Kategori Okategoriserat

Retro Mix 2022-05-26 (Retrospection Volume 1)

Going retro, with primary focus on the 1990’s!

Also on soundcloud:


00:00 – Who Da Funk feat. Jessica Eve – Shiny Disco Balls (Main Mix)
00:35 – 1984 vs Talla 2XLC (Flutlicht) – Picture Of You (Tornevall Remix, Enjoy The Silence)
02:56 – Motiv 8 – Rockin’ For Myself
03:39 – Dreamworld – Movin’ Up (Sleaze Sisters Anthem Mix)
06:23 – Technotronic & Global Deejays – Get Up (Tornevall Remix)
08:40 – D-Jastic – Up To No Good (Extended Mix)
09:35 – Club Enforcer – Here To Chill
10:54 – Dj Miko – Rhythm (Factory Team Mix)
13:45 – Melodie MC – Dum Da Dum 2009 (Radio edit)
16:10 – Lutricia McNeal – My Side of Town
17:46 – Gigi D’Agostino – Super (Original Version)
18:19 – Klubbheads – Kickin hard
19:05 – Helena Paparizou – Mambo
21:00 – U.S.U.R.A. – Open Your Mind
22:06 – Quadrophonia – Quadrophonia (United Bass Invaders Remix)
23:21 – Lolitta – Renegade Master (Original mix)
24:25 – 2 House – Go Techno (Tony Humphries Vocal Mix)
25:58 – Azzido Da Bass – Dooms Night (Timo Maas Radio Edit)
27:36 – C&C Music Factory – Gonna Make You Sweat (Everybody Dance Now, KaktuZ Remix)
28:19 – Bob Marley & Funkstar De Luxe – Sun Is Shining
29:53 – Cosmos Funk – Discoteque (Gym X Tonic Remix)
31:47 – Miami Sound Machine – Conga
31:14 – Andy Buchan – Andy Buchan
36:10 – Souvlaki – Inferno
37:17 – Spankox – To The Club (Extended Mix)
38:15 – The Grid – Swamp Thing (Radio Mix)
40:44 – Bobina – El Bimbo (Extended Remix)

PrestaShop 1.7.7.x and its unability to have complete configuration file

Stored by emergency below, as it seems that documentation widely spread over the world can’t have a complete, working, config file for prestashop in nginx. Here’s one, that worked perfectly without any weird issues with 404-errors, etc.

Don’t forget to check your hostname and/or eventually SSL configuration for port 443.


Emily vill lära sig hur man mixar musik – Så här blev resultatet

För första gången sedan jag en budget-DJ-mixer blev Emily intresserad av hur man mixar ihop musik. Jag bestämde mig för att visa. Även om videon ser lite stökig ut, förklarar jag för henne hur man märker upp sin musik för att veta var man lägger upp ”transitions” (övergångar). Under visningen märker jag hur hon börjar gilla musiken och det slutar med att hon vill ”ha den själv”.

Se nedan hur det hela slutade.


  1. TBR, Haohinh, Island Thugs & Geek Music – Twinkle Twinkle/A Nightmare on Elm Street (Twinkle Tornevall Mini Edit)
  2. Julian Jeweil – Hyoid
  3. P!nk – Get the Party Started
  4. Melé – Sunshowers
  5. The Transatlantis, India – I Can’t Live Without Music
  6. Matt Nash – ML4U
  7. Mischa – In a State
  8. Protonica, Tristate – Source Code
  9. Eeemus – Yunzjah
  10. Feral Creatures – Fake Friends
  11. Agustín Ficarra, Lucas Borda – Perception
  12. Rafael Osmo, Hezi Rachmani – Five Elements (Sterbai Remix)
  13. Olav Basosky – Waterman (Tornevall Microcut)
  14. ROBPM, MOTVS – Xxl
  15. Alexey Lisin – Travel of the Feeling
  16. Wavetraxx – Gates Of Eternity (Zondervan Remix)
  17. Grisha – No Trouble

Gear used: VirtualDJ / Numark Party Mix II

I have a static IP at OVPN but I want to route it from a Linux firewall. How do I fix this?

ovpn.com is a VPN service that offers VPN connectivity for OpenVPN and Wireguard. As of today ovpn.com has a beta release of static ip-addresses over Wireguard. As I, for some weird reason, love to collect ip-addresses I also have a few accounts at ovpn that has different tasks. They are however very much bound to a static interface and nothing less. The default solution does not allow you to forward the entire IP address somewhere else on your LAN, so if you need to give access to several machines this way, you have to set up port forwarding.

Now I have a server pool where different IP’s are routed to different places on my LAN Several years ago, I found out how to handle PRQ (Periquito) VPN routing, very much the same way when several ip-address was was configured.

But this problem can be solved both with OpenVPN and the WireGuard solution. Both OpenVPN and WireGuard allows post-up scripts where you explicitly can configure a more advanced routing.

Before starting #1

Before starting, remember when your VPN connectivity is about to be configured: Do a first traceroute from your VPN connection and see where the traffic goes like this:

root@ovpn-wg:/home/me# traceroute
traceroute to (, 30 hops max, 60 byte packets
 1 (  13.130 ms  12.973 ms  12.941 ms

As you can see, your first stop to internet is at – you need to know this and set up your local server to be for example (you use the entire network for this, like For OpenVPN a similar set up is based on instead.

Before starting #2

The first thing you should take care of, is the ip-forwarding. Go to /etc/sysctl.conf and change:


to …


This makes the changes permanent, since you probably want to use this at boot up. Then run sysctl -p to update the settings without the rebooting part. You have now ip forwarding rules activated.


For OpenVPN, I realize this is much straight forward. When OpenVPN is executed you just have to replace the IP-addresses like this:

ip addr del dev tun0
ip addr add dev tun0
ip route add dev eth0

For the moment, I usually set up the auto connectivity with OpenVPN with this script. At this point I have no better solution for a cronjob or service (I realize that I have to fix this too). So unless you use the script, there’s much of manually setting this solution up. By means, I’ve started to avoid this. But not only because cronjobbing OpenVPN is a pain, but also because OpenVPN compared to WireGuard is extremely slow. Mostly caused by the encryption libraries.

Coming this far, means you are probably ready to set up your LAN machine, so jump to that section from here.


For WireGuard, I actually used a new, clean, instance. I usually run openvz for my machines but OpenVZ does not support the user space setup that WireGuard requires. So instead, when I wrote this, I started with a new virtualbox server. If your machines or VM-host support wireguard, there would be no difference here for you.

Also, I use a bunch of scripts to make sure the OpenVPN is always running. This is not necessary for the WireGuard set up this far, so those parts are skipped.

Make sure you have the ip forwarding enabled as described above. Begin with installing WireGuard. This is done on Ubuntu 20.04, so it’s very straight forward from here too. As an option, you could install the recommended packages too, as in the example.

sudo apt install wireguard resolvconf

Copy your ovpn-config from ovpn and put it in /etc/wireguard. If you don’t know what this means, you have probably missed that part. You have to log in at ovpn.com and generate keys and the configuration first.

To entirely enable autostart on boot, run:

sudo systemctl enable wg-quick@vpn<num>-se-ipv4
sudo systemctl daemon-reload

After this, you are probably ready to connect.

sudo service wg-quick@vpn<num>-se-ipv4 restart

If everything works this far, you have this visible in your ip config (ip addr):

3: vpn<num>-se-ipv4: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
    inet <your-ip-address>/32 scope global vpn01-se-ipv4
       valid_lft forever preferred_lft forever

It is now time to check the trace, that was described before. See ”Before starting #1”, where you do the traceroute. If everything seems ok, you can now reconfigure your interface. Manually, it looks like this:

ip addr del <static-ip>/32 dev <vpn-device-name>
ip addr add dev <vpn-device-name>
ip route add <static-ip> dev <local-network-device>
ip route add dev <vpn-device-name>

The most likely scenario now, is that you won’t be able to reach the gateway from the server you’ve done this at. On the other hand, you will reach your client when the configuration is finished. This is probably cause by OVPN-firewalls. The local addresses are probably not permitted to communicate, since it has been set up for a static ip.

There might be more to fix here, for example OVPN endpoint is periodically pinging the static ip to check if it is alive. As we are forwarding traffic to another place, your server will report back that it is unavailable:

14:29:41.466350 IP > <static-ip>: ICMP echo request, id 54127, seq 12, length 24
14:29:44.529574 IP > ICMP host <static-ip> unreachable, length 52

That is something that I still have to work with, as long as no client is configured.

So, let’s continue to the client configuration.

Client Configuration

This is the easiest part. As you can see below, we till use ip rules here. You probably have another ip address configured at your local computer, so we need to tell the routing tables where to put the inbound- and outbound traffic for the static ip address:

ip addr add <static-ip>/32 dev enp4s0
ip rule add from <static-ip>/32 table <tableId>
ip route add default via <wireguard-gateway> table <tableId>

How do I script this, serverside?

To make life a bit easier, you can also script the above solution. If you use the example here, you can for example put that script in /etc/wireguard/reroute.sh – do not forget to chmod +x /etc/wireguard/reroute.sh

Also make sure that you change localNet and wgIp to what fits your connection. localNet for example could also be eth0 or eth1, while wgIp is the value reflected in the above traceroute.



echo "WireGuard"
if [ ! -f ${workDir}/${vpnName}.conf ] ; then

ipAddr=$(grep Address ${workDir}/${vpnName}.conf | awk '{printf $3}')

echo "Reroute ${ipAddr} to ${localNet}, exit interface is now ${wgIp}."

ip addr del $ipAddr dev ${vpnName} >/dev/null 2>&1
ip addr del $wgIp dev $vpnName >/dev/null 2>&1
ip addr add $wgIp dev $vpnName

# Remove the route if is already there, to make errors silent.
ip route del $ipAddr dev $localNet >/dev/null 2>&1
ip route add $ipAddr dev $localNet

ip route add dev ${vpnName}

When this is all done, add this row in the [Interface] section of the wireguard configuration:

PostUp = bash /etc/wireguard/reroute.sh %i


For this solution I never had to use any MASQUERADE-setup, but if you feel this is necessary, for example if you use many clients and this as a gateway and it’s absolutely necessary you can add this row:

iptables -t nat -A POSTROUTING -o <vpn-device-name> -j MASQUERADE

Probably this is less of a problem if you use the same ip-address network all the way out to the exiting point.

You’re done!

That’s it, folks!

If something went wrong, feel free to tell about it.