Lost Incredible PBX password after installation

1,Change MySQL password
Get Debian mysql password
$sudo cat /etc/mysql/debian.cnf | grep -i password
$mysql -u debian-sys-maint -p

mysql> UPDATE mysql.user SET Password=PASSWORD(‘new password’) WHERE User=’root’;
mysql> FLUSH PRIVILEGES;
mysql> quit;
$mysql_secure_installation

2,Change PBX Web password
$mysql -u root
mysql>use asterisk
mysql> update ampusers set password_sha1 = sha1(‘newpass’) where username = ‘admin’ limit 1 ;
mysql> flush privileges;
mysql> quit

Tube size

Tube diameter in 18 in (3.175 mm) Nominal length Nominal power (W)
T5 6 in, 150 mm 4
T5 9 in, 225 mm 6
T5 12 in, 300 mm 8
T5 21 in, 525 mm 13
T8 18 in, 450 mm 14
T8 2 ft, 600 mm 18
T8 3 ft, 900 mm 30
T8 4 ft, 1200 mm 36
T8 5 ft, 1500 mm 58
T12 18 in, 450 mm 15
T12 2 ft, 600 mm 20
T12 4 ft, 1200 mm 40
T12 5 ft, 1500 mm 65, 80
T12 6 ft, 1800 mm 75, 85
T12 8 ft, 2400 mm 125

Base Types
LED Light Bulb Base Types
Bi-pin connector
automotive light bulb types

Openvpn over IPV6

1,Settings
Starting officially in the 2.3.0 release, OpenVPN supports IPv6 inside the tunnel, and can optionally be configured with IPv6 as a transport protocol for the tunneled data.
To connect to your server over ipv6 (ipv6 transport) use this on both sides:(Both ipv4 and ipv6 will be supported)
proto udp6

2,build client keys
On client :
$sudo apt-get install openvpn
$sudo openvpn –config /path/to/config.ovpn

how to add another client cert in openvpn
assuming you have vars ca.key ca.crt index.txt serial.txt and the rest of files you do
#source ./vars
#./build-key client
DONT do clean-all..

3,Setting up client
The files that need to be securely copied to the client’s /etc/openvpn directory are:
/etc/openvpn/ca.crt
/etc/openvpn/server.key
/etc/openvpn/easy-rsa/keys/client.crt
/etc/openvpn/easy-rsa/keys/client.key

setting owner to be root and mode 600 to key files and 644 to crt files

sudo cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf /etc/openvpn
Open up /etc/openvpn/client.conf with a text editor (such as Nano or vi) and take a look at the following section:

dev tun
remote vpn.server.com 1194 #change to your server’s FQDN
cert client.crt
key client.key
ns-cert-type server
#tls-auth ta.key 1

sudo /etc/init.d/openvpn restart