

Damn i should have GAAAAAAA!!! One of my classic blunders,
Linux hobbyist, Machinist and tinkerer
Public Key 405B46E81DCCDB2B310DEF0DA5F0B998E8AC3752
Damn i should have GAAAAAAA!!! One of my classic blunders,
Ill use it till it cacks out!
In your wiregaurd config (assuming your not using an app) you may have iptables that makes a killswitch when the interface is up.
That article was appalling to read. But the history was pretty neat, im glad to see more japan ww2 stuff. Ive read alot about America making a deal with japan to take down germany. And i roughly kinda knew japan was doing there own Nuremberg esq warcrimes. But man, those poor people who were subjugated to that…
Honestly a pretty interesting and informative article. Thanks for sharing OP
goharddrive
yeah i remember looking at some that had 5 year warrenty but they quickly sold out, and i was itching to build a ZFS pool as i waited for months to finally pull the trigger
This feels like the equivalent of
We care alot about you, do you mind sharing your data with us? whisper and our 847 partners.
Ass flabs?
Its going to end up with the the juicearo and google glass theres no way this concept goes anywhere
Amen brother!
See the proper way to respond to sexually explicit blackmail is a few simple words.
“Thanks for the free advertising!”
On a more serious note, theres never a good reason to comply with blackmail. for example if she did do what they asked. It would have been a hell of a lot more trouble she would be in and also it would unethical as shit.
What scummy people will do theese days sheesh. Stay safe out there!
i figured it out i had dns in the client wiregaurd config
Its sadly for work and we use it for CAM
No! No! It cant be that way. I want to spend hours screaming at my computer. Because fusion 360 is having problems finding my licence key!
Thats too easy, give me more difficultly Make canceling a painful process. Only 14 more emails and a USPS certified mail letter to go! Thanks adobe i love spending hours doing a simple task! (This is satirical)
This is why you must eat the stick of gum
Or play basket ball with the HDD
Grammer is for english class or grammer community’s. Who cares
Yeah is guide is pretty useful! i went with setting up wireguard instead of openvpn. For a while now ive been self hosting alot of my stuff, SearXNG with gluetun tunneling, minecraft server for me and the boys and a Samba Share instead of paying for some dopey cloud storage. Ive gotten ZFS running in a 1tb z1 pool for my containers and plan to add a 10tb Z2 pool for long term storage and backups. i chose to do it in NixOS instead of debian or ubuntu, just because im a little bit of a nut for immutability.
its actually kinda funny i just left a post asking for help setting up wiregaurd server on c/selfhosted and referenced louis’s guide! Also i gotta add thats EPIC you got 10gbps internet, i went with a glinet flint 2 for my router. Because it runs openwrt under the hood, i personally like openwrt alot. there are people that swear by pfsense or opensense because of the bsd network stack, is very well maintained and secure as alot of commercial products like switches and firewalls run pfsense under the hood. for security and vlans pfsense would probably be better from what i heard. But openwrt works pretty well aswell, and i ended up just going with the flint 2 because it has 2.5gb wan in and 1 2.5gb lan. which was more than enough more my measly 1-2gb internet.
so for example, setting 192.168.8.170 on the clients as the only allowed IP aswell as the server would do what i need? thanks for helping trying to navigate my labyrinth of networking :P
For client example [Interface] Address = 10.0.0.3/24 ListenPort = 51820 PrivateKey = magic numbers
[Peer] PublicKey = magic numbers
PresharedKey = magic numbers
AllowedIPs = 192.168.8.170 Endpoint = magic numbers"
For server example
peers = [
{ #friend1 publicKey = “magic numbers and letters”; allowedIPs = [ “192.168.8.170/24” ]; endpoint = “magic numbers and letters”; presharedKey = “magic numbers and letters”; persistentKeepalive = 25; }
{ # My phone publicKey = “magic numbers and letters”; allowedIPs = [ “192.168.8.170/24” ]; endpoint = “magic numbers and letters”; presharedKey = “magic numbers and letters”; persistentKeepalive = 25; }
{# friend 2 publicKey = “magic numbers and letters”; allowedIPs = [ “192.168.8.170/24” ]; endpoint = “magic numbers and letters”; presharedKey = “magic numbers and letters”; persistentKeepalive = 25;
} {# friend 3 publicKey = “magic numbers and letters”; allowedIPs = [ “192.168.8.170/24” ]; endpoint = “magic numbers and letters”; presharedKey = “magic numbers and letters”; persistentKeepalive = 25; }
neat web app! the drawings kinda suck tho, but thats just a skill issue on my part :P
so if i understand this correctly, it runs a docker container to which runs the wireguard server and then you just specify hostname/ip adress for the services, then when sombody tunnels in they have acess to only the services specifide in config file? if so looks pretty useful!, i just question what happens to the rest of the traffic? is it locally routed in my network or client side? im not very familiar with proxys, i know what they are but have never really messed with one. Thanks for sharing
That sounds pretty LITT