Archive for the ‘ Technology ’ Category

Installing WordPress Multisite with MAMP on OS X

So I’m finally able to purchase a Mac, and now I’m moving all of my design work over to it. I need to start working on developing a network of sites using WordPress 3. I’ve waited so long. Man, did I ever not know anything about WordPress. Here are some of the things I’ve learned in the past 9 hours of figuring out how to get WordPress 3 running on my Mac running Snow Leopard. Excuse me while I borrow others words (links will be posted to give where credit is due). My comments will be noted.

Step 1: Installing MAMP

Before you can install MAMP on your Mac, you’ll need to download it from the MAMP website. MAMP requires that your Mac is running Mac OS X 10.4.x or later.

Once the MAMP download completes, double-click on the MAMP disk image (it should be something like MAMP_MAMP_PRO_1.9.dmg), and you should get a MAMP window pop up. Drag the MAMP folder (not MAMP PRO) to the Applications folder.

Step 2: Basic MAMP Settings

Now that you’ve got MAMP installed on your system, launch (located at /Applications/MAMP/

While you’re editing settings, MAMP might prompt you for an administrator password. This is required because MAMP needs to run two processes: mysqld (MySQL) and httpd (Apache), and depending on the settings you set for those processes, you may or may not need to input your password.

Once you open MAMP, click the Preferences button. Next, click over to “Ports.” The default MAMP ports are 8888 for Apache, and 8889 for MySQL. If you use this configuration, you shouldn’t get asked for your password, but you’d need to include the port number in the URL (localhost:8888). If you’d like to leave the port number out of the URL, change the Apache port to 80. The downside of using port 80 as your MAMP Apache port is that you’ll always be asked for your password. For multisite (network), you need to click “Set to default Apache and MySQL ports.” These port are 80 for Apache and 3306 for MySQL. Apache needs to be port 80 for network site to work.

On the PHP tab, you can select either PHP version 5.2.13, or PHP version 5.3.2. This generally won’t effect WordPress, unless you’re using a plugin that requires PHP 5.

Lastly, on the Apache tab, you’ll need to set a document root. This is where all of your files are going to be for your local web server. An example of a document root is /Users/USERNAME/Sites/wordpress/.

Once you’re done editing all of the settings, hit OK to save them.

Step 3: Starting MAMP Servers & Creating The Database

To start the MAMP Apache and MySQL servers, simply click “Start Servers” from the main MAMP screen. Your MAMP servers have now been started.

Once the MAMP servers start, the MAMP start page should open in your default web browser. If not, click on “Open start page” in the MAMP window. Once that’s open, select phpMyAdmin from the webpage.

Under “Create new database”, enter in a database name such as “wordpress”, and press “Create.”

Step 4: Downloading and Installing WordPress

  • Now it’s time to download WordPress. Once you’ve downloaded and unzipped the WordPress download, open up the “wordpress” folder. Click and drag all of the files from the wordpress folder to your MAMP document root (I use/Users/USERNAME/Sites/wordpress/).
  • Rename the wp-config-sample.php file to wp-config.php.
  • Open wp-config.php in a text editor and fill in your database details as follows: username is root and password is root. (STOP and read Step 4.1 before finishing the last bullet.)
  • Run the WordPress installation script by accessing localhost/wordpress/wp-admin/install.php in a web browser.

Once that’s complete, enter a blog name and email address, and you’re ready to use WordPress on your Mac. (steps 1-4 link and bullets link)

Step 4.1: Edit host file and httpd.conf

To create a simi-real virtual environment, edit your host file. Add or any name you like next to localhost. (e.i.   localhost

  1. Open the Either by start typing Terminal on the Spotlight, or by going into Applications/Utilities/Terminal.
  2. Open the hosts file. Open the hosts by typing on the Terminal that you have just opened: $ sudo nano /private/etc/hosts Type your user password when prompted.
  3. Edit the hosts file. The hosts file contains some comments (lines starting with the # symbol), as well as some default hostname mappings (e.g. — localhost). Simply append your new mappings underneath the default ones or edit one of the default values. You can navigate the file using the arrow keys.
  4. Save the hosts file. When done editing the hosts file, press control-o to save the file. Press enter on the filename prompt, and control-x to exit the editor.
  5. Flush the DNS cache. On Leopard you can issue a simple Terminal command to flush the DNS cache, and have your host file changes to take immediate effect: $ dscacheutil -flushcache

(numbered items link)

Now edit your httpd.conf file.

Put these lines at the bottom of the httpd.conf file (located at Applications/MAMP/conf/apache/httpd.conf)

NameVirtualHost *:80
<VirtualHost *:80>
DocumentRoot “/Users[Your User Name]/Sites/”
ServerName localhost

<VirtualHost *:80>
DocumentRoot “/Users/[Your User Name]/Sites/wordpress”
AllowOverride All

Substitute “[Your User Name]” with your Username. After that you have to reboot or type “lookupd -flushcache” in the Terminal to make these changes take effect. Make sure you set MAMP’s ports to the default Apache and MySQL ports. Click the “Set to default Apache and MySQL ports” in Preferences/Ports.

(httpd.conf code link)

You can try and skip Step 4.1, but I pretty sure you need it.

Step 5: Create Network

See here and begin at step 3. I will say that everything before step 3 is good to read, but you will start the network creation at step 3. (I think step 5: enabling the network is where I messed up bad.) Because your local copy of WordPress is not going to have .htaccess you will need to create it exactly where it says (e.i. /Users/[Your User Name]/Site/wordpress). The easiest way to create a .htaccess is through an ftp program like fireftp (at least that’s what I did). Create a file named “htaccess,” open it in your text editor, and paste the code that needs to be added from step 5; enabling the network. Save and close the file. Then, use your ftp program to change the name from “htaccess” to “.htaccess.” Make sure your .htaccess is in the correct folder/directory. After completing the steps from the link you should be ready to use your new multisite blog.

If this doesn’t help anyone, I know it will help me.


Trends Research 2010 Trends

This information should be self explanatory.

Here are some of Gerald Celente’s health, environmental, social, entertainment, cultural, business and consumer trends for 2010.

• The Crash of 2010: The Bailout Bubble is about to burst. Be prepared for the onset of the Greatest Depression.

• Depression Uplift: The pursuit of elegance and affordable sophistication will raise spirits … and profits.

• Terrorism 2010: Years of war in Afghanistan and Iraq – and now Pakistan – have intensified anti-American sentiment. 2010 will be the year of the lone-wolf, self-radicalized gunman.

• Neo-Survivalism: A new breed of survivalist is devising ingenious stratagems to beat the crumbling system. And, they’re not all heading for the hills with AK-47’s and pork & beans.

• Not Welcome Here: Fueled by fear and resentment, a global anti-immigration trend will gather force and serve as a major plank in building a new political party in the US.

• TB or Not TB: With two-thirds of Americans Too Big (TB) for their own good (and everyone else’s), 2010 will mark the outbreak of a “War on Fat,” providing a ton of business opportunities.

• Mothers of Invention: Taking off with the speed of the Internet revolution, “Technology for the Poor” will be a major trend in 2010, providing products and services for newly downscaled Western consumers and impoverished consumers everywhere.

• Not Made In China: A “Buy Local,” “My Country First” protectionist backlash will deliver a big “No” to unrestrained globalism and open solid niches for local and domestic manufacturers.

• The Next Big Thing: Just as the traditional print media (newspapers/magazines) were scooped by Internet competition, so too will new communication technologies herald the end of the TV networks as we know them.

Here is a sample of the latest Trends Journal.

The Death of Privacy

Most Americans are unaware that there is a technological explosion taking place that will enable the government to intrude in the lives of every citizen at an unprecedented level.  Surveillance technologies have been around for a long time, but it is only recently that storage of and rapid access to vast amounts of information has become possible.  Government can now monitor many activities that most Americans would regard as private and protected by the constitution without any real oversight process involved.  American telecommunications companies already retain detailed records of customer activities.  If you use the internet, some internet providers record every single action taken, to include individual keystrokes.

In Britain this process of corporate and government intrusion is far advanced even though it is bitterly opposed by a large part of the public.  A new law is about to go into effect with the wonderful euphemism name of the Intercept Modernization Program, part of the equally splendidly dubbed Regulation of Investigatory Powers Act.  It will require telecommunications providers to collect and retain all information on subscribers’ activities for a period of six months.  Employees of 653 public agencies, most of which have no law enforcement or intelligence function, will have access to the information with no judicial oversight whatsoever.  At each agency all that is needed is a supervisor to sign off on the request for information.

In the United States, such records are maintained in a haphazard fashion by the various service providers and can be accessed by the Justice Department through the issuance of a national security letter.  The security letter is particularly dangerous from a civil liberties perspective because it does not have any judicial review and it has legal penalties for anyone who even discloses that he has received one.  The number of security letters issued each year has been growing dramatically because it is an easy way to obtain information without going through any real due process. More than 35,000 were issued last year.   In a recent case in Philadelphia, an internet service provider was asked for detailed information relating to all internet traffic on a certain date, to include IP addresses, times, e-mail addresses, physical addresses, registered accounts, Social Security Numbers, bank account numbers, and credit card numbers.  There is no sign that the Obama Justice Department and FBI will behave any differently than their counterparts under George W. Bush, quite the contrary. – Phil Giraldi, American Conservative Defense Alliance

Original post

The Government’s Cyborg Beetle

Thought this article was interesting. I wonder what the government will do with technology like this.

Unintended Consequence of Technology in Christian Ministries

Video Formats

streaming video formats

Unintended Consequences. The year was 1945. The month was February. The Big Three (President Franklin D. Roosevelt, Prime Minister Winston Churchill, and Josef Stalin) met at the Black Sea resort of Yalta. President Roosevelt would enlist the support of Salin’s Russia to fight the Japanese (which never really happened) while many concessions would be given to Russia in the process. A result of those concessions would be the Cold War. One of the covert operations during the Cold War was the CIA’s arming of fundamentalist groups (the most notable of these groups being Al-Qaeda) to oust the Russians occupying Afghanistan. Over two decades and many attacks (most notably 9/11) later, we are fighting the very group we armed as our secret ally.

We all know that decisions have consequences. Whether it’s catching a late-night show and dealing with the exhaustion the following day or procrastinating on a project and accepting the accompanying stress or lower quality output, each decision has an associated consequence.

YouTube or Vimeo. Visuals are in. The best way to communication is through the medium of video, but hosting your own video can also be a daunting task. Because of this, many ministries default to a video sharing website such as: YouTube or Vimeo.  Is this a wise solution? Allow me to illustrate. The other day Bro. Esposito gave a perfect example of using or distributing YouTube videos. He received a link to a YouTube video about a topic that he was interested in. (I should also mention that he received it from a preacher and that the video was of another preacher.) He noticed in the related videos section a pornographic video. I wonder how many of our members have been confronted with that temptation because of us.

Skits. Teenagers can be a difficult group to work with. They are so media orientated that sometimes it can be hard to relate or keep their attention. Because of this difficulty, we have looked to what our teenagers watch for solutions. I have watched many skits and youth conference themes over the past few years and it is amazing how much they look like the world. If we are going to preach against the world and its things, is it wise to flavor our fun and activities worldly?

Technology is wonderful. I love to deploy new technology and watch its usefulness save time and money and help people. If we are not careful, we can also allow technology to be an unholy hindrance to our members.

(This article is also posted at PacificPublications.)

Five Ways to Keep Your Kids Safer When Socializing


Internet Access

About two weeks ago my anti-virus program e-mailed this. I thought it was rather interesting. To bad most parents probably don’t do it.

1) Talk with them about what they do online. Check out their social websites (and any personal profiles they’ve posted)—and set up your own account and profile on those sites. Also, familiarize yourself with the latest Internet trends.

2) Establish clear ground rules. Limit the amount of them [sic] they’re allowed to spend online. Discuss what should never be shared with others: passwords, phone numbers, full names, addresses, where they go to school, etc.

3) Keep tabs on their online messages. Make sure their communications are appropriate, including instant messages, e-mail, and e-mail attachments.

4) Encourage your child to ask for help. Tell them to trust their instinct if anything seems “off” (inappropriate photos, being bullied, or someone asking to meet offline)—and to let you know immediately.

5) Stress that nothing on the Internet is ever private. Whatever they post online is out there for anyone to see (even on a page labeled “private”). Even something e-mailed to one person can then be forwarded to thousands more.