How to update WAZUH agent on Raspberry Pi's
sudo cat /etc/apt/sources.list.d/wazuh.list
Download and install SNMP -
sudo apt update
sudo apt install snmpd snmp
Edit your SNMP configuration file -
sudo nano /etc/snmp/snmpd.conf
Example -
# SNMP community string and access settings
com2sec readonly [IP Address of SNMP Poller] [insert clever string here]
group MyROGroup v2c readonly view all included .1 80
access MyROGroup "" any noauth exact all none none
# setup info
syslocation [Location string]
syscontact Me <example@email.address>
Step 1. "sudo raspi-config" then choose Interface Options and Enable "i2c"
Step 2. git clone https://github.com/UCTRONICS/U6143_ssd1306.git
Step 3. cd U6143_ssd1306/C
Step 4. sudo make clean && sudo make
Step 5. sudo ./display
Step 6. Next 2 steps are to ensure this runs at start up every time. If you skip these then it will look like the display is working after a reboot but the second line will be stuck on one stat (mine was stuck on Mem for example)
"sudo nano /etc/rc.local"
Step 7. Add the following below fi:
cd /home/pi/U6143_ssd1306/C
sudo make clean
sudo make
sudo ./display &
(https://github.com/UCTRONICS/U6143_ssd1306)
What a pain! PITA!
Got there in the end. This was me trying to flash a Raspberry Pi Lite image to a Samsung Pro Plus Micro SD card via an Orico USB to SD card adaptor. Brand new card and brand new adaptor as my old one was reading incorrect sizes on old SD cards.
Step 1. Disable Protected folder access in Windows Security settings. It was not enough for me to add a program-specific exception to the list. (Remember to turn this back on when finished!)
Step 2. If you have a half-baked failed etch written to your SD card, open up disk manager (start\run "diskmgmt.msc" and delete any partitions that are there -
Step 3. Reboot your machine. Not sure if this helped or not but my machine locked up completely and after I powered it down and back on again (and followed the previous 2 steps) I got a working etch so who knows!?
Run command C:\> certUtil -hashfile <PATH_TO_FILE> <HASH_ALGORITHM>
e.g.
C:\Users\[user]>certutil -hashfile "c:\Users\[user]\Desktop\2024-03-15-raspios-bookworm-armhf-lite.img.xz" sha256
SHA256 hash of c:\Users\[user]\Desktop\2024-03-15-raspios-bookworm-armhf-lite.img.xz:
4fa99737265ac338a9ed0643f502246b97b928e5dfffa92939242e26e290638d
(Courtesy of https://sandyzeng.com/hyper-v-remove-firmware-file-bootmgfw-efi/)
Here is the simple way delete all the bootmgfw.efi file at once. Use powershell.
$VMName = "Your virtual machine name"
Get-VMFirmware -VMName $VMName |ForEach-Object {Set-VMFirmware -BootOrder ($_.Bootorder | Where-Object {$_.BootType -ne 'File'}) $_ }