backup of that key; Right click on the key, choose Export… and save the file somewhere safe.…
Read more ⟶
VI Editor
vi is a screen-oriented text editor originally created for the Unix operating system. The portable subset of the behavior of vi and programs based on it, and the ex editor language supported within these programs, is described by (and thus standardized by) the Single Unix Specification and POSIX.
Starting the vi Editor The vi editor lets a user create new files or edit existing files. The command to start the vi editor is vi, followed by the filename.…
Read more ⟶
Disable McAfee Endpoint Protection on OSX
There are multiple ways to disable/remove McAfee software. Here are a few simple ways to calm your machine down.
Method 1 sudo /usr/local/McAfee/AntiMalware/VSControl stopoas Method 2 sudo defaults write /Library/Preferences/com.mcafee.ssm.antimalware.plist OAS_Enable -bool False sudo /usr/local/McAfee/AntiMalware/VSControl stop sudo /usr/local/McAfee/AntiMalware/VSControl reload Method 3: Remove files manually rm -f /Library/LaunchAgents/com.mcafee.menulet.plist rm -f /Library/LaunchAgents/com.mcafee.reporter.plist rm -f /Library/LaunchDaemons/com.mcafee.ssm.Eupdate.plist rm -f /Library/LaunchDaemons/com.mcafee.ssm.ScanFactory.plist rm -f /Library/LaunchDaemons/com.mcafee.virusscan.fmpd.plist rm -rf /Library/Application\ Support/McAfee rm -rf /usr/local/McAfee shutdown -r now Method 4: Uninstall sudo -s cd /usr/local/McAfee/ .…
Read more ⟶
Manipulate Images from Linux Terminal
One of the simplest ways to modify images from terminal in Linux is with ImageMagick utilities. To install ImageMagick on debian/ubuntu, run sudo apt-get install imagemagick.
ImageMagick tool can perform many operations on images. Here we will go over just a few:
Converting image format One of the simplest things you can do with images is convert the format. Here we will modify a PNG image to a JPG.
# PNG file we are operating on $ file a.…
Read more ⟶
Add Google+ Comments to your website
Adding Google+ comments to a site allows your viewers to share your content on Google+. This is a similar service as Facebook comments with some minor differences.
One of the big differences is that all comments from Google+ will appear in your commenting system. This means that conversations that are happening in different places like your personal Google+ page, community pages, others pages who have shared your content, all will be visible together in the same place under your posts.…
Read more ⟶
Linux Authentication with SSH keys only
SSH key authentication lets users log into servers without the need to use their user’s passwords which increases security.
Step 1: Create a key (if you don’t already have one) ssh-keygen -t rsa Note: for extra security, add a passphrase to your key when prompted. Step 2: Copy the key to your server cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys Step 3: Disable root login and password login for users Modify /etc/ssh/sshd_config configuration file to include the following (if not already there):…
Read more ⟶
Docker - free up space
WARNING: commands below delete stopped containers and remove all their data. Make sure you don’t have any containers or valuable data that you need to backup.
Remove exited containers When a docker container exits, it leaves the stopped container on the system. Below command will remove that stopped container.
docker rm -v $(docker ps -a -q -f status=exited) Remove dangling images Docker keeps all of the images that you have used in the disk (local cache), even if those are not actively running.…
Read more ⟶