Edventures in Normalcy

ColdFusion 11 init.d script

Posted by Rose Bush on September 28th, 2015

I recently installed ColdFusion 11 on RHEL, but the cfinit script did not exist. I then pulled up a ColdFusion 10 init script, updated the CF10-CF11 bits, corrected the coding error for the CFSTATUS section particular to my OS and have the script below:

I then ensured permissions on the file and made sure it would add to startup correctly:


cPanel License Verification and Update Script

Posted by Rose Bush on September 17th, 2015

You can run the above to re sync the local status/key.  To verify your machine is licensed, browse to the following and enter in the external IP address:


Personal use case scenarios for needing to run the aforementioned script are changing the IP on the machine, or if the license has been upgrades, from trial fro example.

Sauce: https://forums.cpanel.net/threads/cpanel-license-activation.97409/


After a recent installation of dotDefender, the following error came up:
“Internal Server Error


No response from subprocess (/usr/local/cpanel/whostmgr/docroot/cgi/addon_dotDefender.cgi): The subprocess exited with statu s 2 (ENOENT).”

The log file for dotDefender, /usr/local/APPCure-full/log/dotDefender_bpd.log, gives further detail:

The fix was to install Crypt::Passwd::XS as such:


Starting Services That Should Be Running RHEL

Posted by Rose Bush on September 10th, 2015

I recently came across a server that ran services, I was not familiar with, and services were unclear as to the issues I was troubleshooting. As a quick fix, I decided to get a list of services that should be running and start any that were not from that list:

In some cases, the service was not listed as I had expected, so to get the list I had to run the following, where $3 is the service name from the prior commands. In some cases, I had to use $5, as history had a different output:

Now we can find out which are running:

Validate what you are starting, come on, be informed and intentful in what you are doing, and if safe, run the second and third command:

When logging into a fresh installation of SmarterMail 13 and below, I was given the following error:


There was an issue that caused this page to malfunction.

System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation. —> System.InvalidOperationException: This implementation is not part of the Windows Platform FIPS validated cryptographic algorithms.
at System.Security.Cryptography.MD5CryptoServiceProvider..ctor()
— End of inner exception stack trace —

Server stack trace:
at System.RuntimeMethodHandle.InvokeMethod(Object target, Object[] arguments, Signature sig, Boolean constructor)
at System.Reflection.RuntimeConstructorInfo.Invoke(BindingFlags invokeAttr, Binder binder, Object[] parameters, CultureInfo culture)
at System.Security.Cryptography.CryptoConfig.CreateFromName(String name, Object[] args)
at System.Security.Cryptography.MD5.Create(String algName)
at System.System_ExtensionMethods7BCA73B06BAB478aA3AC6AC60979BA25.GetMD5Hash(String val)
at MailService.Remoting.RemoteSecurity.GetNewKey()
at MailService.Remoting.Mail.InitializeSession()
at System.Runtime.Remoting.Messaging.StackBuilderSink._PrivateProcessMessage(IntPtr md, Object[] args, Object server, Object[]& outArgs)
at System.Runtime.Remoting.Messaging.StackBuilderSink.SyncProcessMessage(IMessage msg)

Exception rethrown at [0]:
at System.Runtime.Remoting.Proxies.RealProxy.HandleReturnMessage(IMessage reqMsg, IMessage retMsg)
at System.Runtime.Remoting.Proxies.RealProxy.PrivateInvoke(MessageData& msgData, Int32 type)
at SmarterMail.RemoteInterface.IMail.InitializeSession()
at SmarterTools.SmarterMail.Remoting.RemoteMail.InitializeSession()
at SMWeb.HelperClasses.Security.LoginHelper.DoLogin(String email, String password, Boolean impersonationLogin, String visitorIpAddress)
at SMWeb.Login.DoLoginInternal(String username, String password, Boolean rememberMe)
at SMWeb.Login.DoLogin()
at SMWeb.Login.btnLogin_Click(Object sender, EventArgs e)
at System.Web.UI.WebControls.LinkButton.OnClick(EventArgs e)
at System.Web.UI.WebControls.LinkButton.RaisePostBackEvent(String eventArgument)
at System.Web.UI.WebControls.LinkButton.System.Web.UI.IPostBackEventHandler.RaisePostBackEvent(String eventArgument)
at System.Web.UI.Page.RaisePostBackEvent(IPostBackEventHandler sourceControl, String eventArgument)
at System.Web.UI.Page.RaisePostBackEvent(NameValueCollection postData)
at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)

I found that a previous lockdown server in turn caused SmarterMail to fail to login whether using the Built in Web service or a site through IIS. The correction was listed here:


  • Change the configuration in the application-level Web.config file. Specify that ASP.NET use the Triple Data Encryption Standard (3DES) algorithm to process view state data
  • Disable FIPS compliant algorithms for encryption, and restart the SmarterMail Service.
  • Upgrade to SmarterMail 14


To “change the configuration in the application-level Web.config file. Specify that ASP.NET use the Triple Data Encryption Standard (3DES) algorithm to process view state data”: https://support.microsoft.com/en-us/kb/911722

  1. In a text editor such as Notepad, open the application-level Web.config file.
  2. In the Web.config file, locate the <system.web> section.
  3. Add the following <machineKey> section to in the <system.web> section:
  4. Save the Web.config file.
  5. Restart the Microsoft Internet Information Services (IIS) service. To do this, run the following command at a command prompt:


“#1 On Windows Server 2008 and in Windows Vista set the registry value for HKLM\System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy\Enabled to 0.
On Windows Server 2003 and in Windows XP set the registry value for HKLM\System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy to 0.
You will need to restart the machine for this setting to take effect.

#2 Launch Local Security Policy from Control Panel->Administrative Tools. Expand Security Settings->Local Policies->Security Options. Open the security policy “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” and select the Disabled option. Retstart the machine.”

I was on TV, specifically Adult Swim.

Posted by Rose Bush on June 11th, 2015

I put my X the Eliminator Costume on the Dear Adult Swim forum, and along with many others, had the costume shown on live TV.  I found this video below at http://www.bumpworthy.com.

Microsoft Rich Copy

Posted by Rose Bush on June 11th, 2015

So, there is this tool, and if you Google for it, Microsoft Rich Copy, you end up here:

Click the ‘download Microsoft Rich copy’ link, and you will be prompted to download HoffmanUtilitySpotlight2009_04.exe, its 5.8 MB. Run this, Agree to the License Agreement, give it a path. It will export the HoffmanUtilitySpotlight folder to that location. Inside that folder, you will have the actual installer. Per the readme.txt: “It is simple. Please just run setup.exe. It will ask you all
necessary information to get RichCopy installed.”


Hoffman Utility Spotlight (130)

A handful of HTML and ASCII Symbol Codes

Posted by Rose Bush on June 11th, 2015


↓ Down arrow &darr;
‾ Overline &oline;
← Left arrow &larr;
→ Right arrow &rarr;
↑ Up arrow &uarr;
℠ Service Mark &#8480;
℃ Celsius &#8451;
℅ care of &#8453;
℉ Farenheit &#8457;
№ numero symbol – number sign &#8470;
℗ Sound Recording Copyright &#8471
℞ Prescription Take pharmaceutical symbol &#8478
Ω Ohm &#8486
℧ Inverted Ohm &#8487
☀ sunshine – sun &#9728
☁ cloudy – cloud &#9729
☂ raining – rain &#9730
☃ snow – snowman &#9731
☄ comet &#9732
★ star solid &#9733
☆ star outline &#9734
☇ lightning &#9735
☈ thunderstorm &#9736
☉ sun &#9737
☊ ascending node &#9738
☋ descending node &#9739
☌ conjunction &#9740
☍ opposition &#9741
☎ phone number – phone service &#9742
☏ phone symbol outline &#9743
☐ check box – ballot box &#9744
☑ ballot box check mark &#9745
☒ ballot box with X &#9746
☓ Saltire – St. Andrew’s Cross &#9747
☚ left-pointing index finger &#9754
☛ right-pointing index finger &#9755
☜ left-pointing index finger &#9756
☝ upwards pointing index finger &#9757
☞ right pointing index finger &#9758
☟ downwards pointing index finger &#9759
☠ skull & crossbones &#9760
☡ caution sign &#9761
☢ radioactive sign &#9762
☣ biohazard sign &#9763
☤ Caduceus or “Kerykeion” &#9764
☥ Ankh &#9765
☦ Eastern Christian Cross &#9766
☧ Chi Rho Cross &#9767
☨ Patriarchal Cross &#9768
☩ Greek Cross &#9769
☪ Crescent Moon & Star &#9770
☫ Farsi symbol &#9771
☬ Adi Shakti &#9772
☭ hammer & sickle &#9773
☮ peace sign &#9774
☯ yin & yang &#9775
☰ trigram Heaven &#9776
☱ trigram Lake &#9777
☲ trigram Fire &#9778
☳ trigram Thunder &#9779
☴ trigram Wind &#9780
☵ trigram Water &#9781
☶ trigram Mountain &#9782
☷ trigram Heaven &#9783
☸ Dharma Wheel &#9784
☹ frowning face &#9785
☺ smiley face &#9786
☻ black smiley face &#9787
☽ waxing crescent moon &#9789
☾ waning crescent moon &#9790
☿ Mercury &#9791
♀ Venus – Female symbol &#9792
♁ Earth symbol &#9793
♂ Mars – Male symbol &#9794
♃ Jupiter &#9795
♄ Saturn &#9796
♅ Uranus &#9797
♆ Neptune &#9798
♇ Pluto &#9799
♈ Aries &#9800
♉ Taurus &#9801
♊ Gemini &#9802
♋ Cancer &#9803
♌ Leo &#9804
♍ Virgo &#9805
♎ Libra &#9806
♏ Scorpio &#9807
♐ Sagitarius &#9808
♑ Capricorn &#9809
♒ Aquarius &#9810
♓ Pisces &#9811
♔ White King &#9812
♕ White Queen &#9813
♖ White Rook &#9814
♗ White Bishop &#9815
♘ White Knight &#9816
♙ White Pawn &#9817
♚ Black King &#9818
♛ Black Queen &#9819
♜ Black Rook &#9820
♝ Black Bishop &#9821
♞ Black Knight &#9822
♟ Black Pawn &#9823
♠ black spade suit name: &spades &#9824
♡ red heart suit &#9825
♢ red diamond suit &#9826
♣ black club suit = shamrock name: &clubs &#9827
♤ red spade suit &#9828
♥ black heart suit = valentine name: &hearts &#9829
♦ black diamond suit name: &diams &#9830
♧ red club suit &#9831
♨ hot springs &#9832
♩ musical quarter note &#9833
♪ musical eighth note &#9834
♫ musical single bar note &#9835
♬ musical double bar note &#9836
♭ flat note &#9837
♮ natural note &#9838
♯ sharp note &#9839
✁ cut above &#9985
✂ cut here &#9986
✃ cut below &#9987
✄ scissors &#9988
✆ public pay phone &#9990
✇ film reel – tape spool &#9991
✈ airport jet airplane &#9992
✉ envelope mail email &#9993
✌ victory sign &#9996
✍ signature – sign here &#9997
✎ pencil diagonal down &#9998
✏ pencil &#9999
✐ pencil diagonal up &#1000
✓ check mark &#10003
✔ heavy check mark &#10004
✕ multiplication sign X &#100005
✖ heavy multiplication sign X &#10006
✗ ballot X &#10007
✘ heavy ballot X &#10008
✝ Latin Roman Cross &#10013
✞ Latin Cross 3D shadow &#10014
✟ Latin Cross outline &#10015
✠ Maltese Cross &#10016
✡ Star of David &#10017
❛ quotation mark single turned comma &#10075
❜ quotation mark single comma &#10076
❝ quotation mark double turned comma &#10077
❞ quotation mark double comma &#10078

HTML = ♥

or ♡

ApplicationPoolIdentity user in Users & IIS_IUSRS

Posted by Rose Bush on May 19th, 2015

ApplicationPoolIdentity is assigned membership of the Users group as well as the IIS_IUSRS group.” Source: http://stackoverflow.com/questions/5437723/iis-apppoolidentity-and-file-system-write-access-permissions

I often need to add Users in particular to give the permissions needed.

Apache SetEnvIf Logical AND with Two Variables

Posted by Rose Bush on May 15th, 2015

In trying to adjust the method of logging in Apache, it was found logical to have the configuration perform an AND on two variables to validate one format vs another. I had not found much detail on this, until making my way to: http://stephane.lesimple.fr/blog/2010-01-28/apache-logical-or-and-conditions-with-setenvif.html. From the page archived, I had the following:

In my example, it was not able to work as shown above, but not of by much.  We quoted the last 0 in the lines we had written, giving us the following example:

When tested, requests coming from the LB IP are listed as trusted, and only trusted requests are adjusted and trusted as having been forwarded.  Other requests, we can assume (based on topology) with x-forwarded-for header are identified as falsified.

Copyright © Edventures in Normalcy. All rights reserved.