ValdikSS
ValdikSS
Also check `ssh [email protected] # the password is 'segfault'` It automatically configures Tor Hidden Service for SSH, as well as SSH over [Gsocket](https://www.gsocket.io/) Sources here: https://github.com/hackerschoice/segfault
I finally made my own, take a look, maybe you'll find some of the ideas useful: https://github.com/ValdikSS/hoogmoon-testing
@skotopes there aren't issues with the card, the bug is in firmware code.
pavucontrol - recording tab - select "monitor of …" for songrec.
https://lkml.kernel.org/linux-wireless/[email protected]/T/
commit be3497f and e6d63e1
> Those two patches were applied today. Just tested it on RTL8811CU and can confirm that it works in 2.4 GHz mode now.
This is a reasonable proposal, I have an idea to implement packet stuffing, will do retransmissions as well.
Thanks for the contribution, however I'm not sure whether it's a good idea to parse TLS record per se: there's no benefit for doing that (GoodbyeDPI doesn't use any data...
> I'd still vouch for the acceptance of 0x0303 Done: https://github.com/ValdikSS/GoodbyeDPI/commit/4c846c712dfedffd1e28405af4240ca6932414a3 > What do you mean by computing the SEQ in userspace? Look: to perform TLS record fragmentation, we need...