How to Install Frostwire on Linux (non .deb or .rpm distros)


Frostwire LogoThat title was a mouthful.

Frostwire is a P2P to client application that you can use to exchange files *wink wink* with other people *wink wink*. For the sake of this article we will ignore the *wink wink* part and stick with the installation process for those of us slumming it outside the world of Ubuntu/Debian and Fedora/Red Hat. Frostwire provides a .deb and .rpm on their website providing our Ubuntu/Debian and Fedora/Red Hat brethren with an easy way to integrate the Frostwire binary into their system.

The news is not all bad for the rest of us. Frostwire does have a .tar.gz file that does not require you to build the source. Instead there is a binary file named “frostwire” that can be run from wherever you extracted the file. For some this is good enough but I’d at least like to have it in my path so I can just type frostwire and it will launch. Is it too much to ask to have it in my menu too? It turns out it isn’t that hard to do just that.

First, you need to download the tar.gz file from From here on out we will be working in the terminal so fire it up and do the following:

[chris@example ~]$ cd Downloads

[chris@example ~/Downloads]$ tar xvzf frostwire-6.3.5.noarch.tar.gz

This will give you a frostwire-6.3.5.noarch folder. You can change directory into that folder and type ./frostwire and you are good to go. Of course, if that is all you are looking for you wouldn’t be reading this. Now do the following:

[chris@example ~/Downloads]$ sudo cp -r frostwire-6.3.5.noarch /usr/share/frostwire

It is not essential to put the frostwire folder in a shared location but it does help if you have multiple accounts on your machine. No matter where you put it you are probably going to want to setup a frostwire.desktop file in /usr/share/applications so you can easily launch the app from your applications menu.

[chris@example ~/Downloads]$ sudo vim /usr/share/applications/frostwire.desktop

[Desktop Entry]
GenericName=P2P Bittorrent client
GenericName[es]=P2P cliente Bittorrent
Comment=Search and explore all kinds of files on the Bittorrent network
Comment[es]=Busque y explore todo tipo de archivos en la red Bittorrent
Exec=/usr/share/frostwire/frostwire %U

Depending on the icon theme you have installed you may need to download the frostwire icon and place in /usr/share/icons and give the full path of the icon.

That’s it! Now us slummers can “legally” exchange files with each other. *wink wink*

HyperFIDO Security Key on Linux


The HyperFIDO Adventure Begins

I have been on a security kick lately. I have been turning on 2-step authentication on everything which has really irritated my wife. I’m planning a post with a list of the tools I use to keep my data secure but for now I’m going to talk about the HyperFIDO Security Key from Hypersecu. I was messing around with the 2-step authentication on my gmail account and saw that there was an option to use a security key. That piqued my curiosity so I headed over to Amazon and found the HyperFIDO for $10. What the heck right? I received the HyperFIDO today and got to setting it up on my personal laptop.

What does a security key do?

A security key is a physical means of 2-step authentication. If you don’t know currently use 2-step authentication stop reading this and go turn it on right now. 2-step basically eliminates attackers ability to gain access to your account through just your password. You can make your password 123456 (don’t do that) and they can enter that at the Facebook prompt but they are not getting access to your account. Instead Facebook will ask for a code from a code generator (I suggest Authy) that the attacker cannot enter without having access to your phone. The HyperFIDO acts as that code generator, for Gmail at least.

It is suppose to work on Linux

I use Linux almost exclusively these days. My personal laptop is running Manjaro Linux with an Ubuntu Linux virtual machine running on that inside of Virtualbox. My work laptop is a Windows 10 box but I’m running Manjaro Linux on a virtual machine on that computer that I have in full-screen mode so I really don’t interact with Windows 10. If work would let me I’d be running Manjaro as the base OS. My reasons for running Linux exclusively are a subject for another post. Needless to say I made sure that this would work on Linux. If you are a Linux enthusiasts you know that it is not always as easy as just plugging it in. This was one of those moments.

Something went wrong

I followed the instructions that Google gave me which consisted of clicking a button and then plugging in the HyperFIDO. When I plugged it in the first time the light came on but nothing happened and eventually the box that had popped up timed out. I noticed then that the HyperFIDO is a bit touchy on my laptop. I had to wiggle it to get it to light up. Once I cleared that up I went searching for a solution. The first stop was the Hypersecu website and there was a download for Linux that included a couple of udev rules. I did as it suggested and moved the udev rules into /etc/udev/rules.d. I rebooted and gave it another try. This time the window that popped up would close quickly and a box would pop up that gave the very helpful message of “Something went wrong”. Back to the drawing board.

Thank you Yubico!

This is a good time to mention that as much as I want to use DuckDuckGo for search (they don’t track you) they just don’t hold a candle to Google. I had been doing my searches on DuckDuckGo and decided to try Google. That is when I ran across a forum post from Yubico, the makers of a competing security key. Somebody in the forum mentioned a file on GitHub that Yubico posted that included more udev rules for several security key makers. You can download it here. I was elated to find that HyperFIDO was among the key makers with listings in the file. I copied the file and put it into /etc/udev/rules.d and discovered that I didn’t have to reboot to get it working. I ran the command sudo udevadm control –reload-rules and I was good to go. Almost. I failed to notice that the entire file from Yubico was commented out. I had to uncomment the first line, the line with the rule for the HyperFIDO and the last line. I ran the udevadm command again and it worked!

How to Create a Local Red Hat Repository


Note: The server that serves as your repository should only serve as a repository.

There are many reasons you may want a local Red Hat Enterprise Linux repository. Bandwidth is a major factor as downloading updates from the Internet can be time and bandwidth consuming. Another reason may be that your servers are not connected to the Internet and thus need to get their updates from a local source. You may have a development environment that you would prefer to not spend money on licenses for but still need to update. Whatever your reason, this tutorial will walk you through the process of getting your local repository setup.

Install packages needed for the repositories

yum install yum-utils createrepo httpd Continue reading

This Article is Garbage


James Clear wrote a fantastic article titled “How to Uncover Your Creative Talent By Using the ‘Equal Odds Rule’.” James Clear explains the “Equal Odds Rule” here:

In 1977, a Harvard-trained psychologist named Keith Simonton, developed a theory that he called the Equal Odds Rule.

“The Equal Odds Rule says that the average publication of any particular scientist does not have any statistically different chance of having more of an impact than any other scientist’s average publication.” [2] In other words, any given scientist is equally likely to create a game-changing piece of work as they are to create something average that is quickly forgotten.

This hit me because essentially I have as good a chance of creating the next viral blog post as anyone else. The problem I have been having lately is the fear of producing what Clear calls “garbage”. I want every post to be that enlightening post that makes you hit the tweet button so that the entire world can know my brilliance! It just doesn’t work like that. Writing is hard sometimes. There are days that I just don’t want to write, I have nothing to say, and I don’t want to waste your time. However, if I really want to create something great I have to practice. As Clear says:

If you want to make a masterpiece, you have to be willing to create a little  garbage along the way.

So here is my piece of “garbage” for today. As I write these final sentences I’m actually quite happy with this post. I have accomplished the goal of educating my audience while working out my writing muscles in the process. Plus I didn’t break a sweat. Brilliant? Hardly. James Clear gets the credit for the brilliance in this post. Make sure you check out his site.

The Case for Auto Direct Messages on Twitter


Auto Direct Messages are NOT Social

I use to hate auto direct messages on Twitter. I would go as far as to unfollow someone if they sent me an automated direct message. Twitter is a social platform after all. Automation is not exactly social. In my mind, if you are sending me an automated message you only want to sell me something and I’m not interested. Alex Howard asked his followers what they thought about automated direct messages and the responses were mixed. Some thought that it was “cheesy” while others didn’t even know that it was an automated message. David Chevalier, Chief Sales Officer of SalesBlend, is completely against the practice. He makes a great point that “What you want to do is tweet valuable information and be helpful.”

Happy Medium?

I set out to test Auto Direct Messages on my own Twitter account. This was half-experiment/half-marketing campaign. I used Crowdfire to setup the automated direct message and here is what my message said:

I hate auto-dms! So why am I sending one to you? I also hate missing opportunities to meet new people. I have nothing to sell you so no worries there. I blog at and I don’t sell anything there either. Don’t be afraid to chat me up especially about tech although I’m a pretty philosophical guy too. What I really want to say is thanks for the follow.

Continue reading

Righting a Bad First Impression


A Very Bad First Impression

A first impression can make or break an opportunity. I am guilty of having some very bad first impressions that probably kept me from connecting with people at a level that would bring about greater success for me, them, and the project we were working on. I’m reminded of my first “All-Hands Meeting” at CNSI where I work as a Senior Infrastructure Engineer. I arrived late to the meeting, which has about 75 people in the room and another 75 on a conference call. The person running the meeting was one of our project managers who I will call “Dale” to protect the innocent. The door was locked so I knocked and when I entered Dale, rather gruffly, told me that if I was going to be late to the meeting that I should just not come. This was pretty embarrassing and I’ll admit I was resentful that he had made such a public scene. After all, I  was new to the company!

Never Disregard Third-party Feedback

I came back to the office and shared with my boss, whom I will call “Chuck”, who was on the conference call and unaware who was late, that I was the person that Dale had “handed his butt” to him for being late. Chuck and I kind of laughed off the entire thing. Later on though, Chuck asked Dale, “What did you do to my Chris?” Dale was confused and Chuck reminded him of the meeting and the impact that it might have left on me. Continue reading

Tutorial – Self-Host WordPress on Google Cloud


Tutorial Introduction

The purpose of this tutorial is show how to self-host a WordPress blog on Google Cloud. Wikipedia provides the following definition of Cloud Computing:

Cloud computing, also on-demand computing, is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.

Continue reading

4 Reasons I Deleted Games From My Phone


The price of anything is the amount of life you exchange for it.

– Henry David Thoreau

Alto's Adventure on my phone

Alto’s Adventure

A few weeks back I made the conscious decision to delete all games off of my phone. I can hear you now. “WHAT??? That is one of the purposes of having one of these exceptionally expensive devices isn’t it?” For me the answer is no. Don’t get me wrong. I love to play games on my phone. My latest obsession has been Alto’s Adventure and trust me it becomes an obsession. The problem is I began to notice that I was missing out on some crucial opportunities that the games on my phone were taking away from me. I decided to list out what I was missing out on and in the end, deleting all of the games off of my phone was an easy decision.

#1 – I want to start a blog!

Continue reading

3 Simple Rules to Live By

3 Simple Rules - 2010 Cross Country Teams

2010 Addison High School Boys and Girls Cross Country Teams

Not too long ago I coached the varsity cross country team at Addison Community Schools. We started with only five total runners (three boys, two girls) and eventually built the team up to over thirty members. Everyone that ever ran for me can attest that I kept a pretty loose reign on the team but that I wasn’t afraid to let them have it to change their behavior. What I didn’t do is present the team with a multi-page list of rules that they had to abide by. Let’s be honest, they wouldn’t have read it anyway. Instead I kept it simple with these three rules that anyone can use to make better decisions every day.

Rule #1 – Be a good person

Continue reading