TurnKey WordPress Footer Modification

Here is how you modify your TurnKey WordPress Footer.

First you need to log into your webmin console.  Usually https://x.x.x.x:12321 but check your Config Console on your VM appliance to be sure.


I found the best way to do it other than CSS, because non-CSS pages will still have this footer message:

1. Login to webmin using your root account. (From above step)

2. Under the Servers tab go into Apache.

3. Click Default server.

4. Under Per-Directory Options click Location /

5. Click Edit Directives.

6. Delete all the stuff in that box. Save and restart apache/ click apply changes.

7. Reload your webpage, you might need to clear your cache.

Categories: Uncategorized | Leave a comment

PHP Comment Out code in a template file like WordPerss

<?php /* the_content(Continue Reading...); */ ?>

Source: http://codex.wordpress.org/Commenting_Code
Categories: Uncategorized | Leave a comment

TurnKey WordPress won’t Auto-Update

I downloaded a pre-built VM from TurnKey, and first thing I saw when I logged in was a message telling me to update my wordpress.  No problem. I clicked on the link in the update message and click on update.  ERROR.

Turns out there is a permission that needs to be set:

chown -R www-data:www-data /var/www/wordpress

Voila, I’m set.

Categories: Uncategorized | Leave a comment

SonicWall NSA 2400 – VPN to Client With More Than One Network

How to add a VPN (not site to site) when there are more than one network on the firewall.


1. Add sub network on your interface you want to VPN users to access.

2. Add DHCP Pool in the new network that is on the sub interface for VPN users

3. Add Nat from sub network to new network.

Here’s How I did it on mine:

1. Network > Interfaces

– Add Interface



2. Add Nat


3. Add DHCP Pool:

Network > DHCP Server:


Configure VPN > DHCP over VPN:

Set Relay IP Address:




I had previously setup the VPN, per SonicWall documentation, but here is my setup for reference.  Make sure you setup your user with the correct groups such as “VPN Group” for Global VPN Client, and “SSL VPN Services” for SSL VPN Nodes.  (Check under System > Status for licensing information.)










Categories: Uncategorized | Tags: , | Leave a comment

Systems / Network Administrator Tasks Checklist

Stuck in the Server Room AgainHere’s a list I find useful to help remember many of the things a sys/network admin should do, some which are needing to be done even before getting up in the morning.  Some may be more pertinent than others…  This is a living list.  Applies to general systems and networks administration.

An effort to KNOW your network and the systems you manage better, before something crashes down on you.

First Things First:

  • Check servers and networks
    • Are they doing what they were built for?  What services are down? (Implement quality management tools, to help monitor and log services)Check event logs
  • Check Event Logs
    • Application log, security log, system log, web-db-app log, directory services log
  • Address urgent needs to incidents that happened overnight, due to outages, weather, users, etc…
  • Organize and Update the TO-DO Priority list (Check Calendar for events that impact IT)
  • Verify Backups
    • Successful File backup
    • Successful Active Directory backup
  • Visual inspection of equipment.  Look and watch for any issues with the network and server hardware.
  • Check all drives for adequate free space.

Through the Day:

  • Break/Fix List – Keep up with the End Users and requests
    • Keep users updated to the progress you’re making on issues that have not been fully resolved.
    • May be beneficial to have a ticket tracking (SLA) solution
  • Projects – Keep up on projects, give supervisors regular updates
  • New Hardware Installation
  • Old Hardware Surplus/Disposal
    • Destroy data from old hard drives.
  • Continue to Learn:
    • Read industry journals and websites.
  • Servers: Verify free disk space, memory usage, processor usage, (Virtual Memory) paging file usage

Through the Week / Month:

  • Maintain Systems
    • Perform updates – Firmware, OS, AV, Services, etc…
    • Run diagnostics
    • Test patches and hotfixes
    • Install patches and hotfixes
  • Schedule downtime for Reboots, updates, upgrades.
    • Could be the same time every week, taken if needed.
  • Maintain Users and Groups
    • Verify Security
    • Clean-ups
  • Compare system configuration files against a baseline for changes
    • Hosts, lmhosts, VPN settings, DHCP, etc…
  • Documentation of tasks and processes that are happening in the network
  • Diagram network
  • Security Audit
    • Antivirus, Network, Accounts, etc…  Is your network secure, how do you know?
    • Self-Assessment Review – Run tools/utilities to see what’s open and at risk
  • Training to others and to self
  • Offer an hour or so a week to help other’s off your network via forums to find answers. This is a great way to learn.
  • Check for Updates – Software, Hardware, Firmware, etc…
  • Verification of other misc. services
  • Keep users informed of outages, etc… ahead of time, so they can plan
  • Perform Monthly Backups
  • Run password cracking tool (Domain Controller and other sensitive systems)
  • Check to see if better services are available from your providers, price changes, etc…
  • Run scan to find files with passwords
  • Perform Server Time Clock Sync
  • Perform network sweep to find rogue access points
  • Perform Diagnostics on non-systems equipment
  • Check for unnecessary services that are running
  • Restore a file and check restore procedures to make sure data is recoverable
  • Perform special audit per site’s audit procedure
  • Review hardware and compare/update Inventory / Asset lists
  • Update service account passwords
  • Check for suspicious activity

Other Tasks to Be Aware Of:

  • Often, check to see if your processes are efficient, and if they can be improved, bettered
  • Check to see how your DNS (namebench from Google) is performing
  • Servers: Maintain a knowledge base of common and major issues seen in the event logs
  • Research new technologies and ideas: Virtual, Soft, Hard, etc…
  • Participate in local tech forums, get to know others in your field, give input
  • What policies need to be updated, keep a list, you’ll be asked for it
  • Know how your users use their equipment and software, this knowledge comes in handy when making changes
  • Ask yourself, (maybe send a survey if needed), are users happy?  If not, why?  How can it be addressed?
  • Study Listening and Communication for the role in which it is critical in your job
    • Study professionalism
    • Study troubleshooting techniques
  • Strive for 100% uptime
    • Have contingency plans and backups for data, internet, power, hardware, etc…
  • Invest in yourself and challenge yourself to work smarter everyday
  • What projects have been shelved in the past are they worth looking at again with a different point of view, and newer solutions?
  • Install a hammock in the server room, you never know when that restore job is going to really finish

Other Sources:

Categories: Uncategorized | Leave a comment

Networks of the Future – SDN w/ OpenFlow

Software Defined Networks with OpenFlowOpenFlow


TIA Now Interview w/ Martin Casado OpenFlow Creator: http://goo.gl/uW0K8W

SDN in a nutshell: http://goo.gl/fduM16

Categories: Uncategorized | Leave a comment

iPhone Dialer Codes, not so secret anymore…


*3001#12345#* and tap Call. Enter Field Mode – Field mode shows the technical cellular specs of your phone.

*#06# Displays the IMEI – IMEI is the unique identifier your phone uses with the Cellular Provider.  Together with the Sim information, you’re ready to get onto the providers network.

*777# and tap Call. Account balance for prepaid iPhone.

*225# and tap Call. Bill Balance. (Postpaid only)

*646# and tap Call. Check minutes. (Postpaid only)

*#21# and tap Call. Setting interrogation for call forwards. – Discover the settings for your call forwarding. You’ll see whether you have voice, data, fax, sms, sync, async, packet access, and pad access call forwarding enabled or disabled.

*#30# and tap Call. Calling line presentation check. – This displays whether you have enabled or disabled the presentation of the calling line, presumably the number of the party placing the call.

*#76# and tap Call. Check whether the connected line presentation is enabled or not. – State whether the connected line presentation is enabled or disabled. Presumably similar to the calling line presentation.

*#43# and tap Call. Determine if call waiting is enabled. – Displays call waiting status for voice, data, fax, sms, sync data, async data, packet access and pad access. Each item is either enabled or disabled.

*#61# and tap Call. Check the number for unanswered calls. – Show the number for voice call forwarding when a call is unanswered. Also show the options for data, fax, sms, sync, async, packet access and pad access.

*#62# and tap Call. Check the number for call forwarding if no service is available. – Just like the previous, except for no-service rather than no-answer situations.

*#67# and tap Call. Check the number for call forwarding when the iPhone is busy.- And again, but for when the iPhone is busy.

*#33# and tap Call. Check for call control bars.- Check all the usual suspects (voice, data, fax, sms, etc) to see whether barring is enabled or disabled for outgoing.

Source: http://www.tuaw.com/2007/07/12/more-secret-iphone-codes/

Categories: Uncategorized | Leave a comment

Why Are Some Quarters Painted?

Have you ever seen an old quarter painted like this in your change?1987D_Red_Quarter

Here are a few of the more plausible answers thanks to lenpezo.com:

They’re old test coins. In the past, repairmen used them to check out the coin-operated pay phones, vending machines, and laundromat washers they were fixing in order to avoid being accused of stealing. That sounds plausible to me.

They were “house” money. Red quarters are sometimes used by business owners as perks; they give them to their preferred customers for free plays on the coin-operated pool tables, pinball machines and video games. Red quarters were also used by waitresses to “prime” otherwise quiet jukeboxes in order to encourage other patrons to add their own quarters and keep the music coming.

Somebody painted it as a sign of defiance. According to Answers.com, the red coins were part of a campaign in the 1970s to protest New Jersey officials’ decision to increase the toll on the Garden State Parkway from 15 cents to a quarter.

They were once used for free laundry.  For some apartment managers, free laundry is apparently a fringe benefit. Landlords will often give their building supervisors red quarters for use in the apartment laundromats. The managers would get their quarters back when the owner or laundromat vendor removed the cash from the machines.

Categories: Uncategorized | Leave a comment

Why are there Bibles in Hotel Rooms?

You know the ones, that book you find in your drawer at the hotel.images

In 1898, John H. Nicholson stayed at the crowded Central Hotel in Boscobel, Wisconsin. The place was so crowded that he had to share a room with another person named Samuel E. Hill. They got to talking, as you might do if you were sharing a room with a stranger, and discovered that they were both Christians. That evening, they prayed together and talked about creating an association of traveling Christian businessmen.

In 1899, they put the idea to practice. Adding another to their number—William J. Knights—the men headed a meeting at a YMCA with the purpose to create an association of men who wished to achieve “mutual recognition, personal evangelism, and united service for the Lord.”

Initially, the three men mentioned above were the only people in the association because they were the only people who actually attended the meeting. Hills was named President, Knights Vice President, and Nicholson took on the roles of both treasurer and secretary. With that done, the men decided their new organization needed a name, and what better way to come up with one than to pray to God to lead them to the best one? The prayer apparently worked, or Knights simply had an epiphany, because not long after the prayer he directed the other two men to the Old Testament story about Gideon and declared, “We shall be called Gideons.”

Gideon’s story is recorded in the Hebrew Bible’s Book of Judges, chapters 6-8. He isn’t the most obvious of namesakes for a band of Christian men—one translation of his name is “destroyer.” However, Gideon was a man who was charged by God to lead a relatively small number of men (300) against a drastically larger army, and he was able to beat them. Gideon was a fitting namesake for the tiny organization who had big dreams. Gideon International says that the organization tries to keep with Gideon’s mindset… No, not hunting down and killing a massive army of Midianites, but willing to do God’s work at any time and in any way He intends it to be done.

Over the next few years, the Gideon Association gained more members, almost all of whom were travelling Christian businessmen who spent a lot of time in hotel rooms. The topic of becoming more effective witnesses in hotels arose, and in 1908 The Bible Project was adopted. The project was proposed by one of the association’s trustees who believed that the Gideons should make it their goal to put a Bible in every hotel room in the United States because it “would be a gracious act, wholly in keeping with the divine mission of the Gideon Association.”

Though the Bible Project was adopted in Louisville, Kentucky, the first Gideon Bible was actually placed in a hotel in Superior, Montana in 1908. Since then, more than 1.8 billion Bibles have been placed in hotels throughout the United States and in over 190 other countries, written in over 90 different languages.

But how do all of these Bibles get into the hotel rooms, and who pays for them all?

The Bibles are paid for entirely by donations to the group, and donations likely stem from individuals or churches who support the Gideons’ cause. As for how the Bibles end up in the hotel rooms, the Gideons will ceremoniously present a Bible to a hotel manager upon the opening of a new hotel. They then provide more than enough Bibles for each hotel room, to be distributed by the hotel staff. The Gideons will also provide replacements for Bibles that are worn or “missing”—the Gideons don’t believe that any of their Bibles have ever been stolen from hotel rooms; they are simply taken by those in need, and that’s counted as a success in their mission to spread the word of the Lord.

Supposedly, it is estimated that about 25% of people who stay in hotel rooms actually read the Gideon Bible provided to them. As Gideon International estimates that each Bible has a lifespan of roughly six years, that means that each one is read by roughly 2300 people during its hotel room stay. The numbers are based on research conducted by Gideon through the hotel industry. The Bible Project has done so well that a number of other religions have started providing literature to hotels. As such, you may find a Koran or the Book of Mormon next to your Gideon Bible at your next hotel stay.

Read more at http://www.todayifoundout.com/index.php/2013/07/why-there-are-bibles-in-hotel-rooms/#SIQTILUigUCM99TU.99

Categories: Uncategorized | Leave a comment

Create a free website or blog at WordPress.com.