How to ignore SSL errors in Perl LWP modules

Use the following line to the begining of your perl script to have LWP module ignore SSL certificate errors in your scripts:



LWP 6 makes hostname verification the default -- so note this from LWP::UserAgent:

Enabling JFFS/JFFS2 Filesystem on DD-WRT from command line

nvram set jffs_mounted=1
nvram set enable_jffs2=1
nvram set sys_enable_jffs2=1
nvram set clean_jffs2=1
nvram set sys_clean_jffs2=1
nvram commit

Setting up a PHP development environment for Dreamweaver

The content of this article is based on:


This tutorial describes how to set up a development environment on a Windows or a Macintosh computer for building PHP web applications with Adobe Dreamweaver and a MySQL database server.

Drupal and Dreamweaver CS5

Original Article this is information is taken from:

Juniper Netscreen ScreenOS Dial-in VPN config with DD-WRT client using vpnc

"route-based dialup VPN (dynamic peer) with shared IKE ID" works just
fine with vpnc ... alas, the "Concepts & Examples ScreenOS Reference
Guide" (downloadable from Juniper Networks, without any registration,
AFAIR) doesn't provide a canned configuration.

The following is an extract from one of my older lab setups (SSG-20,
ScreenOS 5.4), and while it may (and probably will) not work out of

How to add MIBs to the net-snmp package

Adding a MIB to the client-side tools has two main effects:

  • it allows you to refer to MIB objects by name
    (rather than having to use the numeric OIDs)
  • it allows the results to be displayed in a more immediately meaningful fashion. Not just giving the object names, but also showing named enumeration values, and interpreting table indexes properly (particularly for string and OID index values).

There are two steps required to add a new MIB file to the tools. Firstly, copy the MIB file into the appropriate location:

Juniper ScreenOS Multiple Proxy ID support on a Route-Based VPN


Function of a new feature "Multiple Proxy ID support on a Route-Based VPN"


Problem or Goal:

Linux Active Directory Authentication using Winbind

Tested with Active Directory 2003 and RHEL 6.0

What we want to do :

- authentication against AD using Winbind and Kerberos
- allowing local and remote (SSH) authentication to members of a specific AD group (linuxadmin)
- allowing members of linuxadmin to use sudo
- UID/GID mapping against AD
- user homedir will be created at first log using pam_mkhomedir
- still possible to log in using local accounts, in case AD is unavailable

Check if resolution works :

Samba How-To Notes Chapter 28: PAM distributed authentication Advanced Configuration

Chapter 28: Samba How-to Chapter 28: PAM Distributed Authentication Advanced Configuration  

VoIP / SIP Call Diagnostics


Subscribe to RSS