AES-CBC が早いけど、AES-GCM/AES-CTR が遅かったり、Ryzen が爆速だったり、 ChaCha20-Poly1305 が ARM で早かったりするという噂の真相が知りたいです。コメントに適当にべたべた結果を貼ってください。
ちなみに Apple M2 おかしいくらい早いです。
CPU 情報はできれば詳細なのがほしいです。
OpenSSL のバージョンは 3.1 系の最新版でお願いします。
This guide already exists on the internet, but only on Reddit. So I'm also putting it here for redundancy's sake because it could vanish at any time. I also fixed a typo that prevented people from copying the registry path. | |
-- Unlocking Option -- | |
1. Press Win+R | |
2. Type "regedit" and click OK | |
3. In the top bar, paste the following path: | |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Power\PowerSettings\54533251-82be-4824-96c1-47b60b740d00\be337238-0d82-4146-a960-4f3749d470c7 | |
4. Double click "Attributes" | |
5. Change the key from 1 to 2. |
################### | |
# # | |
# SU.SG # | |
# # | |
################### | |
# https://mp.weixin.qq.com/s/H3OOqhFRr0YZGorIAlsCjA | |
# todo | |
# replace or remove content-security-policy header |
{ | |
"$schema": "http://json-schema.org/draft-07/schema#", | |
"type": "object", | |
"title": "V2Ray", | |
"description": "V2Ray config", | |
"definitions": { | |
"account": { | |
"type": "object", | |
"properties": { | |
"user": { |
#!/bin/bash | |
apt-get install -y distcc distcc-pump ccache | |
sed -ie 's/STARTDISTCC="false"/STARTDISTCC="true"/' /etc/default/distcc | |
sed -ie 's/ALLOWEDNETS="127.0.0.1"/ALLOWEDNETS="192.168.0.0\/16 172.16.0.0\/12 10.0.0.0\/8"/' /etc/default/distcc | |
sed -ie 's/LISTENER="127.0.0.1"/LISTENER="0.0.0.0"/' /etc/default/distcc | |
sed -ie "s/JOBS=\"\"/JOBS=\"`grep processor /proc/cpuinfo | wc -l`\"/" /etc/default/distcc | |
sed -ie 's/ZEROCONF="false"/ZEROCONF="true"/' /etc/default/distcc | |
#PATH here? https://midnightyell.wordpress.com/2012/10/14/a-good-compromise-cross-compiling-with-distcc/ |
#!/bin/sh | |
echo 'use "curl -sSL git.io/corefile | bash" to update Corefile' | |
echo "remember to change 192.168.1.1 to your ISP's DNS server address or use public DNS server such as 114/DNSPod etc. directly" | |
china=`curl -sSL https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/accelerated-domains.china.conf | while read line; do awk -F '/' '{print $2}' | grep -v '#' ; done | paste -sd " " -` | |
apple=`curl -sSL https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/apple.china.conf | while read line; do awk -F '/' '{print $2}' | grep -v '#' ; done | paste -sd " " -` | |
google=`curl -sSL https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/google.china.conf | while read line; do awk -F '/' '{print $2}' | grep -v '#' ; done | paste -sd " " -` | |
bogus=`curl -sSL https://raw.githubusercontent.com/felixonmars/dnsmasq-china-list/master/bogus-nxdomain.china.conf | grep "=" | while read line; do awk -F '=' '{print $2}' | grep -v '#' ; done | paste -sd " " -` | |
cat>Corefile |
# Dante-Server install script (Debian 8 - Jessie) | |
# Start with 'chmod +x danted_install_script.sh && danted_install_script.sh' | |
# duketwo - 12.11.2017 | |
random_pw=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 | head -n 1) | |
network_adapter=$(ip route | grep default | sed -e "s/^.*dev.//" -e "s/.proto.*//") | |
username="SallySample" | |
port="31337" | |
public_ip=$(dig +short myip.opendns.com @resolver1.opendns.com) | |
echo "Random password: $random_pw" | |
echo "deb-src http://ftp.de.debian.org/debian/ sid main non-free contrib" >> /etc/apt/sources.list |
#!/bin/sh | |
# cross & static compile shadowsocks-libev | |
PCRE_VER=8.41 | |
PCRE_FILE="http://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-$PCRE_VER.tar.gz" | |
MBEDTLS_VER=2.6.0 | |
MBEDTLS_FILE="https://tls.mbed.org/download/mbedtls-$MBEDTLS_VER-gpl.tgz" |
#!/bin/ash | |
# | |
# angry_wifi.sh | |
# | |
# auto disconnects clients with a low signal strength on LEDE / OpenWRT. great | |
# for clients who hold onto a lower-signal-strength accesspoint instead of | |
# roaming. before running, make sure to download the latest MAC addresses with: | |
# | |
# wget --no-check-certificate -O - 'https://services13.ieee.org/RST/standards-ra-web/rest/assignments/download/?registry=MAC&text=apple' | cut -d, -f2 > apple_mac_addresses | |
# |
This howto describes setting up a LT2P over IPsec VPN server on your router with TomatoUSB firmware. This should allow you to connect using the built-in client to your Mac, iPhone or Android device. (Not sure about Windows.)
At the end of this tutorial, you should have a L2TP/IPsec VPN server that starts automatically on boot. Mac/iPhone/Android devices can connect with their native client and will be assigned an IP address within your LAN subnet. They should be able to talk to other devices on your LAN and should be able to contact hosts on the Internet NAT'd behind your WAN IP address.