I wanted OpenVPN to autologin on one of my servers. The issue here is two fold: UAC grabs the executable and demands confirmation, and the gui doesn’t retain credentials. The solution to the latter does unfortunately require storing those credentials plaintext in a file, but if you’re not worried about that then read on. Continue reading
Here’s an easy way to check. Insert this into your client as a download:
Then check your tracker status. For example, in Deluge the tracker status appears thusly:
Got an app you want to work only when connected to VPN? Have Windows Firewall do the work for you
First, connect to your VPN. Then, ensure that your Public connection is that VPN connection. You can do this by opening Network and Sharing Center. In the example below, clicking on Ethernet 3 on the Unidentified network reveals the VPN IP address.
So there’s nowhere in its OS to schedule a reboot of ZyXEL’s C1000Z router. Thankfully you can use Telnet to do it.
First, enable Telnet. Log into the router, then choose Advanced Setup > Remote Console. Under Console State choose LAN Telnet Enabled. Set your Telnet username and password and click Apply.
Now you’re ready to go. Create a .vbs file and populate it with the below, changing the IP address, username and password to be applicable to your router.
set oShell= Wscript.CreateObject("WScript.Shell")
oShell.Sendkeys "open 192.168.1.1~"
Save this file. You can double click it to test it. After having confirmed it works, create a task pointed to it in Windows Task Scheduler. Modern Windows OSes should natively run a vb script in scheduler. If not, use CScript to launch the script:
I use the mighty Pi-Hole to streamline my browsing experience. Sometimes, though, the ole Hole can get in my way, blocking something I need to see. If it’s a one time deal, and not something I want to whitelist (which Pi-Hole has thankfully made easy to do via the web interface as of the latest edition), I wanted an easy way to temporarily switch DNS servers.
Enter QuickSetDNS, a groovy little exe that can do just that. Download QuickSetDNS and unpack it into the destination of your choosing. There’s no installer – it’s a simple standalone exe. Fire it up, right click in the whitespace and create a new DNS server entry. I’ve got one for my Hole, and one that points to Google’s public DNS servers.
After creating your entries, right click on one and choose Copy SetDNS Command Line. Then right click on your desktop and create a new shortcut. Paste the SetDNS command line in for the location of the shortcut and click Next. Name it something informative, and save it. Do the same with your other DNS entries in QuickSetDNS.
There. Now you have shortcuts you can double click to change your local DNS settings.
Facebook stopped using XMPP awhile ago. Get FB chat back in Pidgin with the purple-facebook plugin.
You know what’s groovy? Godmode.
In Windows 8 and 10, create a directory (anywhere, but I put it on my desktop) named
In Windows 8 name it
At my POE we use virtual printers for all manner of file production. It’s annoying. What’s more annoying is when it’s time to upgrade a server using virtual printers. Thankfully there’s a way to sorta kinda help the process, by sorta kinda easing the migration process. The following screenshots are from Windows 2012 R2. If you’re using a different Windows OS level your mileage may vary. It’s my understanding that the titles of some of this differs by OS.
Pi-hole is awesome, but sometimes it works too well. For instance, my wife wants to watch the recipe videos on the Food Network site, and because of embedded ad content they get pi-holed. Here’s how to whitelist domains:
First, you know that your pi-hole has a web interface, yes? Point a browser to http://[thepiholeIPaddress]/admin/index.php to get to it. From there you can check out the query log, which you’re gonna need. If you find the log all full up and cumbersome, you can empty it. Hop on your pi and, in a Terminal session, run:
This will zero out the query log file. Now use your browser to hit the site containing the data you want whitelisted. You’re going to want to make sure that traffic other than your own is at a minimum while you do this, or you’re going to be seeing a lot of information in the log that isn’t applicable to the browsing you are doing. Anyway, these days sites pull from a variety of domains, so you can’t just assume whitelisting the domain of the url will be sufficient. For example, to get videos to work on the Food Network site I had to whitelist assets.adobetm.com.
Once the page has finished loading check the query log. In it you’ll see both allowed domains and those that have been pi-holed. Make a list of the holed domains; you’re going to have to add them your whitelist individually and then test to find the one you’re after. To add a domain to the whitelist, open the whitelist (again in Terminal) in nano:
Use your arrow keys to navigate to the bottom of the whitelist and then add your domain. At this time, wildcards are not supported in this list. Once you’ve added the domain, save the whitelist via ctrl+o. Then open a second Terminal session and reload your pi-hole’s settings by executing the following:
Once reloading has completed refresh the page containing the data you’re trying to whitelist. If you’ve achieved success, close your Terminal sessions (you can exit out of nano with ctrl+x) and call it a day. If not, remove from the whitelist the domain you just added and move on to the next holed domain in your list. Rinse and repeat until you see what you’re looking for.
Some people seem to like using the Whitelist Assistant Chrome extension when doing this. I find pi-hole’s query log to be absolutely sufficient.
Despite supposedly having no data caps, the other day my provider interrupted my surfing with a message stating that I’d downloaded an “excessive amount” and should contact them to upgrade my plan. Interestingly, their website also doesn’t show any data caps or, for that matter, any plans for me to upgrade to.
I’m not real worried about it, but at the same time since I work full time remote I really need my intertoobs to work all the time. Then I remembered that the vacation rental we manage next door to me has internet that rarely gets used. Time to slap a wireless NIC on the server and push internet traffic through that router!
Doing so was easy. I had a halfway decent USB wireless laying around. I slapped it in, joined the next door wireless network, and then ran a route print:
The highlighted bit is the new NIC. Above it is the wired NIC connecting the server to my local network. You want the Metric on the NIC you want internet traffic flowing through to be the lowest. Luckily mine defaulted to that. If yours doesn’t do that you can manually set the Metric by navigating to the Advanced properties of the Network Adapters:
After that I simply removed the Gateway address from the properties of my wired LAN access NIC and voila – all my intertoobs were coming from next door while my LAN still had full access to my server. In order to double check I logged into my router and disabled internet traffic for the server IP address.
I also installed a groovy little tool called Network Manager so I can watch the traffic: