Archive for November, 2007

Configure the Maximum LDAP Connections in Kerio Mail Server

Friday, November 30th, 2007

1. Stop the Kerio Engine

2. Navigate to C:\Program Files\Kerio\MailServer\mailserver.cfg (sudo nano /usr/local/kerio/mailserver/mailserver.cfg on a Mac) and open the mailserver.cfg

3. Make a Copy of this file as a backup

4. Do a find for “ConnectionLimit”

5. Modify the following line:32

The default limit is 32.

6. After making the change, save the file and restart the mailserver engine.

Exporting Outlook 2003 Contacts & Importing to Mac OS X’s Address Book

Thursday, November 29th, 2007

If you want to do a complete one time export of your Outlook contacts and import them into you Mac Address Book.

From Outlook Select all your Contacts

Click Actions > Forward As Vcard

This will compose a New Email with all your contacts as separate Vcards. Then send the email to yourself, or any other email address you can check.

Download all your attachments into a separate folder, so you can select all in the next step

In the Finder Select all your Vcards and then just drag them into Address Book. Or you can go into Address book and File > Import > Vcards

Setting Up VPN Clients in OS X, Vista and Windows XP

Thursday, November 29th, 2007

The steps for setting up VPN connections are straightforward for both Macs and PCs. Here are the steps to follow for setting up new VPN connection on a client desktop or laptop to their server:

Mac OS X (Tiger) – * First, open the ‘Applications’ folder by going to the Finder and choosing “New Finder Window” from the “File” menu. Click on the ”Applications” icon, then scroll down until you see the “Internet Connect” icon. * Click on the “Internet Connect” icon. * Next, go to the ‘File’ menu and select “New VPN Connection Window.” * On the window that pops up prompting you to choose which type of VPN, click ‘PPTP,’ then click ‘Continue.’ * In the new window, for the configuration, Click on the ‘Other’ and select ’Edit Configurations…’ * A new window will come up. You should then type in a description of the VPN connection in the Description text field. * Type in the DNS name of the server you want to connect to as the ‘Server Address.’ * Type in the username you will use to access the server. This username should have already been created on the server. * In the next text box, enter your VPN password. The password should also have been previously set. * Un-check ’Enable VPN on demand’, and ’Encryption’ should be set to ’Automatic’. * Click the ’OK’ button. Your configuration is saved, and you are ready to connect.

Mac OS X (Leopard) – * Go to the Apple menu in the upper left-hand corner of the top menu. * Click on System Preferences from the drop-down menu. * Click on ‘Network’ icon. * In the right-hand menu, click on the drop-down menu next to ‘Configuration’ , which currently says ‘Default’, and select ‘Add Configuration’. * Type in a name the configuration CITES VPN or the alternate name you chose in step # 8.

Mac OS X (Lion) – * Go to the Apple menu in the upper left-hand corner of the top menu. * Click on System Preferences from the drop-down menu. * Click on ‘Network’ icon * Click on the ‘plus’ button on the bottom of the left column and choose VPN from the Interface dropdown menut. * Choose the type of connection from the ‘VPN Type’menu (typically PPTP). * Label the connection with a name of your choosing in the ‘Service Name’ field. * Enter the proper information in the the ‘Server Address’ and ‘Account Name’ fields * If you are not using a shared computer you can click on the ‘Authentication Settings’ button and enter your password to store it for future sessions * Check the box labeled, ‘Show VPN status in menu bar’ * From the menu choose Connect yourchosenVPNlabel – the status of the connection will update and start counting seconds when you are connected.

12. In the right-hand menu, enter the following information:

Configuration: DAS VPN (or a name of your choosing) Server Address: Account Name: Your guest ID Encryption: Maximum (128 bit only) from the drop-down menu

13. Check the box next to Show VPN status in menu bar.

Windows Vista: 1. From the Start Menu, right click on Network, select Properties. This will open the Network and Sharing Center. 2. On the left side, click on Set up a connection or network. 3. Select Connect to a workplace. 4. Click on the Next button. 5. Select Use my Internet connection (VPN). 6. Replace the Example with the actual WAN IP address of the VPN server you will be connecting to. Also, you can change the name from VPN Connection to something that is more meaningful. 7. Click on the Next button. 8. Enter in the User Name and Password of your VPN account. 10. Now from the Network and Sharing Center, you can go to Manage Network Connections to see the new VPN connection. This is also where you disconnect. To reconnect later, go to the Network and Sharing Center and click Connect to a network.

Time Navigator Installation Checklist

Monday, November 26th, 2007

This document will be followed up by a document with more detailed instructions for each checkbox.

Client management [ ] Talk to the client to verify the SOW from ATEMPO [ ] Discuss the amount of data and retention policies.

Preflight [ ] Verify host name of server and clients. [ ] Verify hardware. [ ] Verify version. Time Navigator gets new revisions quite often, check with your Atempo point of contact to make sure you have the latest version.


[ ] Atempo license email should have been sent to the client contact. [ ] Log into the Atempo license web site to the point where it asks for the host id. [ ] Log in to the computer as root. [all installations should be done as root, enable the root user if you need to] [ ] Run the License Manager Installation. [ ] Copy and paste the host id into the license web site [ ] Generate and download license key. [ ] Indicate the license key file in the License manager installer. [ ] Run Time Navigator installer. [ ] Designate the environment name. usually tina [ ] Designate ports. default to 2525 and 2526 [ ] When installation is complete restart the computer [ ] Start the Atempo launcher. [ ] Start “The Configurator” [ ] Create initial catalog. [ ] Detect attached tape drives and libraries. [ ] Start Tina Administrative console [ ] Run diagnostic test on all physical Drives [ ] Create VLS libraries [ if necessary ] [ ] Create tape Pools

Set up Agents on Back up clients [ ] Install initial agent. [ ] create package installer. [ ] deploy package to remaining agents [ ] install remaining non Mac OS X computers [ ] add agents as hosts. [ ] Create back up classes [ ] Create back up strategies [ ] run test back ups [ ] run restore tests [ ] Customize tina install to features of the client

Addendum :: Replication [ ] Select the host to be the source of replication [ ] Select Platform > Application > Filesystem [ ] Create back up class on new Application icon [ ] Create strategy with replication activated [ ] create destination within the strategy

Completion [ ] Review the SOW from Atempo with the Client [ ] Train the client on how to monitor backups.

Using Exmerge in Exchange 2003

Saturday, November 24th, 2007

Exmerge is an application that can be gotten from:

The above version is 06.05.7529 and is actually the version of ExMerge that was for Exchange 2003, but can be ran on versions as far back as Exchange 5.5.

Definition of ExMerge From Microsoft:

Brief Description Extract data from mailboxes on one server running Exchange and then merge that data into mailboxes on another server running Exchange with the help of this tool.

What it does is export mailbox(es) into a pst, and/or import mailboxes from a pst. It carries the followng items from the mailbox over: Rules Notes Journal

ExMerge can be ran in two ways. One way is to have it export and import directly into Exchange, the other is to run it where it will import into a newly created PST that ExMerge creates.

Creating Backup Jobs in PresSTORE

Friday, November 23rd, 2007

The user interface for PresSTORE is a bit confusing at first. Once you get beyond the initial installation you will need to create backup jobs, as with most other applications. To create each Backup Job:

Reopen browser window and click Start PresSTORE Browser Click on Job and Storage Management. Click on backup plans. Click on File->New Backup Plan. Enter a description for the backup plan (name of plan). Select the clients for the backup plan and then click the pencil icon to select which directories to backup. Set your File Filters. Click Apply and then click Close. Choose when to start the backup (can run multiple plans simultaneously). Set the backup schedule Select the Target for Full, Synthetic and Incrementals

Basic Installation of PresSTORE from Archiware

Friday, November 23rd, 2007

Installing PresSTORE

  • Enable Root User.
  • Extract the tar file you downloaded from the Internet.
  • Open the new directory and browse to the folder Server.
  • From the Server folder browse to the macosx folder.
  • From the macosx folder open the installer (awpstxxxx).
  • Click Continue 3 times and then Agree.
  • You will now be placed at the location to decide where you want to install PresSTORE. If you would like to install it on your boot drive then click Install. Otherwise click Change Install Location to customize where to install PresSTORE.
  • Enter root credentials to authenticate the software and click on OK.
  • When the installation is complete, login as root to the new software.
  • Click on Start PresSTORE Browser.
  • Click on General Setup.
  • Double-Click on licenses.
  • Click on File -> New License.
  • Enter Serial Number and License Key.
  • Select a module under Scope of License.
  • Click Apply and check if Message says “Resource updated”
  • Click close and close browser window.

Mac OS X: Showing Invisible Files

Tuesday, November 20th, 2007

Have you ever been looking for some files an you just can’t find them. Well, maybe they’re hidden. If you need to see hidden files, use the following command:defaults write AppleShowAllFiles -boolean true killall Finder

The problem with seeing hidden files is that you see a lot of stuff that you really probably don’t want to see. So to get back to a state where you don’t have to see all of the invisible files, use the following command: defaults delete AppleShowAllFiles killall Finder

Leopard: Flush the Cache Resolver

Tuesday, November 20th, 2007

So you need to empty your cache resolver, but you fire up your handy lookupd but you’re getting a command not found error. What to do… Try dscacheutil, which let’s you do so very much more than lookupd. For example, using the -cachedump allows you to dump an overview of the cache contents. -cachedump has a slew of flags to get pretty granular with the output such as -entries and -buckets. -configuration allows you to access detailed information about your search policy. -statistics allows you to view detailed information on statistics of calls.

Examples of using these commands: Empty the DNS Cache Resolver: dscacheutil -flushcache

Dump cache with user entries: dscacheutil -cachedump -entries user

Lookup all the users on a system: dscacheutil -q user

Leopard Server: Use Unsupported Disks with Time Machine

Tuesday, November 20th, 2007

If you want to use an unsupported disk type for your Time Machine archives, running the following command on workstations will allow you to do so: defaults write TMShowUnsupportedNetworkVolumes 1

Leopard Server: Auto-populate User Lists in iChat Server

Tuesday, November 20th, 2007

If you want to enable the auto-population of buddy lists for users of your iChat server, use the following command: serveradmin settings jabber:enableAutoBuddy = no

If you have a lot of users and this causes performance issues, consider disabling this feature again by using the following command: serveradmin settings jabber:enableAutoBuddy = yes

Leopard Server: Re-skin WebMail

Tuesday, November 20th, 2007

The default “skin” of the WebMail server (SquirrelMail) in OS X server leaves a lot to be desired to some. So we thought that we would post some of the more popular skins/themes (or collections of themes) that we’ve been using so you can check them out:

Happy skinning!

Leopard: Making the Top Menu Bar Solid

Tuesday, November 20th, 2007

In Leopard the Top Menu Bar is fairly transparent and will overlay on top of the background image. For those who want to disable it the following command will do so: write /System/Library/LaunchDaemons/ 'EnvironmentVariables' -dict 'CI_NO_BACKGROUND_IMAGE' 1

We have seen some reports that this command didn’t work for users; therefore it is important to point out that when you’re using the command you need to unload and load the launch daemon.  Or just reboot.  If you later start to miss this menu bar then you can undo this change by using the following command:

defaults write /System/Library/LaunchDaemons/ 'EnvironmentVariables' -dict 'CI_NO_BACKGROUND_IMAGE' 0

Leopard Server: Customizing iChat Server Welcome Messages

Tuesday, November 20th, 2007

Customizing the welcome message to new users of your iChat server is a fairly simple task. For this, we’ll look into the jabber configuration because jabber is the Open Source package that iChat Server is built on.

When you first setup jabber the /etc/jabber directory will be created. Inside this folder will be a file called jabber.xml. If you open the jabber xml file and look for the “welcome” tag then anything between the "welcome" and "/welcome" will be the information that is shown in a welcome screen when a new user signs onto the iChat server. Before you edit the /etc/jaber/jabber.xml file make sure to back it up.

For this example we will have all new users receive a message that says Welcome to the 318 iChat Server. To do this, delete or comment out the information between the existing welcome tags and add the following information:

"welcome" "subject"318 iChat Server"/subject" "body"Welcome to the 318 iChat Server"/body" "/welcome"

Save the jabber.xml file and you’ve now customized the welcome message for your iChat server.

Note, for the purpose of this article the < and > have been replaced with quotes (“). However, you will need to use the < and > in your environment while using the Jabber.xml file.

Restoring a Locked iPod Touch

Tuesday, November 20th, 2007

NOTE: This will ERASE the iPod and restore it back to factory settings.

1. Plug the iPod Touch into the computer, open iTunes.

2. Hold the SLEEP and HOME buttons on the iPod Touch until it restarts. When you see the Apple Logo, let go of the sleep button.

3. The iPod should show up in iTunes and you can now restore it.

Resolving Common Blackberry Problems

Thursday, November 15th, 2007

TITLE Common BlackBerry Problems

TOPIC The are some very common issues that Consultants will encounter with our clients’ BlackBerry handheld devices. Consultants should be able to identify the cause of these problems in order to resolve or escalate the issue.

DISCUSSION These are the common problems you will encounter -

1. Device not receiving/sending email i. Check to ensure the user is receiving a data signal to the device o If working on a Cingular device look for a capital GPRS in the upper right-hand corner next to the antenna icon. o If working on a Verizon device look for a capital 1X in the upper right-hand corner next to the antenna icon. ii. If either the GPRS or 1X symbol is not present, RESET the device o Remove the battery for approx. 5 secs and replace to force a “hard reset” of the device. iii. Check the BlackBerry Exchange Serve (BES) for messages stuck in the queue

3. If either the GPRS or 1X symbol is present but data (email) is still not being received check to ensure that Wireless Reconcile is ON o Open email application > Open the Menu and select Options > Open Email Reconciliation and highlight Wireless Reconcile > use the Spacebar to change option to ON > Open the Menu and Save > Exit

A Webclient account is an online Internet web interface that allows you to configure certain parameters of your BlackBerry service. To setup a Webclient account, open an Internet browser, enter the address based on your carrier as indicated in the table below and follow the instructions for creating the new account.






Leopard Server: Sharing Folders using Server Admin

Friday, November 2nd, 2007

We’ve gotten a few questions from people asking how you’re supposed to setup share points for Leopard Server. It’s relatively simple but will require a little getting used to for those who are used to configuring sharing options in Workgroup Manager.

To view the shared folders on a system, open Server Admin and click on the name of the server in the SERVERS list. From here, click on the File Sharing button in the Server Admin toolbar and you will see a list of the logical volumes that your server can see along with a handy Disk Space image showing how full the various volumes are. At this point you can click on Share Points to see which folders are currently being shared over SMB, AFP, NFS or FTP. If you click on Volumes and then the Browse button then you will be able to configure new folders to become share points that you want others to get access to. Browse to the folder to be shared and then click on the share button in the upper Right hand corner below the tool bar.

Now you are looking at 3 tabs along the bottom of the screen: Share Point, Permissions and Quotas. From here, click on Share Point and review the options: Enable AutoMount – provides options to setup an OD link to the volume Enable Spotlight Searching – allow the volume to be searchable using Spotlight Enable as TimeMachine Backup Destination – client computers can backup using Time Machine Protocol Options – brings up the screen that allows SMB, AFP, NFS and FTP settings to be configured (looks very similar to the old screen in Workgroup Manager)

Once you have configured the options for your share point click over to the Permissions tab. Now you can configure who has access to shared data. From here, the main change is that the Users and Groups window is a floating window, with a new look and feel, but with the same overall feature set. The next major change is that ACLs are listed above POSIX permissions, and when you drag a user or group into the window you will see a blue line indicating that you can drop the object off into the screen and it will stay.

Finally, click on the Quotas tab and notice that when you enable quotas you cannot drag users and groups into this window. Only users with a home folder on the volume can be configured for quotas using Server Admin. If you would like to configure quotas otherwise you can do so at the command line.

Citrix and Open Source

Friday, November 2nd, 2007

It seems like everyone wants to dabble in the Open Source market these days. First came the RedHat, VA Linux and other public companies using Open Source technologies to ramp up. Then IT giants such as Novell, Sun and Apple started to come to markets with products faster due to their newfound Open Source roots. Now a lot of other companies are jumping on the bandwagon and introducing products based on Open Source technologies or purchasing other companies to help them do so quickly.

Citrix has purchased XenSource, a company that provided virtualization products based on the Xen Open Source virtualization platform. XenSource is now a prodcut of Citrix that is meant to compete directly with VMWare on the virtualization scene. Why use something like XenSource instead of just building a virtual cluster based on the actual Open Source Xen packages? Citrix offers annual support plans for Standard Edition, which allows customers to receive support. In addition, Citrix is providing free web-based resources, including online product documentation, a knowledge base, and discussion forums, as is done with their popular Metaframe products. And of course, XenSource becomes the preferred platform to run Citrix clusters on. Not that VMWare won’t do a fine job, but support will be a lot easier if you’re using XenSource.

ZFS: What was all that fuss about?

Friday, November 2nd, 2007

ZFS was released by a team at Sun in November of 2004. The name stands for “Zettabyte File System”. ZFS is a 128-bit file system, so it can store 18 billion billion (18.4 × 1018) times more data than current 64-bit systems. We’re not going to sit here and do the math for that but you are more than welcome to figure out what the theoretical size is at that point – all we can say is that it’s friggin’ huge.

Traditional file systems reside on single devices and require a volume manager to use more than one device to generate a logical or physical volume. ZFS is built on top of virtual storage pools called zpools. A zpool is constructed of virtual devices called vdevs. Vdevs are constructed of block devices that include files, partitions, or drives. Block devices within a vdev can be configured in a variety of different manners, depending on the needs of a user. The storage capacity of all vdevs is available to all of the file system instances in the zpool. This is similar in some ways to how Xsan builds volumes, but more customizable and without a requirement for vdevs to be based on Fibre Channel storage in order to be accessible by multiple hosts.

Quotas can be set to limit the amount of space a file system instance can occupy and a reservation can be set to guarantee that space will be available to a file system instance. This gives some nice features to those wanting to limit access for some volumes while still making sure other volumes have the space that will be required for planned future possible expansions. Other features of ZFS include: snapshots, write-cache, filesystem based encryption (in Alpha stage of development) and checksumming.

While users of Leopard may be disappointed in the fact that ZFS did not make it in the final build, giving greater volume sizes and more features for volume management, rest assured that Apple will be thoroughly testing any new file systems before making them available to the public and that with something as precious as a file system, if it wasn’t ready for prime time then it’s good that it wasn’t included with Leopard. ZFS is still going through changes and is not a completed or matured project by any stretch of the imagination. In /Library/FileSystems you will see that ZFS is not present but the framework for future ZFS is present which can be seen by the introduction of some ZFS binaries to the system. So keep a look out for ZFS in the future and maybe even an SDK from SUN on using it at some point.

iWork and iLife 08 Documents and Retrospect

Friday, November 2nd, 2007

iWork ’08 applications (Keynote, Numbers, Pages) and iLife ’08 components including iPhoto, iTunes, Garage Band have a slight issue with Retrospect – their data files are not considered documents using the Documents Selector. Now in the case of iPhoto, iTunes and Garage Band this is probably a good thing. However, for Keynote, Numbers and Pages it’s more than likely that if you’re using these then you will want Retrospect to back them up. So if you are using selectors and you are using the Documents selector then check out this Knowledgebase article from EMC/Dantz:

Leopard Server: Using RADIUS with the Apple AirPort

Thursday, November 1st, 2007

Remote Authentication Dial In User Service (RADIUS) can help to take the security of your wireless network to the next level beyond standard WPA authentication. Prior to Leopard RADIUS communications could be obtained using Elektron or OpenRADIUS running on OS X – but in Leopard no 3rd party software is required beyond Leopard Server. So how difficult is it to setup RADIUS on Leopard? You be the judge after reading this quick walkthrough. For the purpose of this walkthrough we are going to assume that you are using the Advanced Mac OS X Server style.

Before you begin this walkthrough, make sure that the server is running Open Directory and that the forward and reverse DNS information for the server is correct.

The first step to using RADIUS is to enable it. To do this, open Server Admin, click on the name of the server in the SERVERS list and click on the Services tab. Find RADIUS in the services list and place a checkmark in the box to the left of it. When you click on Save then you should see RADIUS in the SERVERS list.

Now that RADIUS has been enabled, let’s select a certificate. For the use of this walkthrough we’re going to use the default certificate that comes with OS X Server. Click on RADIUS under the SERVERS list and then click on the Settings button. Click on the RADIUS Certificate drop-down menu and select the Default certificate. Click on the Edit Allowed Users… button.

By default all users of the OS X Server will have access to authenticate to the wireless network setup, so here we are going to click on the For Selected Services below Radio Button. Then click on RADIUS in the Service list. Now click on Allow Only Users and Groups Below and then click on the + sign. Now drag the users and groups into the Name list from the Users and Groups window. Once all users that should have access to your new wireless environment have been enabled, click on the Save button.

From here, click on RADIUS and click on the Start RADIUS button in the bottom left hand corner of the screen. RADIUS is now ready to accept authentication. The next step is to configure an AirPort to work with RADIUS. To do this, click on the Base Stations button in the toolbar at the top of the screen. Now click on Browse and select the first base station of your new wireless environment from the list of found base stations. Enter the password for the AirPort and click on Save. Wait for the AirPort to complete its restart and then you should be able to log in from a client.

To log in from a client, select the name of the wireless network from the wireless networks list and enter the username and password to the environment. The first time you do so you will get a second dialog asking you to enter the 802.1x username and password. Enter the same username and password and click on OK. If you click on the “Use this Password Once” checkbox then this password will not be saved for future use.

That’s it, you’re done. Now this setup may be a little more complicated than WPA personal or WEP 128, but it’s far more secure and should be considered for any AirPort environment that has an OS X Server. While the default certificate will work for clients, things are often easier from a deployment and interoperability perspective if you purchase a certificate from a CA such as Thawte. Also, this has all been tested in a pure Mac OS X Leopard environment, not with an OD structure based on Tiger. More on that as time goes on…

Leopard Server: Mailbfr, spamtrainer and amavis-stats

Thursday, November 1st, 2007

Mailbfr, spamtrainer and amavis-stats are great packages that fit into Mac OS X Server. The guys from topicdesk have been kind enough to post an overview on how their products work under Leopard and how the changes in Leopard impact their utilization. Check it out at:

Installing Lithium on Mac OS X

Thursday, November 1st, 2007

Installing Lithium Core 4.9.0 Make sure the system is not currently a web server and port 80 is available. Download the Lithium 4.9.0 package. Double-click on the Core 4.9.0 Installer. Click Continue through the license agreement screens. Choose the packages to install and click on Continue. Choose the location to install the Lithium Core application and click on Install. Enter the credentials of an administrator and Click OK. When the installer is complete, click on the Close button. Open Lithium Core Admin from the /Applications folder. Click Next and enter the name of the client for whom you are installing Lithium. Click Next and enter a new administrative username and password for accessing Lithium. Click Next and you will be placed into the database configuration screen. Unless you are using PostgreSQL on another host, do not modify these settings. Click Next and double-check the settings. If they look good then click on the Finish button and enter administrative credentials to commit the changes. When you open Lithium Console from the /Applications folder for the first time you will be asked whether you would like to check for updates each time. Click Yes. You have now installed Lithium and can move on to adding hosts to be monitored.

New Mac Trojan Discovered

Thursday, November 1st, 2007

Monday, October 29th, 2007 – Intego issued a security alert about a new Trojan Horse called OSX.RSPlug.A targeting the Mac. OSX.RSPlug.A changes the DNS (Domain Name Server) address that infected systems use to access web sites and installs a new task on infected systems to change the DNS server again if the end user changes it back to what it was before. This is similar to many attacks against the Windows Hosts files. However, if anyone is going to get this worm they have to authenticate as an administrative user for their system to get infected.

OSX.RSPlug.A has been found on some pornographic Web sites and when an user is trying to view a movie, they are told that “Quicktime Player is unable to play movie file. Please click here to download new version of codec.” If the user clicks the link a disk image (.dmg) is downloaded to the desktop. When the software is used, the user is actually installing the Trojan as root, giving it access to the full computer. When the malicious DNS server is active, it hijacks some web requests, leading users to phishing web sites or to web pages displaying ads for other pornographic web sites, according to Intego.

For more information, see the original security alert from Intego at:

BarCamp LA -> 4

Thursday, November 1st, 2007

There’s an open source conference of sorts coming up in LA on November 3rd. It’s called BarCamp. Check it out at:

We start by gathering together in one space and going around the room to introduce ourselves with three tags to describe what we’re passionate about (or want to talk about). There will also be some announcements. After this, people who intend to lead a session will add their session info to an empty schedule grid (may be moved around early on). If you see a session you’re interested in, go to it.

After a couple of sessions, you will have a significant amount of downtime for lunch. Feel free to wander around and socialize while or after you eat. More announcements will be made, and any newly proposed sessions will be announced.

After the sessions are finished, please stick around to clean up. It’s generally as simple as throwing trash away and taking down signs, but all the help is appreciated.

If you brought wireless equipment or power strips, find a coordinator and ask where they’re most needed. Please set your wireless router to a unique SSID (e.g.- barcamp_xxx), to avoid networking conflicts (nasty with a dozen routers in the same room named the same thing). Also, if you can, please lower the radio output of your router. There’ll be plenty of WiFi cloud to go around without everyone blasting out at full power.

While loosely structured, there are rules at BarCamp. All attendees are encouraged to present or facilitate a session. Everyone is also asked to share information and experiences of the event, both live and after the fact, via public web channels including (but not limited to) blogging, photo sharing, social bookmarking, wiki-ing, and IRC. This open encouragement to share everything about the event is in deliberate contrast to the “off the record by default” and “no recordings” rules at many private invite-only participant driven conferences.

Fun stuff. November 4th, check it out.