OpenVPN server configuration for a Linux server like a Raspberry Pi
- Linux (tested on Raspbian 10 Buster and 11 Bullseye)
- OpenVPN (tested on
2.4.7-1
and2.5.1-3
from apt) - bridge-utils (tested on
1.6-2
and1.7-1
from apt)
#Unix Toolbox
##Unix Toolbox revision 14.4
adb help // List all comands | |
== Adb Server | |
adb kill-server | |
adb start-server | |
== Adb Reboot | |
adb reboot | |
adb reboot recovery | |
adb reboot-bootloader |
mkdir mounted-iso mounted-root root live
sudo mount -o loop archlinux-2020.06.01-i686.iso mounted-iso/
sudo mount -t squashfs mounted-iso/arch/i686/airootfs.sfs mounted-root/
sudo cp -av mounted-root/. root/
sudo umount mounted-root
sudo umount mounted-iso
sudo mount -o bind root live/
sudo arch-chroot live bash
#!/bin/bash | |
# | |
# Steps to build GCC 10 on Debian Buster. | |
# | |
set -e -x | |
# Install all dependencies. | |
export DEBIAN_FRONTEND=noninteractive | |
apt update |
/* | |
* This document is provided to the public domain under the | |
* terms of the Creative Commons CC0 public domain license | |
*/ | |
How to boot Arch Linux ARM in QEMU (patched for M1) | |
Prerequisites: | |
QEMU - patched for M1 processors - patches: https://github.com/utmapp/qemu |
import struct, time | |
## This experiment demonstrates that the claimed "hash" (that is not a hash) used | |
## by the L2 cache ECC debug feature used by Operation Triangulation is not secure, | |
## and can be trivially reverse engineered by anyone who owns one of the machines | |
## with the hardware (such as any M1 Mac), in seconds to days. Therefore, this proves | |
## that no "insider" access or leak is necessary to obtain this table, and that the | |
## attackers most likely did exactly the same thing. | |
## This is the "black box", i.e. the hardware: The table is not exposed to the caller. | |
class BlackBox: |