Skip to main content


Showing posts from October, 2018

TrueCrypt on macOS X Mojave 10.14

If you have updated your macOS recently to Mojave otherwise known as verison 10.14 you may not be able to install the last version of Truecrypt in order to access your old volumes encrypted with Truecrypt software. This article will guide you to get this working on your MacOS v10.14 (Mjoave) . Download the package from  or . Find downloaded package using Finder in your HDD/Users/username/Downloads folder and will look like  TrueCrypt 7.1a Mac OS X.dmg . Open file location in Finder and open or double click on  TrueCrypt 7.1a Mac OS X.dmg . This will mount Truecrypt 7.1a and will have Truecrypt 7.1a.mpkg in it. Drag the package T rueCrypt 7.1a.mpkg and drop in your Downloads folder. From Locations in Finder you can eject your TrueCrypt mount. Now go to your Downloads location, find the file  TrueCrypt 7.1a.mpkg , right click and select Show Package Contents . Find the file Contents/distribution.di

Bash script and characters that require to be escaped

There are few ASCII characters that need to be escaped when using in certain bash scripts especially when echoing or passing value through variables. What are those characters can be determined using the small bash script below. #!/bin/bash special=$' 0123456789\'-–—!"#$%&()*,./:;?@[\]^_`{|}~¡¦¨¯´¸¿‘’‚“”„¢£¤¥€+<=>±«»×÷§©¬®°µ¶·…†‡•‰¼½¾¹²³AaªÁáÀàÂâÄäÃãÅåÆæBbCcÇçDdÐðEeÉéÈèÊêËëFfƒGgHhIiÍíÌìÎîÏïJjKkLlMmNnÑñOoºÓóÒòÔôÖöÕõØøŒœPpQqRrSsŠšßTtÞþ™UuÚúÙùÛûÜüVvWwXxYyÝýÿŸZz ' for ((i=0; i < ${#special}; i++)); do     char="${special:i:1}"     printf -v q_char '%q' "$char"     if [[ "$char" != "$q_char" ]]; then         printf 'Yes - character %s needs to be escaped\n' "$char"     else         printf 'No - character %s does not need to be escaped\n' "$char"     fi done | sort The output of above script will list characters that need escaping and looks like below. [ me@mysys

Setting up SSH authentication between two linux/unix/macos hosts - quick reference

You have two hosts that you want to set up password-less access between local to remote system. This can be easily scripted and all commands are run from local system using ssh into remote system starting with password but at the end of these commands you will have password-less authentication set up. Tasks on Source System: (Note that  For ESXi 5.x, 6.0, 6.5 and 6.7, the authorized_keys is located at: /etc/ssh/keys-<username>/authorized_keys) ssh-keygen -t rsa ssh remoteuser@remotehost mkdir -p .ssh cat .ssh/ | ssh remoteuser@remotehost 'cat >> .ssh/authorized_keys' ssh remoteuser@remotehost "chmod 700 .ssh; chmod 640 .ssh/authorized_keys" ssh remoteuser@remotehost For two ASW instances we could do following. Call the two systems control and managed, where control machine is your source and managed is remote or target. Log into Control machine and perform following. ssh -i "PRIVATE-KEY.pem" ec2-user@ec2-1-2-3-4.e