-- listen for console connection with the given secret key
-- controlSocket("0.0.0.0")
-- setKey(please generate a fresh private key with makeKey())
-- start the web server on port 8083, using password 'set a random password here'
-- webserver("0.0.0.0:8083", "set a random password here")
-- accept DNS queries on UDP/5200 and TCP/5200
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# used different forum posts/guides to figure this out like: | |
# The uninstall script is located at /Library/Parallels/Parallels Service.app/Contents/Resources | |
# https://github.com/danijeljw/remparallels/blob/master/remprls.sh | |
# https://kb.parallels.com/122461 | |
# sudo find / -iname "*parallels*" | |
# sudo find / -iname "*prl*" | |
#before uninstalling deactivate your licencse - this won't be possible after uninstall | |
prlsrvctl deactivate-license |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
curl https://www.cloudflare.com/ips-v4 > .ips-v4 | |
curl https://www.cloudflare.com/ips-v6 > .ips-v6 | |
firewall-cmd --new-zone=cloudflare --permanent | |
firewall-cmd --reload | |
for i in `<.ips-v4`; do firewall-cmd --zone=cloudflare --add-source=$i; done | |
for i in `<.ips-v6`; do firewall-cmd --zone=cloudflare --add-source=$i; done |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sqlite3 gravity.db.backup -header -csv 'select * from adlist' > adlist.csv | |
sqlite3 gravity.db.backup -header -csv 'select * from vw_whitelist' > whitelist.csv | |
sqlite3 gravity.db.backup -header -csv 'select * from vw_blacklist' > blacklist.csv |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import ( | |
"context" | |
"fmt" | |
"log" | |
"net" | |
"net/http" | |
"os" | |
"syscall" |
- I faced bandwidth issues between a WG Peer and a WG server. Download bandwidth when downloading from WG Server to WG peer was reduced significantly and upload bandwidth was practically non existent.
- I found a few reddit posts that said that we need to choose the right MTU. So I wrote a script to find an optimal MTU.
- Ideally I would have liked to have run all possible MTU configurations for both WG Server and WG Peer but for simplicity I choose to fix the WG Server to the original 1420 MTU and tried all MTUs from 1280 to 1500 for the WG Peer.
- On WG server, I started an
iperf3
server - On WG peer, I wrote a script that does the following:
wg-quick down wg0
- Edit MTU in the
/etc/wireguard/wg0.conf
file
OlderNewer