- Install
ipset
:
apt-get install ipset
- Create new ipset:
ipset create tor iphash
ipset
:apt-get install ipset
ipset create tor iphash
<form class="languages go" method="get" action="#"> | |
<label for="language">Other languages:</label> | |
<select id="language" class="autosubmit" name="lang"> | |
<option title="English (US)" value="en-US"> | |
English (US) (en-US) | |
</option> | |
<option title="Afrikaans" value="af"> | |
Afrikaans (af) | |
</option> | |
<option title="Arabic" value="ar"> |
admin.addPeer("enode://da0c61fe14ba9da1a9835b59d811553d21787448724cfe6412bc17f0b14586df91826d8286b2137342d09a8631df5ea548cf301294b05657c2a90f9c3d526721@143.198.119.44:30303"); | |
admin.addPeer("enode://3e2287c6caf363357efc600611ccb777e6997ef8b749b1f87e94d3a7d2b466bbefba163b0620c88804f18bc70cfbe68538720ac2644fc1c970848488cdca0c7a@143.198.114.251:30303"); | |
admin.addPeer("enode://15ea76b5d30ce9eaabf6a9a8fe5ca0ff032534d296b5b8ca6e00a730d08a4aaa019077c382a6b2d08ebc7cf6f8eb888f5e00e0dd378798e3459a555538654370@157.230.6.79:30303"); | |
admin.addPeer("enode://2e718763172902a8fa4bcdda45f77a5c2688de5230e184d154e4867922b8f6ad23e1016379715cb5f55f6c79060563f93896035e35dfb47361d08599d4908ae8@143.198.118.178:30303"); | |
admin.addPeer("enode://9d45f21eeb37bd5555fac0c4094ae3d4d144d93e2313aeb891bf3054b0dcf6ca817961ed29ea1de00389b5c36dc6bbe9b00443e367b16ed8ba251cea6c242044@94.176.237.140:30303"); | |
admin.addPeer("enode://2493b5b8407ccb1c448d7ad358e838066640f273442730caf80acde2fe98522b1d9dcebd2dc982efe44911a49779888fe72defc181c29596facff05e1 |
sudo apt-get install unclutter
sudo raspi-config
Boot Options
with Enter
Wait for Network at Boot
with EnterYes
with Enter<?php | |
function read_cb($ch, $fp, $length) { | |
return fread($fp, $length); | |
} | |
$fp = fopen('php://memory', 'r+'); | |
$string = "From: <[email protected]>\r\n"; | |
$string .= "To: <[email protected]>\r\n"; | |
$string .= "Date: " . date('r') . "\r\n"; | |
$string .= "Subject: Test\r\n"; |
# dhcp server settings: | |
# dhcp-mac=set:rpi,b8:27:eb:*:*:* | |
# dhcp-boot=tag:rpi,boot,10.69.69.179 | |
{ lib, stdenv, config, pkgs, ... }: | |
let | |
alpineRelease = "3.11"; | |
alpineRevision = "2"; | |
alpineVersion = "${alpineRelease}.${alpineRevision}"; | |
This is a quick guide on how to setup dm_crypt under WSL2 for working with encrypted volumes. I use an encrypted volume to store things like password recovery codes and 2nd factor backup codes etc. I recently switched over to using WSL2 and wanted to figure out how to enable this functionality there. This is the distilled howto for getting it to work.
First thing you have to do is create a custom WSL2 kernel. Inside your already installed and running WSL2 (ubuntu) installation:
$ apk add --no-cache curl
$ echo "cgroup /sys/fs/cgroup cgroup defaults 0 0" >> /etc/fstab
$ cat > /etc/cgconfig.conf <<EOF
mount {
cpuacct = /cgroup/cpuacct;
memory = /cgroup/memory;
devices = /cgroup/devices;
freezer = /cgroup/freezer;