Category Archives: Toolset

WordPress Default Error Codes (also good for other systems)
Date Created: July 13, 2017  Date Modified: July 13, 2017

WordPress error codes sit in functions.php, they are well worth learning–especially if you are not familiar with error codes.


100 => 'Continue',
101 => 'Switching Protocols',
102 => 'Processing',

200 => 'OK',
201 => 'Created',
202 => 'Accepted',
203 => 'Non-Authoritative Information',
204 => 'No Content',
205 => 'Reset Content',
206 => 'Partial Content',
207 => 'Multi-Status',
226 => 'IM Used',

300 => 'Multiple Choices',
301 => 'Moved Permanently',
302 => 'Found',
303 => 'See Other',
304 => 'Not Modified',
305 => 'Use Proxy',
306 => 'Reserved',
307 => 'Temporary Redirect',
308 => 'Permanent Redirect',

400 => 'Bad Request',
401 => 'Unauthorized',
402 => 'Payment Required',
403 => 'Forbidden',
404 => 'Not Found',
405 => 'Method Not Allowed',
406 => 'Not Acceptable',
407 => 'Proxy Authentication Required',
408 => 'Request Timeout',
409 => 'Conflict',
410 => 'Gone',
411 => 'Length Required',
412 => 'Precondition Failed',
413 => 'Request Entity Too Large',
414 => 'Request-URI Too Long',
415 => 'Unsupported Media Type',
416 => 'Requested Range Not Satisfiable',
417 => 'Expectation Failed',
418 => 'I\'m a teapot',
421 => 'Misdirected Request',
422 => 'Unprocessable Entity',
423 => 'Locked',
424 => 'Failed Dependency',
426 => 'Upgrade Required',
428 => 'Precondition Required',
429 => 'Too Many Requests',
431 => 'Request Header Fields Too Large',
451 => 'Unavailable For Legal Reasons',

500 => 'Internal Server Error',
501 => 'Not Implemented',
502 => 'Bad Gateway',
503 => 'Service Unavailable',
504 => 'Gateway Timeout',
505 => 'HTTP Version Not Supported',
506 => 'Variant Also Negotiates',
507 => 'Insufficient Storage',
510 => 'Not Extended',
511 => 'Network Authentication Required',

I hope this helps for when customizing WordPress.

LDAP Error table
Date Created: December 17, 2015  Date Modified: December 17, 2015

I was debugging my LDAP bridge and felt I needed to put these here

Error / Data Code Error Description
0 LDAP_SUCCESS Indicates the requested client operation completed successfully.
1 LDAP_OPERATIONS_ERROR Indicates an internal error. The server is unable to respond with a more specific error and is also unable to properly respond to a request. It does not indicate that the client has sent an erroneous message. In NDS 8.3x through NDS 7.xx, this was the default error for NDS errors that did not map to an LDAP error code. To conform to the new LDAP drafts, NDS 8.5 uses 80 (0x50) for such errors.
2 LDAP_PROTOCOL_ERROR Indicates that the server has received an invalid or malformed request from the client.
3 LDAP_TIMELIMIT_EXCEEDED Indicates that the operation’s time limit specified by either the client or the server has been exceeded. On search operations, incomplete results are returned.
4 LDAP_SIZELIMIT_EXCEEDED Indicates that in a search operation, the size limit specified by the client or the server has been exceeded. Incomplete results are returned.
5 LDAP_COMPARE_FALSE Does not indicate an error condition. Indicates that the results of a compare operation are false.
6 LDAP_COMPARE_TRUE Does not indicate an error condition. Indicates that the results of a compare operation are true.
7 LDAP_AUTH_METHOD_NOT_SUPPORTED Indicates that during a bind operation the client requested an authentication method not supported by the LDAP server.
8 LDAP_STRONG_AUTH_REQUIRED Indicates one of the following: In bind requests, the LDAP server accepts only strong authentication.

In a client request, the client requested an operation such as delete that requires strong authentication. In an unsolicited notice of disconnection, the LDAP server discovers the security protecting the communication between the client and server has unexpectedly failed or been compromised.

9 Reserved.
10 LDAP_REFERRAL Does not indicate an error condition. In LDAPv3, indicates that the server does not hold the target entry of the request, but that the servers in the referral field may.
11 LDAP_ADMINLIMIT_EXCEEDED Indicates that an LDAP server limit set by an administrative authority has been exceeded.
12 LDAP_UNAVAILABLE_CRITICAL_EXTENSION Indicates that the LDAP server was unable to satisfy a request because one or more critical extensions were not available. Either the server does not support the control or the control is not appropriate for the operation type.
13 LDAP_CONFIDENTIALITY_REQUIRED Indicates that the session is not protected by a protocol such as Transport Layer Security (TLS), which provides session confidentiality.
14 LDAP_SASL_BIND_IN_PROGRESS Does not indicate an error condition, but indicates that the server is ready for the next step in the process. The client must send the server the same SASL mechanism to continue the process.
15 Not used.
16 LDAP_NO_SUCH_ATTRIBUTE Indicates that the attribute specified in the modify or compare operation does not exist in the entry.
17 LDAP_UNDEFINED_TYPE Indicates that the attribute specified in the modify or add operation does not exist in the LDAP server’s schema.
18 LDAP_INAPPROPRIATE_MATCHING Indicates that the matching rule specified in the search filter does not match a rule defined for the attribute’s syntax.
19 LDAP_CONSTRAINT_VIOLATION Indicates that the attribute value specified in a modify, add, or modify DN operation violates constraints placed on the attribute. The constraint can be one of size or content (string only, no binary).
20 LDAP_TYPE_OR_VALUE_EXISTS Indicates that the attribute value specified in a modify or add operation already exists as a value for that attribute.
21 LDAP_INVALID_SYNTAX Indicates that the attribute value specified in an add, compare, or modify operation is an unrecognized or invalid syntax for the attribute.
22-31 Not used.
32 LDAP_NO_SUCH_OBJECT Indicates the target object cannot be found. This code is not returned on following operations: Search operations that find the search base but cannot find any entries that match the search filter. Bind operations.
33 LDAP_ALIAS_PROBLEM Indicates that an error occurred when an alias was dereferenced.
34 LDAP_INVALID_DN_SYNTAX Indicates that the syntax of the DN is incorrect. (If the DN syntax is correct, but the LDAP server’s structure rules do not permit the operation, the server returns LDAP_UNWILLING_TO_PERFORM.)
35 LDAP_IS_LEAF Indicates that the specified operation cannot be performed on a leaf entry. (This code is not currently in the LDAP specifications, but is reserved for this constant.)
36 LDAP_ALIAS_DEREF_PROBLEM Indicates that during a search operation, either the client does not have access rights to read the aliased object’s name or dereferencing is not allowed.
37-47 Not used.
48 LDAP_INAPPROPRIATE_AUTH Indicates that during a bind operation, the client is attempting to use an authentication method that the client cannot use correctly. For example, either of the following cause this error: The client returns simple credentials when strong credentials are required…OR…The client returns a DN and a password for a simple bind when the entry does not have a password defined.
49 LDAP_INVALID_CREDENTIALS Indicates that during a bind operation one of the following occurred: The client passed either an incorrect DN or password, or the password is incorrect because it has expired, intruder detection has locked the account, or another similar reason. See the data code for more information.
49 / 52e AD_INVALID CREDENTIALS Indicates an Active Directory (AD) AcceptSecurityContext error, which is returned when the username is valid but the combination of password and user credential is invalid. This is the AD equivalent of LDAP error code 49.
49 / 525 USER NOT FOUND Indicates an Active Directory (AD) AcceptSecurityContext data error that is returned when the username is invalid.
49 / 530 NOT_PERMITTED_TO_LOGON_AT_THIS_TIME Indicates an Active Directory (AD) AcceptSecurityContext data error that is logon failure caused because the user is not permitted to log on at this time. Returns only when presented with a valid username and valid password credential.
49 / 531 RESTRICTED_TO_SPECIFIC_MACHINES Indicates an Active Directory (AD) AcceptSecurityContext data error that is logon failure caused because the user is not permitted to log on from this computer. Returns only when presented with a valid username and valid password credential.
49 / 532 PASSWORD_EXPIRED Indicates an Active Directory (AD) AcceptSecurityContext data error that is a logon failure. The specified account password has expired. Returns only when presented with valid username and password credential.
49 / 533 ACCOUNT_DISABLED Indicates an Active Directory (AD) AcceptSecurityContext data error that is a logon failure. The account is currently disabled. Returns only when presented with valid username and password credential.
49 / 568 ERROR_TOO_MANY_CONTEXT_IDS Indicates that during a log-on attempt, the user’s security context accumulated too many security IDs. This is an issue with the specific LDAP user object/account which should be investigated by the LDAP administrator.
49 / 701 ACCOUNT_EXPIRED Indicates an Active Directory (AD) AcceptSecurityContext data error that is a logon failure. The user’s account has expired. Returns only when presented with valid username and password credential.
49 / 773 USER MUST RESET PASSWORD Indicates an Active Directory (AD) AcceptSecurityContext data error. The user’s password must be changed before logging on the first time. Returns only when presented with valid user-name and password credential.
50 LDAP_INSUFFICIENT_ACCESS Indicates that the caller does not have sufficient rights to perform the requested operation.
51 LDAP_BUSY Indicates that the LDAP server is too busy to process the client request at this time but if the client waits and resubmits the request, the server may be able to process it then.
52 LDAP_UNAVAILABLE Indicates that the LDAP server cannot process the client’s bind request, usually because it is shutting down.
53 LDAP_UNWILLING_TO_PERFORM Indicates that the LDAP server cannot process the request because of server-defined restrictions. This error is returned for the following reasons: The add entry request violates the server’s structure rules…OR…The modify attribute request specifies attributes that users cannot modify…OR…Password restrictions prevent the action…OR…Connection restrictions prevent the action.
54 LDAP_LOOP_DETECT Indicates that the client discovered an alias or referral loop, and is thus unable to complete this request.
55-63 Not used.
64 LDAP_NAMING_VIOLATION Indicates that the add or modify DN operation violates the schema’s structure rules. For example,

The request places the entry subordinate to an alias. The request places the entry subordinate to a container that is forbidden by the containment rules. The RDN for the entry uses a forbidden attribute type.

65 LDAP_OBJECT_CLASS_VIOLATION Indicates that the add, modify, or modify DN operation violates the object class rules for the entry. For example, the following types of request return this error:

The add or modify operation tries to add an entry without a value for a required attribute. The add or modify operation tries to add an entry with a value for an attribute which the class definition does not contain. The modify operation tries to remove a required attribute without removing the auxiliary class that defines the attribute as required.

66 LDAP_NOT_ALLOWED_ON_NONLEAF Indicates that the requested operation is permitted only on leaf entries. For example, the following types of requests return this error:

The client requests a delete operation on a parent entry. The client request a modify DN operation on a parent entry.

67 LDAP_NOT_ALLOWED_ON_RDN Indicates that the modify operation attempted to remove an attribute value that forms the entry’s relative distinguished name.
68 LDAP_ALREADY_EXISTS Indicates that the add operation attempted to add an entry that already exists, or that the modify operation attempted to rename an entry to the name of an entry that already exists.
69 LDAP_NO_OBJECT_CLASS_MODS Indicates that the modify operation attempted to modify the structure rules of an object class.
70 LDAP_RESULTS_TOO_LARGE Reserved for CLDAP.
71 LDAP_AFFECTS_MULTIPLE_DSAS Indicates that the modify DN operation moves the entry from one LDAP server to another and requires more than one LDAP server.
72-79 Not used.
80 LDAP_OTHER Indicates an unknown error condition. This is the default value for NDS error codes which do not map to other LDAP error codes.

Chrome Timeline
Date Created: September 9, 2012  Date Modified: September 10, 2012

Before Chrome came out we all loved the functionality firebug bought to firefox, and being that I have been using FF recently I had forgotten how much better Chrome’s debugging toolset is. One of the tools I missed was the timeline, being able to see a visulization of your scripts and their load is really something that does pleasth. I noticed as you can see in the pic below, what scripts were resource hungry, and also which image element I could optimise to save that bit of bandwidth.
To activate the timeline, just right click your page > inspect element > Click the Timeline tab, then hit the record button in the bottom left toolbar, 4th button along (black circle will turn red when recording).

Click this and refresh your page and watch the fun. Hit the record button again to stop recording once the page has stopped loading all its elements.
Looks like I have some site maintenance to do…

NOTE: The information used in the Chrome tool shows speeds of the Chrome browser, it is still worth checking this against other tools, as IE and Mozilla may load at different rates depending on a number of variables.

I dont think so
Date Created: October 2, 2011  Date Modified: January 7, 2013

Had an interview at a local design agency, one that actually does design. I dont think I will be the successful candidate, as I made two cardinal sins in the design field.

First off was calling Mac’s evil empire machines, yes I have a bias against Apple, but one must never let opinion override professionalism.

The second, wich ties in with the first a little was that I mentioned flash, the rule here is: dont bring up old technology. Sure flash is still used, but its no longer held in the same regard as it once was. I tnink if I can overcome my own perzonal bias I will have no trouble securing the next placement.

I have decided to move my site to…
Date Created: November 8, 2009  Date Modified: September 4, 2011


This post was the Hello World for this wordpress installation that I had on my site, but only used as a sandbox and sample site for projects; both my own and for clients. At the time I chose not to use wordpress as the CMS driving this site–I was wanting to be taken seriously as a CMS developer and it would, as I thought, have been counter-intuitive to use a blogging platform as a Content Management System.

Some time has passed since then and I have worked with a number of systems and considered at one point even using MySource Matrix here. At first some might consider that as overkill but as a Web Developer who deals with multiple sites, an enterprise level CMS built for multi-site, multi-domain deployment could have been an interesting way of managing projects… I decided against it for obvious reasons.

Anyway, nearly two years passed without any software driving these pages–but now we have it. WordPress. Lets see how long it is before I switch to Drupal (which I also have on this server for the same reasons and length of time as WP).

ots late and there is much to do. at least this migration wont take too long…

Tools for HTML
Date Created: June 1, 2009  Date Modified: September 14, 2011

To code in HTML you dont need anthing more than notepad, althou commercial products like Dreamweaver offer several useful tools that are used by serious web designers. You can build effective websites using these commercial products without too much knowledge of HTML, but the more understanding of it you have, the easyer it will be to build and maintain your web site or blog.

There are two basic types of tools used in web design, there are text editors and there are what is known as WYSIWYG(what you see is what you get) editors. I will be refering mainlt to text editors, but dont let that scare you!, everything I tell you do do in a text editor you can do in a commercial HTML application.

In this site I will however not be refering to commercial puoducts, and I will keep references to only freeware products that you can download. All products have been tested by me to run on Windows Vista and XP, and they have packages avalible for linux too.

The first tool I suggest you download is Notepad++. I wont say too much about this program now, only that it is similar to the Windows Notepad, thou it has added functionality that you will find useful when coding HTML and CSS.

The second tool I sugest you get, and will be refering to it on occasion if the free text editor HTMLkit. I have been using it for years, both by it self and also along slid Dreamweaver, and I find it to be a great little free tool for web designers. Many commercial designers I have put on to this pruduct love it, and still use it today.

Next there is Nvu, a WYSIWYG. I have only been using this product for a few months as a free replacment for Dreamweaver–and its not as functional as the commercial pruduct, ITS FREE and you cant beat that.

I will also refer to other tools and browser plug-int that you may find useful, so please check out each download as they will be usful.

This rant was posted in CSS, HTML, Software, Tools, Toolset, Web, Web Design, Web Markup on by .

Farcry 2
Date Created: March 19, 2009  Date Modified: October 14, 2012

Im more of a fan of the game engine than the game itself. I love burning down forests, now i can do it in the comfort of my own home. However there were a few plot issues that put me off Farcry2. I was playing it for the first time, gin and tonic in reach, and yet i still kep dying of malaria!, this shat me to no end.

so i shelfed the game at 2%, i had fallout to clock–civil war in Africa is outranked by neuclear war in America.

When I picked up the game again recently I noticed somting that if id known prior, it may have given me more incentive to put the disk in: Player Built Maps!

YES!, you can build you own maps in farcry2, why did nobody mention this to me before? I have been a modder on PC’s for years and never for once thought (ok, little big planet dosnt count) that modding would be a “thing” on the consoles–man times have changed since the first PS console!

the toolset is certainly no NWN2 toolset, but its easy to pick up–I would even assume for those with no 3D experience, and the terrain generator is fairly realistic. Its a little strange going from building worlds on a PC than it is sitting on a couch using a controller to smooth out terrain, but its also a bit more relaxed than at the desk, ciggi ash falling in keyboard and eyestrain from a 19 inch CRT that is on its last legs.

I have yet to check out any of the User Built maps online–I choose to keep the PS3 disconnected from the network for bandwith reasons, but when ive got my little deathmatch finished i’ll share and share alike with the rest of the malaria infected gamer community!

This rant was posted in Farcry 2, Modding, Toolset on by .