Posts Tagged ‘working’

Saint Filothea Temnishka of Tarnovo feast day 7 of December. A XII century miracle working Saint little known in the West

Tuesday, December 14th, 2021


Living of Saint Filothea of Tarnovo 

The Venerable Filothea (Filotea) is born in the Byzantine city of Polivot in (Southern Thrace). She was a fruit of a continous prayers of her parents. 
Received a good education for the time and reached adulthood, her parents give her for a bride (in arranged marriage against her will) which was a standard practice of its time.
Even merrying using  her enormous wisdom she was able to persuade her husband to live vestal life (the marriage was not consumed). 
In relatively short years her husband passed away. She has moved to a Insland nearby the close lake, built a small hermit cell hut and prayed and fasted incessantly living a a holy hermit life in solitude, night vigils, tears and repentance and stillness.
Because of her zealoutry God has given her the Grace of Miracle working prayers and the wisdom to teach. A well known spiritual persons, cleargyman, priests, deacons and people come to her to hear her graceful words and councils as well as to receive a healing through her holy prayers.


Cause of her absitence of food and sleep and praers all over the clock she lost body weight, forseeing her death she has presented herself to the Lord on 7th of December (the exact year of her death and the age are unknown, presumably she lived somewhere in the XII century). Her holy relics turned to be incorruptable (a sign for immerse holiness, among with wonder working healing miracles were considered some of the conditions for considering a deceased person a saint – for more on inccorruptability of saint relics check out my previous article here).


In the beginning of XIII century her holy relics were solemnly carried with honor from Polivot to the Capital of Second Bulgarian Empire Tarnovo by King Kaloyan. There her holy relics stayed by God's great providence for 200 years, being visited by the whole Christiandome for veneration.


After the fall of Bulgaria under the Ottoman yoke (year 1393). Probably to save the holy relics from destruction, they were taken to the far North Bulgarian borders in the Fortress of Bdin (today city of Vidin) and after staying for a while once the fortress was taken over by Mohameddans, taken a by the Serbs, and later Wallachs (todays Romanians) has taken the relics from Serbs, once the Serbian lands were invaded.

Currently her holy relics are present the old Wallachian Capital Curtea de Argeș (near river of Argeș).

Holy Relics of Saint Filothea, one of the most famous places for Christian veneration in Romania
(Saint Demetrius of Besarabia – another Bulgarian saint, Saint Filotea, and Saint Petka of Bulgaria are among the most venerated saints in Romania today)

The main source we have for the living of Saint Filothea (Filotheus) is written by Saint Patriarch Euthymius of Tarnovo Bulgaria (born circa 1325, died c.1402 / 1404). It is a very long document describing a lot of interesting details about Saint Filothea's healing miracles after she prayed with crying to the Lord even before she died. The miracle healings, chasing out of demons and restoration of eye sight and other glorious things continued even after she passed out to Christ to multitudes of people who prayed in front of her relics with faith.

Saint Patriarch Euthymiuus of Tarnovo, the main source author for today's Filoteas Living 

During her life she spoke to the people coming to her a lot of his sacred methodical words.
She told them before her death:

"The time has come for me to leave here, so I thought it right to remind you of the traditions and decisions of the Orthodox faith by the Holy Apostles and the Divine Fathers. You know that the Orthodox faith is the head of our lives. In your efforts to give it to us pure and immaculate, the Holy Apostles suffered various kinds of death. , and to keep the church traditions unshakable, and not to waver here and there from different winds.

However, the Lord Jesus Christ shed His blood for her and did not allow his Church to be completely destroyed. But he gave her help, and fate led her to victory. I, the poor, have been brought up in piety since my childhood, and I received it from my parents as a precious treasure. Therefore, as a holy peak in the Church, I ask you not to forget the tradition of the Holy Prophets and Apostles, as the great apostle Paul wrote to Timothy: and others to learn! " (Tim. 2: 2)


You deserve to hold the true faith and not listen to pagan fables at all. They can rebuke us a thousand times, they can insult us a thousand times, but a lie will never defeat the truth, nor will malice prevail over wisdom. For, they reduced the name of the Deity in the creation, in men – oh wickedness! – in trees, in stones, cats, dogs, and are not ashamed to think that creation came into being by itself, and do not understand, the unthinking, in their evil wickedness and wisdom, that everything was brought from non-being into existence by one true God, Who created heaven and earth and everything visible and invisible. And the gods, who did not create the heavens and the earth, may perish! (Jeremiah 10:11). Let those who make them and who hope in them be like them! (Ps. 113:16; 134:18). Therefore the Gentiles were deceived, and their foolish hearts were darkened. Considering themselves to be wise, they proved foolish, and changed the glory of one God in the likeness of quadrupeds, reptiles, and birds (Rom. 1: 21-23). Let the wretched see where the celestial bodies and earthly beings in the air and water came from, and most of all where the even more primitive came from – heaven and earth, air and aquatic nature! Who mixed and divided them? What is their communication with each other – separation and consent? Who moves and leads them? How does one element, which is contrary in nature, run away with another harmlessly in the fullness of one world? How do they exist in agreement without consulting and talking? All this is the work of divine providence, and they left the Creator and honored and served creation instead of the Creator (Rom. 1:25) and wander in vain and rage against our pious faith and against pious Christians, to whom they impose ruthless torture and force them to renounce the sweet name of Christ.

You do not pay attention to their threats, even if they lead you to the torturous wheels, to the boiling cauldrons, to the sword or fire, do not be afraid of their horrors! (Isa. 8:12, 70s). Another life and another age that awaits us awaits us, where the prophets rejoice, the apostles rejoice together with the figures of the Venerable Lent, with the angels and archangels, with the martyrs and all the saints. Always think this, write this in your hearts! Take care of yourself and the whole flock, among which God has appointed you shepherds and teachers (Acts 20:28), in order to keep yourself and them pure and undefiled!

Everything in this world will be beautifully and habitually scattered like dust and forgotten, only virtue lasts forever and ever. Therefore, try to keep yourself clean and to lead the entrusted flock to lively pastures, so that the Lord of all, seeing this diligence of yours, may reward you with a reward worthy of your labors and make you worthy of His kingdom! " 

Romanian Contemporary Icon of Saint Filothea

A high-ranking and famous man named Navkratius, from the city of Amoria, was appointed by the then king to be the governor of Greece. It happened to him to fight the godless Agarians (The Turks), and after the two sides fought, by the unknown destinies of God, his whole army was defeated: some were killed, and others were captured and taken to Sicily. Along with the others, a stratilat (army commanded) was captured, but his name was Artavan, from the town of Philomelia. Taken away by the ungodly, they were imprisoned in a gloomy dungeon and guarded with great care. Thus detained there, they were perplexed as to what to invent and what to do. And overwhelmed with grief, they called for the help of Almighty God and His loved ones.

Then Artavan remembered St. Philothea and began to tell them about her glorious miracles and that she had received the gift of healing various ailments and diseases. As he listened to Stratilat Navkratius, his heart burned and he began to call for her help. And because he was filled with divine desire and was inflamed with fervent faith, he could not wait to hide it for a long time, but he quickly got up and raised everyone to earnest prayer, shedding tears. And all of them unanimously rushed to earnest prayer and called for the help of the God-loving Philotheus, saying:

"Christ-related slave, undefiled bride, pure dove, abode of the Holy Spirit, if you look mercifully on us humble and desperate, and free us from this terrible dungeon, we will be trumpets of your countless miracles, with a loud voice we will we preach, and we will spend the rest of our lives chaste and pure. O Venerable Mother, do not despise us, for we are bitterly distressed in this terrible and miserable dungeon! "


With such prayers they spent the whole night, with hot tears and heartache. When they had finished this all-night vigil and finished their prayer, they lay down to rest and give a little sleepy consolation to the body. Everyone fell asleep in their place, the reverend appeared to them and rejoiced their hearts with words of consolation, saying:

"Your prayer has been heard and God has not despised your sighs. So go in peace and return to your homes, thanking God for your gratitude, who frees prisoners from bondage!" (Ps. 67: 7).

They awoke with joy, the iron chains lay fallen from them, the dungeon was wide open. They believed the vision to be true, and immediately left the open dungeon, the guard lying as if dead, and fleeing freely. But before they went home, they first went to the island to pay their respects to the reverend. After fulfilling this obligation, each of them returned home and told all the glorious miracles of the Venerable Philoteia.

After this spread everywhere, and managed to enter every ear, a leper, full of faith and fervent zeal, quickly came to the church of the Venerable Mother, called for mercy and with diligent requests and frequent bows, long sleepless nights, fasting and torture tormented himself and he relentlessly spent in her divine temple. The Blessed One, seeing his long diligence and his bodily leprosy, which had almost ended, immediately bowed to mercy, appeared in the dream of the church cleric and ordered him to anoint him with oil from the holy chandel of the Immaculate Conception all over his body. When he awoke, the cleric quickly obeyed the order. and not many days later he sent him safe to his home to glorify and thank God, as well as to His close friend.

A lot of time passed and many miracles happened. The Greek kingdom was exhausted and its scepter holders found themselves in difficult circumstances. Finding the right time, the Romans stormed the Greek state and inflicted unbearable misery.

At the same time, the Bulgarian kingdom became very strong and powerful, and it encompassed and conquered all the surrounding areas. At that time in Bulgaria the tsarist scepter was ruled well and even magnificently by the pious and glorious tsar Kaloyan (1197-1207). Seeing the Greek kingdom completely exhausted, he attacked it manfully, and many cities and villages were captured and ruined. And having gathered all the good, he brought it to his glorious city of Tarnovo – the whole nation with all the animals moved to their country. As he did all this, he heard the miracles of the Venerable Philotheus, and his heart was greatly inflamed. Because it is usually a matter of the souls of the pious to show zeal for virtue and to show zeal in every way.

After conquering the whole region and subduing it to his authority, he came to the place where the venerable body of the reverend lay, filled himself with unspeakable joy, praising God and diligently thanking Him. He fell before the reverend relics of the reverend, flooded them with his tears, and reverently kissed them. He then ordered an all-night vigil and gave many alms to the poor. In the morning a divine liturgy was celebrated, which was attended by the king in great joy and merriment with all his army. And he made the good decision to bring the reverend's body to his country. 

Holy Venerable Mother Filothea pray the Lord to have mercy on every suffering and needy, poor, sick, weak and low and all the people who remember your holy memory and summon your prayers !

Amen !

Article Sources:
1. The Living of Saints by dr. Atanasii Bonchev and bishop Partenij 
2. The Living of Saint Filothea written by Saint Patriarch Euthymius of Tarnovo


Update reverse sshd config with cronjob to revert if sshd reload issues

Friday, February 12th, 2021


Say you're doing ssh hardening modifying /etc/ssh/sshd_config for better system security or just changing options in sshd due to some requirements. But you follow the wrong guide and you placed some ssh variable which is working normally on newer SSH versions ssh OpenSSH_8.0p1 / or 7 but the options are applied on older SSH server and due to that restarting sshd via /etc/init.d/… or systemctl restart sshd cuts your access to remote server located in a DC and not attached to Admin LAN port, and does not have a working ILO or IDRAC configured and you have to wait for a couple of hours for some Support to go to the server Room / Rack / line location to have access to a Linux physical tty console and fix it by reverting the last changes you made to sshd and restarting.

Thus logical question comes what can you do to assure yourself you would not cut your network access to remote machine after modifying OpenSSHD and normal SSHD restart?

There is an old trick, I'm using for years now but perhaps if you're just starting with Linux as a novice system administrator or a server support guy you would not know it, it is as simple as setting a cron job for some minutes to periodically overwrite the sshd configuration with a copy of the old working version of sshd before modification.

Here is this nice nify trick which saved me headache of call on technical support line to ValueWeb when I was administering some old Linux servers back in the 2000s

root@server:~# crontab -u root -e

# create /etc/ssh/sshd_config backup file
cp -rpf /etc/ssh/sshd_config /etc/ssh/sshd_config_$(date +%d-%m-%y)
# add to cronjob to execute every 15 minutes and ovewrite sshd with the working version just in case
*/15 * * * * /bin/cp -rpf /etc/ssh/sshd_config_$(date +%d-%m-%y) /etc/ssh/sshd_config && /bin/systemctl restart sshd
# restart sshd 
cp -rpf /etc/ssh/sshd_config_$(date +%d-%m-%y) /etc/ssh/sshd_config && /bin/systemctl restart sshd

Copy paste above cron definitions and leave them on for some time. Do the /etc/ssh/sshd_config modifications and once you're done restart sshd by lets say

root@server:~#  killall -HUP sshd 

If the ssh connectivity continues to work edit the cron job again and delete all lines and save again.
If you're not feeling confortable with vim as a text editor (in case you're a complete newbie and you don't know) how to get out of vim. Before doing all little steps you can do on the shell with  export EDITOR=nano or export EDITOR=mcedit cmds,this will change the default text editor on the shell. 

Hope this helps someone… Enjoy 🙂

Configure rsyslog buffering on Linux to avoid message lost to Central Logging server

Wednesday, January 13th, 2021


1. Rsyslog Buffering

One of the best practice about logs management is to send syslog to a central server. However, a logging system should be capable of avoiding message loss in situations where the server is not reachable. To do so, unsent data needs to be buffered at the client when central server is not available. You might have recently noticed that many servers forwarding logs messages to a central server do not have buffering functionalities activated. Thus I strongly advise you to have look to this documentation to know how to check your configuration:

Rsyslog buffering with TCP/UDP configured

In rsyslog, every action runs on its own queue and each queue can be set to buffer data if the action is not ready. Of course, you must be able to detect that "the action is not ready", which means the remote server is offline. This can be detected with plain TCP syslog and RELP, but not with UDP. So you need to use either of the two. In this howto, we use plain TCP syslog.

– Version requirement

Please note that we are using rsyslog-specific features. The are required on the client, but not on the server. So the client system must run rsyslog (at least version 3.12.0), while on the server another syslogd may be running, as long as it supports plain tcp syslog.

How To Setup rsyslog buffering on Linux

First, you need to create a working directory for rsyslog. This is where it stores its queue files (should need arise). You may use any location on your local system. Next, you need to do is instruct rsyslog to use a disk queue and then configure your action. There is nothing else to do. With the following simple config file, you forward anything you receive to a remote server and have buffering applied automatically when it goes down. This must be done on the client machine.

# Example:
# $ModLoad imuxsock             # local message reception
# $WorkDirectory /rsyslog/work  # default location for work (spool) files
# $ActionQueueType LinkedList   # use asynchronous processing
# $ActionQueueFileName srvrfwd  # set file name, also enables disk mode
# $ActionResumeRetryCount -1    # infinite retries on insert failure
# $ActionQueueSaveOnShutdown on # save in-memory data if rsyslog shuts down
# *.*       @@server:port

What Every Body is Saying – one of Best books on Body Language ever written

Tuesday, August 14th, 2018


Those interested in People Reading or holding a Management position position job inside some Small or Mid sized corporation could benefit greatly of a Book called
What Every Body is Saying

What Every Body is Saing is written by an ex-FBI Agent (JOE NAVANNO), probablythere are no actually ex-FBI agents, but that's a topic for another post.

The book is quick to read, especially if you follow the pictures of Body postures shown with their little description below.
Many of the Body Languages so commonly adopted by multitudes of people, thanks to the American of the Culture world-wide are being practiced
in some degree in mostly all people you might know (mostly unconsciously) …

What Every Body is Saying could be of a great help to people who want to make through in life and for Start-up company CEOs, Human Resource Managers, or anyone who want to better learn to communicate and Influence People.

Even in a normal family relations, being able to properly identify the Body Language of your Wife or kids would seriously benefit you and if you keep attention (focus) would reveal there short term-plans.


Adopting some of the suggested body languages in the book would definitely help you improve how people perceive you and practising some so called "Confident postures" could even boost your Confidence levels dramatically both when you're alone or when you are in a group of people or A Company Team Meeting.

Reading the Person Body language is of a great help also to understand the approximate Emotional / Spiritual state the person in front of you is and even if applied proparly could help you make the person or group of people be positively influenced to change from a negative to positive mindset
or when working on a project, could help you dramatically to make the people work more efficiently and boost their motivation / mood about the things, they have to someday do anyways.

The reader has to know of course that most of the mentioned body language cues are generalizations and in order to find out the exact messages being sent on non-verbal communication level depends on a multiple factors and many of the Body languages talked might be in a modified form and even some could be totally different from any of the described of the book.

However the observation practice (at least mine) shows that at least 60-70% of the described Body Language postures are adopted and used by mostly anyone out there.
To check the validity of the things described in the books just sit somewhere in a park or in a bar / caffeteria and watch carefully how people interact, you will be surprised how many things are being communicated non-verbally and how often the lack of one of the two, or two have severe communication issues, just because they couldn't synchronize their body language or lack the ability to read the other interlocutor's processed and communicated intentions.

The book when red at least for me was a wide eyes opener and even though as a Christian, I've always been doubting that any-generalization model trying to frame up people is very untrue and trying to influence people with your Body Language is bad sinful (kinda of satanic) practice, realizing that even Christians does communicate and do use body language (because they're conditioned by the society they lived in), that means that improving your Body Language to be more convincing in mostly anti-christian society we live can do you good favour to be adequate in society, or at least you can be aware of the existence of the Body Language and its meaning.

By the way, many of the models and gestures as translated described as a behaviour body interpretations are perhaps highly used nowadays by Agents across all the major Secret Services agencies such as CIA, MI6, KGB, Mussad etc.


This kind of things are learned in most business universities nowadays, but the way the Body Reading / Influencing knowledge is communicated in Business universities is a disaster, because it is usually compiled by Professors who alone are not expert or haven't been advanced enough in body language.
Thus even like that if you read the book, I'm sure you will benefit and perhaps reread it at least a couple of times in the coming years …

A summary of the book goes like this:

1. It starts with a short story on how the author get acquainted to the knowledge of body language and his personal life events

The author Joe Navarro was an emigrant from Cuba to US as the age of 8, because the author inability to speak English at all, his best way to understand what the other was saying or communicating in the first few years in US was to observe closely what the person in front was communicating non-verbally and makes guesses, what that could be.
His family and grandmother also played a key role to help him learn the craft of Body Language reaading.

Growing up and graduating college in the age of Baby Boomers, Joe Navarro was hired in FBI where he spend the following years as an agent specializing in Counter Intelligence
and behavior assessment.

2. It continues as the knowledge on Body interprations is being served in a very stuffed manner



The 3 key things to remember out of the book goes like that:

    A. At least 60% of what you say is not coming out of your mouth.
    B. There’s one more option next to fight or flight responce our brain does automatically
    C. To become a master at reading body language, you have to develop situational awareness.

The book claims that people tend to be stuck into 3 main states (as a result of the evolutionary development of species (Creationists and Christian fundamentalists could argue seriously here 🙂 ) , whenever facing a difficult situation these are:

  • Freeze
  • Fight
  • Flight

To sum up if you're looking for new ways to improve your current relationships with people and build a new ones, the book would definitely help you tremendously.
I've found the book in a PDF format with few simple searches online so those who can't afford it could also download it from the internet (at least as of time of writting this article).
A lot of the exampled Body confidence / influence postures described in the book you will find on mostly any Kids Cartoon and Internet top shows and in mostly everybody from TED Talks show and mostly all Youtube educational videos and podcasterers.

That's all Folks, Enjoy reading!



Fix dosbox – setting: cycles=auto. If the game runs too fast try a fixed cycles amount in DOSBox’s options. Exit to error: DRC64:Unhandled memory reference

Thursday, October 12th, 2017


I've recently installed Debian GNU / Linux 9.1 Stretch and on Ubuntu 16.10 Yakkety Yak and as an old school true gamer addict decided to play some games to recall the good old memories from the past of the glorious DOS games times, when all was simple people was real and there was no terrible people dividers such as Facebook  / GooglePlus, no skype fuzzy craziness and no people watching all time at their mobile smart phones like zoombies .

Well anyways, so I wanted to play my favourite DOS games Terminal Velocity, StarGunner, Raptor, Heroes of Might and Magic 2, Doom II, Duke 3d etc. etc. the list goes on and on – BTW What's your favourite old school DOS Game??

So I issues in Terminal:

$ dosbox TV.EXE

DOSBox version 0.74
Copyright 2002-2010 DOSBox Team, published under GNU GPL.

CONFIG:Loading primary settings from config file /home/zetathon/.dosbox/dosbox-0.74.conf
MIXER:Got different values from SDL: freq 44100, blocksize 512
ALSA:Can't subscribe to MIDI port (65:0) nor (17:0)
MIDI:Opened device:none
DOSBox switched to max cycles, because of the setting: cycles=auto. If    the game runs too fast try a fixed cycles amount in DOSBox's options.
Exit to error: DRC64:Unhandled memory reference


So what is the solution to  Exit to error: DRC64:Unhandled memory reference
error and why it happens?

Well, as the error clearly states the whole problem
comes from a default dosbox dos emulator configuration, that's the


Perhaps the CPU beat of a Core I7 CPUs is too strong for some of the old games which are expecting a slower PC with less memory that's why the exception

Exit to Error: DRC64:Unhandled memory reference
is spit out by Dosemu.

So how to solve DRC64:Unhandled memory reference dosemu error?

By default DOSBOX places its configuration at  Linux / BSD / *nix-es at home folder /dosbox – e.g. ~/.dosbox/ the naming of dosbox.conf might differ according to dosbox version and the respective Linux / BSD distro, on Debian and Ubuntu Linux usually the naming includes a version number.

On Debian 9 Strecth Linux dosbox config is at ~/.dosbox/dosbox-0.74.conf

Edit the file

$ vim ~/.dosbox/dosbox-0.74.conf

and change inside the value for:







Then give dosbox with the erroring game another try, it worked for me
for me and everything seemed to run fine.

I've only run a handful of games but so far it seems to be working well.

If it does work but performance is degraded and tooks a huch hit on Gameplay you better try to substitute





How to enable Control Alt Backspace to Kill X server on Debian / Ubuntu Linux

Thursday, September 28th, 2017

Being a long time GNU / Linux user, I've been quite dissatisfied for the fact that in latest Debian and Ubuntu Linux, the default Key combination to Kill X (CTRL + ALT + BACKSPACE) is no longer working.

Though nowdays Xorg (XServer) is pretty stable it still happens from time to time for some application to overload the PC badly and make Gnome or KDE environment little or no responsive at all and here comes the goody CTRL + ALT + BACKSPACE it is pretty much  like  (CTRL + ALT + DEL) did restarted the computer in DOS and earlier Windows OS-es once the environment became unusable with the only difference that just Xorg server is restarted and the other using programs that are in background work just like they used to. 

CTRL + ALT + Backspace is a great thing to use especially if you're running some homebrew server and you use it both as a Server with some few little websites and as a Desktop environment to browse the net and do basic stuff.

So here comes the question how to make the CTRL + ALT + BACKSPACE keyboard combination be killing Xserver like in the good old days?

The easiest way to do it interactively in ncurses interface is by  running:


root@noah:~# dpkg-reconfigure keyboard-configuration


If somehow on the machine you don't have dpkg-reconfigure or you prefer to do set CTRL + ALT + BACKSPACE Kill Switch manually edit /etc/default/keyboard 

inside change value of




like shown below file:

root@noah:/home/hipo# cat  /etc/default/keyboard


# Consult the keyboard(5) manual page.



The configuration should be working across Debian 7, 8, 9 as well as Ubuntu 12 ..14 .. 16 and hopefully in future releases too, just as many other Linux distributions like Mint etc. the Xserver Kill Switch setting should be located in same file.

Finally if even after that change the Control Alt BackSpace Kill Switch sequence refuses to work in GNOME Desktop environment, it might be due to a local setting typical for GNOME and this should be fixed via the good known gnome-tweak-tool

So GNOME users should run it from command line and check the setting there, e.g.:


$ gnome-tweak-tool

You should check:


Typing -> Kill Sequence to Kill the X Server


it should look like shown in below screenshot:






Block Web server over loading Bad Crawler Bots and Search Engine Spiders with .htaccess rules

Monday, September 18th, 2017


In last post, I've talked about the problem of Search Index Crawler Robots aggressively crawling websites and how to stop them (the article is here) explaning how to raise delays between Bot URL requests to website and how to completely probhit some bots from crawling with robots.txt.

As explained in article the consequence of too many badly written or agressive behaviour Spider is the "server stoning" and therefore degraded Web Server performance as a cause or even a short time Denial of Service Attack, depending on how well was the initial Server Scaling done.

The bots we want to filter are not to be confused with the legitimate bots, that drives real traffic to your website, just for information

 The 10 Most Popular WebCrawlers Bots as of time of writting are:

1. GoogleBot (The Google Crawler bots, funnily bots become less active on Saturday and Sundays :))

2. BingBot ( Crawler bots)

3. SlurpBot (also famous as Yahoo! Slurp)

4. DuckDuckBot (The dutch search engine crawler bots)

5. Baiduspider (The Chineese most famous search engine used as a substitute of Google in China)

6. YandexBot (Russian Yandex Search engine crawler bots used in Russia as a substitute for Google )

7. Sogou Spider (leading Chineese Search Engine launched in 2004)

8. Exabot (A French Search Engine, launched in 2000, crawler for ExaLead Search Engine)

9. FaceBot (Facebook External hit, this crawler is crawling a certain webpage only once the user shares or paste link with video, music, blog whatever  in chat to another user)

10. Alexa Crawler (la_archiver is a web crawler for Amazon's Alexa Internet Rankings, Alexa is a great site to evaluate the approximate page popularity on the internet, Alexa SiteInfo page has historically been the Swift Army knife for anyone wanting to quickly evaluate a webpage approx. ranking while compared to other pages)

Above legitimate bots are known to follow most if not all of W3C – World Wide Web Consorium (W3.Org) standards and therefore, they respect the content commands for allowance or restrictions on a single site as given from robots.txt but unfortunately many of the so called Bad-Bots or Mirroring scripts that are burning your Web Server CPU and Memory mentioned in previous article are either not following /robots.txt prescriptions completely or partially.

Hence with the robots.txt unrespective bots, the case the only way to get rid of most of the webspiders that are just loading your bandwidth and server hardware is to filter / block them is by using Apache's mod_rewrite through




Create if not existing in the DocumentRoot of your website .htaccess file with whatever text editor, or create it your windows / mac os desktop and transfer via FTP / SecureFTP to server.

I prefer to do it directly on server with vim (text editor)



vim /var/www/sites/


RewriteEngine On

IndexIgnore .htaccess */.??* *~ *# */HEADER* */README* */_vti*

SetEnvIfNoCase User-Agent "^Black Hole” bad_bot
SetEnvIfNoCase User-Agent "^Titan bad_bot
SetEnvIfNoCase User-Agent "^WebStripper" bad_bot
SetEnvIfNoCase User-Agent "^NetMechanic" bad_bot
SetEnvIfNoCase User-Agent "^CherryPicker" bad_bot
SetEnvIfNoCase User-Agent "^EmailCollector" bad_bot
SetEnvIfNoCase User-Agent "^EmailSiphon" bad_bot
SetEnvIfNoCase User-Agent "^WebBandit" bad_bot
SetEnvIfNoCase User-Agent "^EmailWolf" bad_bot
SetEnvIfNoCase User-Agent "^ExtractorPro" bad_bot
SetEnvIfNoCase User-Agent "^CopyRightCheck" bad_bot
SetEnvIfNoCase User-Agent "^Crescent" bad_bot
SetEnvIfNoCase User-Agent "^Wget" bad_bot
SetEnvIfNoCase User-Agent "^SiteSnagger" bad_bot
SetEnvIfNoCase User-Agent "^ProWebWalker" bad_bot
SetEnvIfNoCase User-Agent "^CheeseBot" bad_bot
SetEnvIfNoCase User-Agent "^Teleport" bad_bot
SetEnvIfNoCase User-Agent "^TeleportPro" bad_bot
SetEnvIfNoCase User-Agent "^MIIxpc" bad_bot
SetEnvIfNoCase User-Agent "^Telesoft" bad_bot
SetEnvIfNoCase User-Agent "^Website Quester" bad_bot
SetEnvIfNoCase User-Agent "^WebZip" bad_bot
SetEnvIfNoCase User-Agent "^moget/2.1" bad_bot
SetEnvIfNoCase User-Agent "^WebZip/4.0" bad_bot
SetEnvIfNoCase User-Agent "^WebSauger" bad_bot
SetEnvIfNoCase User-Agent "^WebCopier" bad_bot
SetEnvIfNoCase User-Agent "^NetAnts" bad_bot
SetEnvIfNoCase User-Agent "^Mister PiX" bad_bot
SetEnvIfNoCase User-Agent "^WebAuto" bad_bot
SetEnvIfNoCase User-Agent "^TheNomad" bad_bot
SetEnvIfNoCase User-Agent "^WWW-Collector-E" bad_bot
SetEnvIfNoCase User-Agent "^RMA" bad_bot
SetEnvIfNoCase User-Agent "^libWeb/clsHTTP" bad_bot
SetEnvIfNoCase User-Agent "^asterias" bad_bot
SetEnvIfNoCase User-Agent "^httplib" bad_bot
SetEnvIfNoCase User-Agent "^turingos" bad_bot
SetEnvIfNoCase User-Agent "^spanner" bad_bot
SetEnvIfNoCase User-Agent "^InfoNaviRobot" bad_bot
SetEnvIfNoCase User-Agent "^Harvest/1.5" bad_bot
SetEnvIfNoCase User-Agent "Bullseye/1.0" bad_bot
SetEnvIfNoCase User-Agent "^Mozilla/4.0 (compatible; BullsEye; Windows 95)" bad_bot
SetEnvIfNoCase User-Agent "^Crescent Internet ToolPak HTTP OLE Control v.1.0" bad_bot
SetEnvIfNoCase User-Agent "^CherryPickerSE/1.0" bad_bot
SetEnvIfNoCase User-Agent "^CherryPicker /1.0" bad_bot
SetEnvIfNoCase User-Agent "^WebBandit/3.50" bad_bot
SetEnvIfNoCase User-Agent "^NICErsPRO" bad_bot
SetEnvIfNoCase User-Agent "^Microsoft URL Control – 5.01.4511" bad_bot
SetEnvIfNoCase User-Agent "^DittoSpyder" bad_bot
SetEnvIfNoCase User-Agent "^Foobot" bad_bot
SetEnvIfNoCase User-Agent "^WebmasterWorldForumBot" bad_bot
SetEnvIfNoCase User-Agent "^SpankBot" bad_bot
SetEnvIfNoCase User-Agent "^BotALot" bad_bot
SetEnvIfNoCase User-Agent "^lwp-trivial/1.34" bad_bot
SetEnvIfNoCase User-Agent "^lwp-trivial" bad_bot
SetEnvIfNoCase User-Agent "^Wget/1.6" bad_bot
SetEnvIfNoCase User-Agent "^BunnySlippers" bad_bot
SetEnvIfNoCase User-Agent "^Microsoft URL Control – 6.00.8169" bad_bot
SetEnvIfNoCase User-Agent "^URLy Warning" bad_bot
SetEnvIfNoCase User-Agent "^Wget/1.5.3" bad_bot
SetEnvIfNoCase User-Agent "^LinkWalker" bad_bot
SetEnvIfNoCase User-Agent "^cosmos" bad_bot
SetEnvIfNoCase User-Agent "^moget" bad_bot
SetEnvIfNoCase User-Agent "^hloader" bad_bot
SetEnvIfNoCase User-Agent "^humanlinks" bad_bot
SetEnvIfNoCase User-Agent "^LinkextractorPro" bad_bot
SetEnvIfNoCase User-Agent "^Offline Explorer" bad_bot
SetEnvIfNoCase User-Agent "^Mata Hari" bad_bot
SetEnvIfNoCase User-Agent "^LexiBot" bad_bot
SetEnvIfNoCase User-Agent "^Web Image Collector" bad_bot
SetEnvIfNoCase User-Agent "^The Intraformant" bad_bot
SetEnvIfNoCase User-Agent "^True_Robot/1.0" bad_bot
SetEnvIfNoCase User-Agent "^True_Robot" bad_bot
SetEnvIfNoCase User-Agent "^BlowFish/1.0" bad_bot
SetEnvIfNoCase User-Agent "^JennyBot" bad_bot
SetEnvIfNoCase User-Agent "^MIIxpc/4.2" bad_bot
SetEnvIfNoCase User-Agent "^BuiltBotTough" bad_bot
SetEnvIfNoCase User-Agent "^ProPowerBot/2.14" bad_bot
SetEnvIfNoCase User-Agent "^BackDoorBot/1.0" bad_bot
SetEnvIfNoCase User-Agent "^toCrawl/UrlDispatcher" bad_bot
SetEnvIfNoCase User-Agent "^WebEnhancer" bad_bot
SetEnvIfNoCase User-Agent "^TightTwatBot" bad_bot
SetEnvIfNoCase User-Agent "^suzuran" bad_bot
SetEnvIfNoCase User-Agent "^VCI WebViewer VCI WebViewer Win32" bad_bot
SetEnvIfNoCase User-Agent "^VCI" bad_bot
SetEnvIfNoCase User-Agent "^Szukacz/1.4" bad_bot
SetEnvIfNoCase User-Agent "^QueryN Metasearch" bad_bot
SetEnvIfNoCase User-Agent "^Openfind data gathere" bad_bot
SetEnvIfNoCase User-Agent "^Openfind" bad_bot
SetEnvIfNoCase User-Agent "^Xenu’s Link Sleuth 1.1c" bad_bot
SetEnvIfNoCase User-Agent "^Xenu’s" bad_bot
SetEnvIfNoCase User-Agent "^Zeus" bad_bot
SetEnvIfNoCase User-Agent "^RepoMonkey Bait & Tackle/v1.01" bad_bot
SetEnvIfNoCase User-Agent "^RepoMonkey" bad_bot
SetEnvIfNoCase User-Agent "^Zeus 32297 Webster Pro V2.9 Win32" bad_bot
SetEnvIfNoCase User-Agent "^Webster Pro" bad_bot
SetEnvIfNoCase User-Agent "^EroCrawler" bad_bot
SetEnvIfNoCase User-Agent "^LinkScan/8.1a Unix" bad_bot
SetEnvIfNoCase User-Agent "^Keyword Density/0.9" bad_bot
SetEnvIfNoCase User-Agent "^Kenjin Spider" bad_bot
SetEnvIfNoCase User-Agent "^Cegbfeieh" bad_bot


<Limit GET POST>
order allow,deny
allow from all
Deny from env=bad_bot


Above rules are Bad bots prohibition rules have RewriteEngine On directive included however for many websites this directive is enabled directly into VirtualHost section for domain/s, if that is your case you might also remove RewriteEngine on from .htaccess and still the prohibition rules of bad bots should continue to work
Above rules are also perfectly suitable wordpress based websites / blogs in case you need to filter out obstructive spiders even though the rules would work on any website domain with mod_rewrite enabled.

Once you have implemented above rules, you will not need to restart Apache, as .htaccess will be read dynamically by each client request to Webserver

2. Testing .htaccess Bad Bots Filtering Works as Expected

In order to test the new Bad Bot filtering configuration is working properly, you have a manual and more complicated way with lynx (text browser), assuming you have shell access to a Linux / BSD / *Nix computer, or you have your own *NIX server / desktop computer running

Here is how:


lynx -useragent="Mozilla/5.0 (compatible;; +" -head -dump



Note that lynx will provide a warning such as:

Warning: User-Agent string does not contain "Lynx" or "L_y_n_x"!

Just ignore it and press enter to continue.

Two other use cases with lynx, that I historically used heavily is to pretent with Lynx, you're GoogleBot in order to see how does Google actually see your website?

  • Pretend with Lynx You're GoogleBot


lynx -useragent="Mozilla/5.0 (compatible; Googlebot/2.1; +" -head -dump



  • How to Pretend with Lynx Browser You are GoogleBot-Mobile


lynx -useragent="Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_1 like Mac OS X; en-us) AppleWebKit/532.9 (KHTML, like Gecko) Version/4.0.5 Mobile/8B117 Safari/6531.22.7 (compatible; Googlebot-Mobile/2.1; +" -head -dump


Or for the lazy ones that doesn't have Linux / *Nix at disposal you can use WannaBrowser website

Wannabrowseris a web based browser emulator which gives you the ability to change the User-Agent on each website req1uest, so just set your UserAgent to any bot browser that we just filtered for example set User-Agent to CheeseBot

The .htaccess rule earier added once detecting your browser client is coming in with the prohibit browser agent will immediately filter out and you'll be unable to access the website with a message like:

HTTP/1.1 403 Forbidden


Just as I've talked a lot about Index Bots, I think it is worthy to also mention three great websites that can give you a lot of Up to Date information on exact Spiders returned user-agent, common known Bot traits as well as a a current updated list with the Bad Bots etc.

Bot and Browser Resources information user-agents, bad-bots and odd Crawlers and Bots specifics



An updated list with robots user-agents (crawler-user-agents) is also available in github here regularly updated by Caia Almeido

There are also a third party plugin (modules) available for Website Platforms like WordPress / Joomla / Typo3 etc.

Besides the listed on these websites as well as the known Bad and Good Bots, there are perhaps a hundred of others that might end up crawling your webdsite that might or might not need  to be filtered, therefore before proceeding with any filtering steps, it is generally a good idea to monitor your  HTTPD access.log / error.log, as if you happen to somehow mistakenly filter the wrong bot this might be a reason for Website Indexing Problems.

Hope this article give you some valueable information. Enjoy ! 🙂


Upgrade old crappy Windows 7 32 bit to Windows 10 32 bit, post install fixes and impressions / How to enter Safe Mode in Windows 10

Wednesday, June 28th, 2017


However as I've been upgrading my sister's computer previously running Windows 7 to Windows 10 (the process of upgrading is really simple you just download Windows-Media-Creation-tool from Microsoft website and the rest comes to few clicks (Accept Windows 10 User Agreement, Create current install  restore point (backup) etc.) and waiting some 30 minutes or so for the upgrade to complete.


Then it was up to downloading some other updates on a few times and restarting the computer, each time the upgrades were made and all the computer was ready. I've installed Avira (AntiVirus) as I usually do on new PCs and downloaded a bunch of anti-malware (MalwareBytes / Rfkill  / Zemanta)  to make sure that the old upgraded  WIndows was not already infected before the upgrade and I've found a bunch of malware, that got quickly cleared up.

Anyways I've tried also another tool called ReimagePlus – Online Computer Repair in order to check whether there are no some broken WIndows system files after the upgrade

(here I have to say I've done that besides running in an Administrator command prompt (cmd.exe) and running

sfc /scannow

command to check base system files integrity, which luckily showed no problems with the Win base system files.

ReimagePlus however showed some failed services and some failed programs that were previously installed from Windows 7 before the upgrade and even it showed indication for Trojan present on computer but since ReImagePlus is a payed software and I didn't have the money to spend on it, I just proceeded to clean up what was found manually.

After that the computer ran fine, with the only strange thing that some data was from hard drive was red a bit too frequently, after a short call with a close friend (Nomen) – thx man, he suggested that the frequenty hdd usage might be related to Windows Search Indexing service database rebuilt and he adviced me to disable it which I did following this article How to speed up Windows by disabling Search Index Service.

One issue worthy to mention  stumbled upon after the upgrade was problems with Windows Explorer which was frequently crashing and "restarting the Desktop", but once, I've enabled all upgrades from Microsoft and Applied them after some update failures and restarts, once all was up2date to all latest from Microsoft, Explorer started working normally.

In the mean time while Windows Explorer was crashing in order to browse my file system I used the good old Win Total Command or Norton Commander for Windows – WinNC (with its most cool bizzarre own File Explorer tool).


As I wanted to run a MalwareBytes scan and Antivirus under Windows Safe-Mode, I tried entering it by restarting the Computer and pressing F8 a number of times before the Windows boot screen but this didn't work as Safe-Mode boot was changed in Windows 10 to be callable in another way because of some extra Windows Boot speed up optimizations, in short the easiest way I found to enter Windows 10 Safe Mode was to Hit Start Button -> Choose Restart PC and keep pressed SHIFT button simultaneously
that calls a menu that gives you some restore options, along with safe mode options for those who want to read more on How to Enter Safe mode (Command Prompt) on Windows 10 – please read this article.


Once the upgrade was over and all below done unfortunately I've realized her previously installed WIndows 7 is x86 (32 bit) version and the Acer notebook 5736Z where it is being installed is actually X64 (64 bit), hence I've decided to upgrade my dear sis computer to a 64 Bit Windows 10 and researched online whether, there is some tool that is capable to upgrade WIndows 10 from 32 bit to Windows 10 64 bit just to find out the only option is to either use some program to creaty a backup of files on the PC or to manually copy files to external hard drive and reinstall with a Windows 10 64 bit bootable USB Flash or CD / DVD image, so I took my USB flash and used again Windows Media Creation Tool to burn Windows and re-install with the 64 bit iso.

If you're wonder about why I choose to re-install finally Win 10 32 bit with Win 64 bit, because you might think performance difference might be not really so dramatic, then I have to say the Acer notebook is equipped with 4 Gigabytes of RAM Memory and Windows 10 32bit  (Pro) could recognize a maximum of 3 Gigabytes (2.9 GB if I have to be precise) and 1 Gigabyte of memory stays totally unusued all the time with  Winblows 10 32 bit.


I've tried my best actually to not loose time to fully upgrade Windows 7 (32 bit) -> Windows 10 (64 bit) but to make Windows 7 32 bit Windows to use more than the default Limitation of 3GB of memory by using this thirt party PAE Externsion Kernel Patch
which is patching the Windows Kernel to extend the Windows support for PCs with up to 128 GB of memory however it turned out that this Patch file is not compatible with my Windows Kernel version once I followed readme instructions.

It seems the PAE (Physical Address Extension) is supported by default  by Microsoft only on 32 bit Windows Server 10 to read more on the PAE if interested give a look here.

Well that's all folks, the rest I did was to just boot from the USB drive just burned and re-install WIndows and copy my files from User profile / Downloads / Pictures / Music etc. to the same locations on the new installed Windows 10 professional 64 bit and enjoy the better performance.

Remove pre-installed HP, Dell, Asus, Acer, Toshiba not needed default vendor software on a new bought PC notebook quickly with Decrap My Computer

Thursday, April 14th, 2016

While browsing today and looking for software to clean up all the spy software from my corporate HP laptop, I've come across an interesting tool called Decrap which aims at removing Bloatware from a Windows PC / notebook (mirrored here because original software site was down)

So what is Bloatware ?

The term Bloatware (also called jokingly crapware) is term is the one that was coined to describe, the default pre-installed software that comes to you together with Windows pre-installed OS by the hardware manufacturer.
I'm sure anyone who bought brand new branded PC or laptop over the last 10 years have already suffered the unwanted and unnecessery
bunch of software that comes pre-installed freeware programs aiming to help you in your daily work but in reality just slowing down your PC
and showing annoying popups or at best keeping useless in Windows system apptray.

Let me give you an example:

Cleanup (Remove) common ASUS, HP, Dell default  installed unneded (Bloatware) software

Many users may want to uninstall ASUS Crapware software such as ASUS Tutor, ASUS LifeFrame3, ASUS WebStorage and ASUSVibe.

Like Asus, HP computers often come preloaded with useless software from factory, example for this is HP Customer Service enhancements, HP Update, HP Total Care Setup and ProtectSmart.

If you buy Dell PC notebook soon you'll discover that there are several preloaded software (often unnecessery software) such as Dell Stage, Dell Digital Delivery and Dell DataSafe.

Toshiba computers and notebooks contain pre-loeaded "crapware" software from Toshiba.
Just to mention a few of those: Toshiba Disc Creator, Toshiba ReelTime, Service Station, Bulletin Board and Toshiba Assist.

Often there are fingerprint reader programs, Wi-Fi connection managers, Bluetooth managers, Audio Management sofware and other third party vendor software which tend to be not working as good as others softwares from third vendor, so Decrap is to help you to identify and remove these too in a easy GUI manner.

Non-experienced Computer users often leave the bloatware to hang around for even years and only if some relative that is an IT involved person / sysadmin / Even once you're aware that the Bloatware is on the system the ordinary user is hard to remove it as he is scared not to break the system.
Besides that fften this bloatware just soft comes so much integrated into Windows that removing it costs hours of tries and research online on
all the Bloatware components and even then could mislead you so you break the PC. programmer etc. comes home of such users finds out about the happily existing of the useless software on the notebook.

So here is Decrap My Computer coming at place aiming to help to remove the unnecessery Hardware vendor software in few easy (Click, Click, Click Next ..) steps.


Then decrap does silently all the complex operations and suggestions to make the HP, Dell, Asus, Toshiba manufacturer prebundled software to be stopped and uninstalled.
Decrap My Computer is a freeware, lightweight and easy to use and lets you safely remove crapware and bloatware, or any software, from any Windows PC.

Even for Old computers, Decrap comes handy for the unexperienced avarage user who used his laptop with this useless  default vendors programs silently killing the performance respectively user experience for years.

Using Decrap is quite intuitive PC is scanned for Bloatware and then after a backup Windows Restore Point is offered you're offered to review and Uninstall the unwanted softwares. There is also an automatic mode but those one still could be a bit dangerous, so use the automatic mode only on multiple machines with the same model  / brand notebooks that comes prebundled with same sofware after testing and confirming the automatic mode on 1 initial machine will not break up some needed functionality.


Here is few screenshots of the tool in action:



Another good alternative (since decrap seems to be not maintained anymore) as I just leardned from Natasha Myles (thanks for pointing me about the broken link to decrap website) is SpeedUpPC more on speeding up old PC or laptop is her article 

chmod all directories permissions only and omit files (recursively) on Linux howto

Friday, March 11th, 2016


If you mistakenly chmod-ed all files within directory full of multiple other subdirectories and files and you want to revert back and set a certain file permissions (read, wite execute) privileges only to all directories:

find /path/to/base/dir -type d -exec chmod 755 {} +

If there are too many files or directories you need to change mod use

chmod 755 $(find /path/to/base/dir -type d) chmod 644 $(find /path/to/base/dir -type f)

Above willl run evaluate $() all files searched and print them and pass them to chmod so if you have too many files / directories to change it will drastically reduce execution time.

An alternative and perhaps a better way to do it for those who don't remember by heart the chmod permission (numbers), use something like:

chmod -R u+rwX,go+rX,go-w /path

Below is arguments meaning:

    -R = recursively;
    u+rwX = Users can read, write and execute;
    go+rX = group and others can read and execute;
    go-w = group and others can't write

If like piping, a less efficient but still working way to change all directory permissions only is with:

find /path/to/base/dir -type d -print0 | xargs -0 chmod 755
find /path/to/base/dir -type f -print0 | xargs -0 chmod 644

For those who wish to automate and often do change permissions of only files or only directories it might be also nice to look at ( shell script

Tadadam 🙂