I’ve been getting my television on the internet for years now. It just makes sense. It’s HD, it’s commercial free and it’s well… free.
Hell I would pay for this kind of service assuming I could get it. Netflix is close (well not in Canada) but it’s still no cigar.

I’ve been also using Usenet for years. $8 a month so I don’t have to maintain a ratio/deal with seedboxes/public trackers/etc? Where do I sign?

Team those 2 with an RSS feed and you have a pretty decent PVR.
Until you install Sickbeard. No more fiddling with show titles, quality, propers etc. Sickbeard automates it all. You enter in your SABNZBD credentials (which already have your usenet credentials) and a show name. It then automagically downloads new episodes. It can even download recent old episodes. It also looks through your previously downloaded episodes and makes sure you have them all.

I’ve been using it for all of 1 day now and it’s the best thing I’ve used since SAB.

My show list is a bit skimpy for now since it does take a good bit of time to add and index shows, plus I’m at a remote location.
When I get a little more permanent again, it’s going to get my full show list and collection.

Bottom Line: Go signup for usenet, install SABNZBD+, Sickbeard and start adding shows.
Might as well kiss that remote good bye.

 

DRM free too.
http://www.humblebundle.com/

See! I buy games. If these were DRM infested, I wouldn’t go near them with a 20ft pole. BECAUSE they are DRM free I am supporting the developer.

I’m a proponent of Piracy. Insert the “Why!?!? You’re stealing from hard working developers!” from the MAFIAA. Simple: There’s no satisfaction guarantee. If I buy a toaster and it sucks because the bread I use doesn’t work with it, I can return it and get a full refund.
Or if it has an undocumented feature of telling me that I can no longer use my deep fryer, I can tell it to go to hell.
No such luck with the Music/Movie/Game/Application community. Once I buy it, it’s a final sale. In fact… it’s so NOT mine that in some instances I can have stuff I’ve legitimately paid for revoked from me without a refund or recourse.

I lost my Steam account a while back because I got screwed by a prepaid credit card. I used it to buy some games on Steam and they somehow forced the transaction even though there wasn’t enough to cover it. Due to some bad math (and underestimation on fees associated with cross border purchases) the card ended up being a few bucks overdrawn. So the prepaid card company initiated a chargeback. Steam doesn’t like chargebacks. So they revoked my account with literally THOUSANDS of dollars worth of games. It wasn’t enough that it was an honest mistake and I could repay it, I had to find a way to add money onto a prepaid credit card that was already closed. To make a long story short, I managed to pull it out of my ass and I have a reinstated account.

Piracy puts me in control. If I feel the content is worthy of continued use, I will pay for it. Otherwise off to /dev/null it goes.

Oh and LOL at the suckers that actually paid for not so quality content and also bit in the ass with something as hilarious like UBISoft’s new DRM platform that demands a constant internet connection.
At least something like Steam is non-intrusive DRM that has an offline mode.

Hear that UBI? I’m actively NOT purchasing your content based on your choice of DRM. I was seriously considering buying Settlers 7 while it was on sale on Steam. That and a few other games. Notice that they’re not on my Steam Games list?
That goes for any other developer that thinks DRM is a good idea.
I did accidentally buy Flock! that did include Securom, but that was due to my own personal negligence. Whoops.

Anyway…. this post has become about DRM and how evil it is.
Go support some devs that do the right thing.
Oh and pay more than $0.01 you cheap jerks.

 

My dedicated server host provides free SSL certs and I have a few built up at my domain registrar too, so I’ve been securing everything I can with an SSL cert. Why? Why not?

Anyway…. most things that support SSL outside of web servers don’t have an entry for certificate chains. Documentation on how to work with these chains is basically non existent. Well here’s some documentation.

When you get cheap certs, you most likely get 2 files: One with a .crt and one with a .ca-bundle.
This is useless unless the product you’re using it on supports certificate chains. So what do you do? You stack the certs yourself.

Open a new file. Take the contents of the .crt file and paste it in.
Now take the contents of the .ca-bundle file and paste that directly below.

Your file should now contain a bunch of
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----

with a bunch of random crap in between. It’s not actually random crap, but it’s easier than describing what it actually is.

MAKE SURE!!! that your .crt contents is on top of the .ca-bundle contents.
I had it backwards and was fighting with it until I tried swapping it.

 

http://www.chattanoogagig.com/

Gigabit to home
three hundred fifty a month
I have a boner

(LOL Haiku)

Oh and it’s symmetrical.
And uncapped.
In Tennessee.

WHAT. THE. FUCK!

 

So apparently after updating PHP on my webserver running Apache2, Apache decides to start downloading php files instead of parsing them.

A BUNCH of Googling later turns up nothing relevant. I’ve tried the whole uninstall/reinstall bit and checked every config file I could see that was mentioned within the last 2 years without any luck.

Long story short, I found some obscure post somewhere random that linked the Apache wiki:

http://wiki.apache.org/httpd/DebianPHP

*facepalm*

I can’t believe it was that easy…..
Now… the issue is that this blog is my own personal database for shit I (publicly) want to note later If something goes wrong later, I’ll be looking here. But if something is wrong here… I’m boned.

/doh

 

 

So I was having an argument with someone over Vent (which sucks btw, but it’s what my guild uses) about browsers. I was like Failfox wins for fattest browser.
I then noticed that Chrome was using a bit of memory.

I think “a bit” is a bit of an understatement. 2 975 044kB for 24 windows.

WTF IS THAT SHIT?!??!?!??!

 

First, a little history:
I’ve installed OpenVPN NUMEROUS times on various OSes. It’s usually a lesson in tearing my hair out. Don’t get me wrong. OpenVPN is fucking AWESOME!
My problem is that all the guides etc to get it going are either 4 years old, not applicable or missing some things. I’ve built and rebuilt servers over and over and EVERY time I fucking forget something. So I’m documenting it so I don’t have to swear as much next time.

Here’s how to build a server yourself:

Shit you’ll need:
-A server. Doesn’t matter what kind of server. Unless you have over 9000 people, this should be a VPS. I used a Xen VPS because OpenVZ sucks ass.
-Debian Lenny on said server. I used 64bit. You should too.
-OpenVPN (duh)
-A public IP. You can probably get away with NAT, but I have a real VPS. You should too. They’re cheap. And will pwn anything hosted locally in terms of speed.

Protip: Make a user so you don’t have to do all this in root. I’m too lazy to add in “sudo” to all my code here, but you should be. I’m not typing out more characters than I need. Oh and I do understand the irony of typing all this but not an extra 4 letters. Do as I say, not as I do.
Oh and replace anything in [] with appropriate info.

apt-get update && apt-get upgrade
apt-get install liblzo2-dev and libssl-dev
wget http://swupdate.openvpn.net/community/releases/openvpn-2.2-beta3.tar.gz

Protip: Don’t forget to change the version number to the latest one. This is the one I built with. If you’re not comfortable forging new territory, the one above works. Oh and change all the dirs below if you do change the version.

tar zxvf openvpn-2.2-beta3.tar.gz
cd openvpn-2.2-beta3
./configure
make
make install

make may take a while. Go grab a donut.

Now, copy the contents [where you downloaded openvpn]/easy-rsa/2.0/ to /etc/openvpn/ca/
Edit the last bunch of lines in

vars

to reflect your info. I also used 2048 for KEY_SIZE, but that’s optional.

Now do:

. ./vars
./clean-all
./build-ca
./build-key-server server
./build-dh

Now, copy [where you downloaded openvpn]/sample-config-files/server.conf to /etc/openvpn/server.conf

Uncomment the following

;local a.b.c.d
;client-config-dir ccd
;client-to-client (optional) 
;tls-auth ta.key 0 # This file is secret
;user nobody
;group nobody
;mute 20

and change the following:

"local a.b.c.d" to "local [server ip]"
"dh dh1024.pem" to "dh dh2048.pem"

Now, create some symlinks to your keys directory:
Protip: You don’t have to do this, it’s just easier than keeping 2 copies of keys. This way everything is in the keys directory.

ln -s /etc/openvpn/ca/keys/ca.crt ca.crt 
ln -s /etc/openvpn/ca/keys/dh2048.pem dh2048.pem 
ln -s /etc/openvpn/ca/keys/server.crt server.crt 
ln -s /etc/openvpn/ca/keys/server.key server.key 
ln -s /etc/openvpn/ca/keys/ta.key ta.key

Now, build a set of certs for your user(s).

./build-key [user] 

Now, copy [where you downloaded openvpn]/sample-config-files/client.conf to somewhere local. To make things easier, name it the same thing you named it above. Open it up and do the following:

Change:

"remote my-server-1 1194" to "remote [server ip] 1194"
"ca ca.crt" to ";ca ca.crt"
"cert client.crt" to ";cert client.crt"
"key client.key" to ";key client.key"

Now, replace the stuff in [] with the appropriate file.
Protip: Don’ copy the entire cert, just the stuff between the BEGIN and END.

Add:

key-direction 1

<ca>
-----BEGIN CERTIFICATE-----
[ca.crt]
-----END CERTIFICATE-----
</ca>

<cert>
-----BEGIN CERTIFICATE-----
[client1.crt]
-----END CERTIFICATE-----
</cert>

<key>
-----BEGIN RSA PRIVATE KEY-----
[client1.key]
-----END RSA PRIVATE KEY-----
</key>

<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1---
[ta.key]
-----END OpenVPN Static key V1-----
</tls-auth>

Ok, now it’s time to start the server. Change to

/etc/openvpn/

and

openvpn server.conf

Start your client with the above config. Now ping 10.8.0.1.
If it works, you’re in. If you want to do more, keep reading.

Now, I don’t know what you use your VPN for, but mine is for when I travel. I don’t want people snooping on mah traffic. Here’s how you do it.

First off:

cat /proc/sys/net/ipv4/ip_forward

If it displays as 1, you’re golden. If not, edit /etc/sysctl.conf and look for

net.ipv4.ip_forward=0

and make it look like

net.ipv4.ip_forward=1

And then:

iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE

Since iptables doesn’t save between reboots, we’ll make it:

iptables-save > /etc/iptables.rule

Stuff this into /etc/rc.local

cat /etc/iptables.rules | iptables-restore -c

Since we’ve set up client config dirs, it makes giving “User A” and “User B” different configs.
You can just uncomment

push "redirect-gateway def1"

in server.conf and be done with it, but we may as well do it right the first time.

now make the directory:

/etc/openvpn/ccd/

Make a file in it named [user] and shove this in it:

push redirect-gateway def1
push "dhcp-option DNS 4.2.2.1"
push "dhcp-option DNS 4.2.2.2"

This way when [user] connects, he gets speshul privileges that no one else does.
Now rinse and repeat for additional users.

Oh and if you want to be REALLY lazy, you could just

apt-get install openvpn

, but building it from scratch isn’t that hard.

© 2012 The Mind of DH Suffusion theme by Sayontan Sinha