## Why can’t I connect to the wordpress install page with Nginx?

I’m a newbie of WordPress. My environment is Ubuntu 18 + Nginx + PHP 7.

Following the tutorial(https://www.myfreax.com/how-to-install-wordpress-with-nginx-on-ubuntu-18-04/), the wordpress directory was placed on /var/www/html/device1.com.

Then I config the nginx, here is my nginx config:

server {     listen 80;     server_name www.device1.com device1.com;      server_name device1.com;      root /var/www/html/device1.com;     index index.php;       # log files     access_log /var/log/nginx/device1.com.access.log;     error_log /var/log/nginx/device1.com.error.log;      location = /favicon.ico {         log_not_found off;         access_log off;     }      location = /robots.txt {         allow all;         log_not_found off;         access_log off;     }      location / {         try_files $uri$  uri/ /index.php?$args; } location ~ \.php$   {         include snippets/fastcgi-php.conf;         fastcgi_pass unix:/run/php/php7.2-fpm.sock;     }      location ~* \.(js|css|png|jpg|jpeg|gif|ico|svg)\$   {         expires max;         log_not_found off;     }  } 

But, when I tried to connect to http://device1.com/wp-admin/install.php the Nginx responses 404, instead of returning the wordpress install page.

I don’t have any idea of checking the issue. Thanks for your suggestion.

## How to connect a mobile app through the woocommerce API to “Create Order” for a product linked to a vendor

I want to connect a mobile app through the woocommerce API to “Create Order” for a product linked to a vendor such that this will create the sub-order automatically for a given vendor account. The woocommerce API does not provide this capability by default and the "post author" is assigned to the user authorised to make the API call. How do I go about this?

## Best guidance for allowing users to connect via HTTP in case of a certificate error

I’ve coded my app to use https, but if a https transaction fails for any reason, I assume it’s because the server isn’t configured for https, and thereafter start all transactions with http. Seems like that’s a vulnerability. Likewise, a script kiddie using a proxy to intercept the traffic on his client hardware would be able to make all https transactions fail.

I’m told that if someone tries to MITM your app’s HTTPS request then the request should fail (invalid certificate) and your app should fail with an error, not fallback to HTTP. In a world where SSL is reliably available, sure, but maintaining valid SSL certs is a task in itself. For example, letsencrypt recently revoked some of their certificates and forced renewal of same because of some security problem. Aside from revocations, certs are short term and have to be renewed, and the renewal process involves a lot of stitchware, and can fail. If SSL goes down, I don’t want my site to go dark.

What is the best guidance for either:

1. More reliably maintaining certificates (such that if they do fail, the resulting downtime falls within the "five nines" SLA unavailability window) without it being such a manual headache, or

2. Allowing the site to continue to work if SSL has failed? Is it easy to allow most activity to proceed using http, but allow known-critical transactions to require https.

Note that no browsers are involved in the scenarios that concern me.

## Connect a graph

Given an undirected graph, We need to convert it into a connected graph by adding/removing the edges keeping the summation of absolute difference of change in degree of nodes minimum. There can be multiple edges. Formally, we need to minimize: $$\sum_{i = 1}^{i = n} |d_i – e_i|$$ Where, $$e_i$$ is the new degree of node i.

My approach was separating all the connected components first and then for every connected component, I noted down the edges which were not present in the DFS tree. These edges do not contribute to the connectivity of the graph and hence I can redirect them to other components to connect them. Is this claim correct? Also since the number of these type of edges can be arbitrary, what would be the constraints under which I use them to connect to other components.

The algorithm should work in linear time.

## How do all the World of Darkness and Chronicles of Darkness RPGs connect?

I just got my kick-starter copy of Changeling the Lost 2nd Ed and are starting to dip my toe back into the World of Darkness after a long absent. And I found out that it is confusing as hell trying to figure out which versions and editions of the different versions goes with which.

You have old world of darkness, new world of darkness or chronicles of darkness. A couple of editions of vampire the masquerade, a couple of editions of vampire gehenna, a vampire the masquerade 20th years anniversary edition and a 5th edition VtM that doesn’t seem to have anything to do with the rest of world of darkness besides the White Wolf logo on the back.

Same thing with my favourite game of Changeling. My 2nd edition should technically be the 4th edition if you count number of changeling rpg core books instead of numbering after settings. I think.

Seriously, it feels like you’d need some sort of flowchart just to figure out which games are connected and which are compatible with each other from a rules and from a meta plot perspective.

And that’s not even counting all the different historical spin-offs.

So can someone please explain which versions and editions of the different world of darkness core settings are connected? (Gold star if you use an actual flowchart.)

## Which methods should I connect a VPN, via that-vpn-app or through an VPN configuration on network manager linux?

I saw there are 2 available methods (that I know of and currently focusing on) to connect to a vpn. The first one is through their application based of that vpn provider. The others is by configuring VPN Connections > OpenVpn.

I have searched on internet and found link1 and link2. Of course, method from link2 is easier and less complex than the method in link1, but this is not my main focus here. I can’t find anywhere explain pros and cons of these 2 methods or any page explain why should a user pick one method over the others.

To be more specific in comparison, I have narrowed some areas to focus on below. Feel free to add more if there are something I should know, but missed.

1. Speed / overall performance of the connection
2. Security –> The permission that the VPN has accessed to on user’s devices. I’m not sure if there is any major important thing to consider if compare between OSes. Feel free to add in the answer if you would like, but I current am focusing on linux.

By the way, I used the link of the same VPN provider to show that there are actually more than 1 method to connect to the same VPN provider and not just something that varies between each VPN provider.

@Sven