Install FIO on Ubuntu/Debian:
sudo apt update
sudo apt install -y fio lshw
Install FIO on Fedora:
#!/bin/bash | |
# A script to limit the outgoing bandwidth of the consensus and execution layers by port | |
# We do this because the highest cost for running a node in AWS is the outgoing bandwidth | |
# Define your ports and their corresponding rate limits | |
declare -A ports=([30303]="500kbit" [9000]="1mbit") | |
# Define arbitrary class IDs for each port | |
declare -A class_ids=([30303]=1 [9000]=2) |
#!/bin/bash | |
## Create the response FIFO | |
rm -f response | |
mkfifo response | |
function handle_GET_home() { | |
RESPONSE=$(cat home.html | \ | |
sed "s/{{$COOKIE_NAME}}/$COOKIE_VALUE/") | |
} |
# install netctl | |
sudo pacman -S netctl --noconfirm | |
# check network card name | |
ip link | |
### Config Static IP Address ### | |
# Card Name : eth0 | |
sudo cp /etc/netctl/examples/ethernet-static /etc/netctl/eth0 |
Install FIO on Ubuntu/Debian:
sudo apt update
sudo apt install -y fio lshw
Install FIO on Fedora:
Layer 2 VPN’s using SSH from https://la11111.wordpress.com/2012/09/24/layer-2-vpns-using-ssh/ | |
September 24, 2012 | |
Basics: | |
OpenSSH running on Linux provides the ability to create a VPN tunnel on-the-fly, which can be useful as a quick hack – it’s simple, stable, not the most efficient thing in the world – (tunneling TCP over TCP is generally considered to be a bad idea) – but way easier than trying to set up something like OpenVPN. For preliminary testing, anyway, you can’t beat it. | |
How it works: | |
When the tunnel is established, SSH creates a TAP (virtual ethernet tunnel) device on each computer. This link behaves more like a virtual wire than a NIC. As such, you can’t use it directly – you have to create a virtual bridge and add this TAP device to it, treating the bridge as the NIC. |
#!/bin/bash | |
# Usage: ./minio-upload my-bucket my-file.zip | |
bucket=$1 | |
file=$2 | |
host=minio.example.com | |
s3_key=svc_example_user | |
s3_secret=svc_example_user_password |
$ pkg update | |
$ pkg install nmap |
If you don't know what Wireguard is, well, you should. It's fast, easy to setup and highly configurable. We will configure Wireguard for multiple users with various restrictions using iptables.
This should fit most setups (not mine though 😉)
#!/bin/bash | |
## | |
# Pure BASH interactive CLI/TUI menu (single and multi-select/checkboxes) | |
# | |
# Author: Markus Geiger <[email protected]> | |
# Last revised 2019-09-11 | |
# | |
# ATTENTION! TO BE REFACTORED! FIRST DRAFT! | |
# |