OutlineAboutLoopring is currently an Ethereum token. From https://loopring.org, Loopring allows anyone to build high-throughput, non-custodial, orderbook-based exchanges on Ethereum by leveraging Zero-Knowledge Proofs. Loopring is claimed to be secure, high throughput, and low cost. Loopring Exchange (Loopring.io) is the first decentralized trading platform built on top of Loopring 3.0. Loopring.io DEX Fees
First Time on DEXIf this is your first time on decentralized exchange (DEX), you should know that the concept of DEX is to retain the ownership on you which is different from the centralized exchange that you probably know that whenever you deposit coins to these exchanges, you give up control over these coins to them in order to trade and do other financing. The most important factor for these exchanges are trust different from DEX which is programmed which if I'm correct, it is using smart contracts. Since this is an Ethereum based DEX, you need:
Using Loopring.io DEXreferral programNormally, this is after registration but from my side I would like to share my referral link first. I'm a referral fanatic not only I enjoy marketing my referral link but using others' referral link to support the referral system. I was disappointed that I cannot find anyone on the web sharing their referral link. If you don't have anyone that refers you, I will be grateful if you use my referral link https://loopring.io/invite/1632. Connect and RegisterDepositBefore deposit, you need to have your coins in your wallet connect application and especially Ethereum for transaction fee. In the writing of this article, the DEX supports: TradeWithdrawOthersStakingAPIIf you are a programmer, you maybe interested in looking at the API. For example my friend is interested in making automatic trades (robots) based on his own indicator.
1 Comment
SummaryBypass Censorship by DNSBypass Censorship by ProxyBypass Censorship by VPNBypass Censorship by TORBackgroundMy first Internet censorship experience as a user was back in my teens in Indonesia. My main entertainment was Japanese anime and manga. Everything was fine until they implement Internet censorship. It started when porn became viral on the news from as light as teenagers skipping school going to Internet cafe to watch port to as heavy as teenager rapes because they were inspired by porns. With most of society against even the smallest indecent acts pushed the congress to pass anti pornography law. It had nothing to do with for many months, but then one day, the anime and manga site which was my main source of entertainment was blocked until today. Then, when I was searching for certain technical details, I found out that Reddit was blocked and it frustrated me because the information I needed was there. The authorities probably block animes and mangas because they have obscene scenes even just a little like show panties and revealing clothes. They blocked Reddit probably because there was the not safe for work (NSFW) part, instead of trying to block that part only, they just blocked the whole Reddit and until today they have no intention of finding ways to block the NSFW only. This went too far which forced me to find ways to bypass their censorships. As time passes I learned of other countries that implements censorship such as China's great firewall and worst of them all is North Korea. I hate the idea because the ending is to control the people. Therefore, I became an advocate for total censorship resistance. ExperienceDuring the writing of this article, I was studying in Japan. I didn't find any censorship here and my apartment provided me with free dynamic IP address where I could link with dynamic domain name service (DDNS). So, I placed a Squid Proxy, OpenVPN, and TOR server before I took a vacation to my home country Indonesia. Below, I recorded videos of my successful attempt in bypassing Internet censorship from my house in Indonesia through my apartment's server in Japan: Questions and Answers
Mirror
For now, that is all I know, if you now more ways, please leave a comment.DescriptionThe Onion Router (TOR) is an implementation of onion routing by volunteers whom anyone can join because it is free and open source. TOR is mainly used for anonymity, privacy, and alike. For example, journalists who needs to communicate with whistle blowers, activists under oppressive regime, detectives on under cover operations, and privacy advocates who does not like monitoring, surveillance, trackers, and anything that breaches privacy. What is the difference between onion routing and vpn and proxy? The difference is the layer of encryptions. While proxy and vpn only provide one or up to few layer of encryptions, onion routing provides multiple layer of encryptions like an onion. In this article's topic, what is the similarity between onion routing and vpn and proxy? They can be used to bypass censorships. Using TOROnion routing is the technology and TOR is the product that is free for anyone to use. TOR can be used in form of running application, browser, or browser extension. Regular people use TOR mostly to browse privately. I use TOR to bypass censorship as demonstrated in Video below where I access an anime site that was blocked. Warning! Although surveillances cannot track your connections but they still can know that you are using TOR. The use of TOR by common people are frowned upon by most authority. In their reasonings, they need to monitor everything you are doing in order to keep law and order, especially their power. Only they are allowed to use privacy based technologies to go undercover and infiltrate criminal activities. Generally, you will be asked, why do you need to use TOR if you are not dealing with drugs, human trafficking, illegal weapons, porns, and other criminal activities? If not, then at least you will be on their special attention list. TOR in WindowsTOR in AndroidBuilding TOR LinuxInstalling TORsudo apt install tor torsocks torbrowser-launcher To run TOR just run the command "tor". Any application you want to run with tor you can run the application by putting "torsocks" in front of the command. There is a same application called torify, choose which one you want to use. If you want to just run the browser, you can run "torbrowser-launcher" without running "tor" command because TOR browser have a built-in TOR. If you want to use other browsers, run "tor" and set the socks proxy to localhost and TOR port which is usually "9050" or "9051", or install a tor browser extension. Configuring TOREdit the file "/etc/tor/torrc" and restart tor whenever finish. Other than volunteering as a bridge, relay, or exit node, there are other things that you can set for example as a daemon for you can run tor a service and start and stop from there, control port if you want andvanced monitoring of your tor node, hosting a site on tor network or deep web, and many other things which will be on separate article. TOR BridgeA bridge illustratively stands on the beginning layer of the tor network. The function of bridges are to give users access to tor because they cannot connect to tor themselves for some reason. Currently, the main reason is because the TOR network itself is blocked or censored by the authorities. To install on debian based Linux "sudo apt install obfs4proxy" and add the following to "/etc/tor/torrc": BridgeRelay 1 ORPort 9001 ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy ServerTransportListenAddr obfs4 0.0.0.0:9002 ExtORPort auto ContactInfo Nickname 0fajarpurnama0tor Above is my example configuration where actually you are not suggested to use port 9001 because it is well known so it is most likely blocked. Guides are actually available inside "/etc/tor/torrc" or you can read the official guide. By the way, the guide said the following but in my experience, I did not need it: "you will also need to set NoNewPrivileges=no in /lib/systemd/system/[email protected] and /lib/systemd/system/[email protected] and then run systemctl daemon-reload. (see bug #18356)". TOR RelayTOR relays functions are securing the tor network and providing more anonimity. TOR relays are the most that occupies the tor network because they are the easiest to setup and bear the least risk. In my opinion, you do not need to think twice in becoming a TOR Relay. Add the following lines to "/etc/tor/torrc": Nickname 0fajarpurnama0tor ORPort 9001 ExitRelay 0 SocksPort 0 ControlSocket 0 ContactInfo TOR ExitTOR exits are the least that occupies the tor network because they bear the highest risk. Why? because they are the frontier of the TOR network. They are the ones that are interacting with the public network or the Internet. If TOR users are doing activities discouraged by the authorities, these exits are the ones who will take the blame because they are the ones that are visible. Some authorities cannot even identify tor exits, so any malicious acts committed by TOR users, they will think that the tor exits are the ones that are committing them. Therefore, make sure you have complete understanding of your capabilities before running a TOR exit. Leave a comment, do you need a lawyer or something other than supports from ISPs and influential figures? Since TOR exits are the ones that connects to the public network, they are the ones that heavily influenced the speed of the network. They are the nodes that in the end you need to go through anyway. Therefore if these nodes are scarce, then bottlenecks will often happen. TOR exits are in high demand, if you truly have the capabilities, please consider being a TOR exit. To become a TOR exit, simply follow the steps in becoming a TOR relay, with one difference: ExitRelay 1 Other settings are inserting meta data to inform that you are an exit node. Do consider configuring your DNS, reverse DNS, and in the WHOIS record so that your node is informed as a TOR exit for example have "tor-exit" word in any of your record. If you are already running a website, do consider adding a notice that your node is a TOR exit for example write a html page. If not, tor can do that for you by setting the dirport to 80: DirPort 80 DirPortFrontPage /path/to/html/file Consider determining your exit policy. The more open your TOR exit is, the more risk it bears. Again, depends on your capabilities. If you are very powerful, then it is great service to fully open your TOR exit. However, do not take the risk if you cannot handle. For example, there will be TOR users who will use your exit for drug dealings, illegal weapon dealings, thief and assassination jobs, human trafficking, child pornography, hacking, etc. If you truly cannot handle the burden, do not force yourself and be a limited exit node for the regular people who just wants to surf the Internet privately. If you are taken down, it is lost for us as well. The most limited exit policy is only allowing port 80 and 443 and certain IP addresses that you determine. The default exit policy are: reject *:25 reject *:119 reject *:135-139 reject *:445 reject *:563 reject *:1214 reject *:4661-4666 reject *:6346-6429 reject *:6699 reject *:6881-6999 accept *:* Mirror
DescriptionVirtual private network (VPN) contains the word "private network" and "virtual". During the time of the writing of this article, a public network is just another term to the Internet while private networks are outside of the Internet. Example nodes residing in the public network are Google and Youtube. Example nodes residing in the private network are clients or users accessing Google and Youtube. This situation exists because the current Internet infrastructure is too small to host all the computers in the world. Therefore, clients and users are mostly outside of the Internet where they need to go through mediaries to communicate with those in the Internet, I like to call them gateways (see my simple introduction to computer network to understand the basics). While the Internet or public network is like the streets and outside world where we can go out and travel, a private network is like our house where it is private and only us can enter. A vritual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Analogically, it is like an open house where other people can enter but ofcourse with the permission of the house owner. For example, when we are at home or outside but we need to access our office's internal network, we usually need to run back to our office, but with VPN, we can access on the spot. When we enter a VPN, we are subjected to different rules. It is unfortunate that most Internet connection today have enforcers. When we want to access a website, we always ask that enforcer and the result is whether we are granted access or not. The role of VPN other than privacy is censorship resistance. When we go to a VPN, our enforcer changes or if we are lucky, we have our enforcer removed. For example in Indonesia, access to anime, manga, and reddit are prohibited, but if we access from Japan, it is granted. Then what is the difference between VPN and proxy server? Proxy server is just one server while VPN is a whole network which contains routes and servers. Setting VPN ClientInterestingly, setting a VPN can either be easier or harder than setting dns and proxy. That is because there are different choices unlike dns or proxy where simply just inputing numbers. It is easier because there are many ready applications available where the steps are just installing and run. It is harder if you choose to set the configuration manually which can involve more than just setting the VPN server's IP address. Ready VPN ApplicationAs the word "ready", these kinds of VPN applications only needs to be installed and run to enjoy bypassing censorships. In Windows, you can try finding from Microsoft Store. In Linux, check your own package manager. In Android and IOS you can search their respective stores. Generally, you can find portable archives or go for installable files. Ready VPN application are also available in form of browser extensions. There are many ready applications out there. Leave a comment you know a good onw. To prevent this article from becoming to long, I can only advice you to search the search engine such as Google to find the VPN the you want. Example search terms: "vpn", "free", "Windows", "Linux", "Android", "United States", "Japan", "Indonesia", "Europe", "China", etc. Manual VPN ClientsIf you search for "free vpn list" on search engine, you may stumble upon a website that give a list of open vpns for example https://www.freeopenvpn.org. If they provide you a profile that you can use with just a click, that's great. However, if you are given configuration details that you have to write yourself, or use default or other vpn clients, you need to set them correctly. Usually, there are more than just IP address and port for example, transport protocol, compression, and certificates. Premium VPNWhen you try free VPN, you may find disatisfaction. A VPN can be slow because your browsing perception is based on the slowest part of the whole network connection. If the VPN is slower, that you will perceive a slow connection eventhough your main connection is fast. On the other hand, you will also feel slow if your main connection itself is slow even if you use a fast VPN. Another factor, is the privacy and security which I'm skeptical about for most free VPN. Sure that VPN may provide no or different censorship, and privacy from the main surveilance but you maybe monitored deeply by the administrators of the VPN themselves. If not, who knows if their security is low that other people can easily monitor and steal your private data. Therefore, it is not recommended to expose private data such as inputing username and password on a login form. Therefore, there are premium or paid VPNs where they generally provide quality at a price. If you are a skilled technician, then you can test whether the VPN is good quality or not. If not, then you have to research yourself such as see if there are licenses or certificates on their VPNs, read people's reviews, and how long have the VPNs been running. Building OpenVPN Server LinuxIf you want a single script building which is the simplest way, you can try pivpn. I built openvpn server a few times but I just cannot completely remember the steps, maybe because I have not repeated it enough. I will be honest, the reason I wrote and record my computer tutorials is mainly for myself to remember when I need to do them again. But, why not share them with everyone else by publishing them online and I was surprised that I can monetize them. Now, going back to OpenVPN server on Linux, the detailed steps may seem overwhelming for beginners but the overview is actually only a few which are:
Installing OpenVPN Server and Certificate Authority CreatorI was using Debian based Linux like Ubuntu: sudo apt install openvpn easy-rsa Creating CertificatesBecome an administrator for example using the command: sudo su Create an certificate directory for openvpn, work there, and configuration samples from easy-rsa share directory: mkdir /etc/openvpn/easy-rsa/ cp -r /usr/share/easy-rsa/* /etc/openvpn/easy-rsa/ Edit "/etc/openvpn/easy-rsa/vars" and fill in at least the lines that are not commented and edit the names and information as you see fit. There are instructions you can read within the file. Then generate certificate authority (CA). cd /etc/openvpn/easy-rsa/ source vars ./clean-all ./build-ca Generate a private key for the server. Name it whatever you want but keep it consistent through out the installation. ./build-key-server myservername Generate Deffie Hellman ./build-dh Generate client certificates and keys for as many clients as you want. After generating, you can copy the "ca.cert" and all client certficate and keys to the clients. I'm not sure whether you can use the same cert and keys for the multiple clients but you can generate them by repeating the following commands: source vars ./build-key client1 All keys and certificates are in the "keys/" subdirectory. You can leave them there but remember to specify the correct paths in the configurations. If not, then just copy to "/etc/openvpn" subdirectory: cd keys/ cp myservername.crt myservername.key ca.crt dh2048.pem /etc/openvpn/ Configuring OpenVPN serverConfiguration examples of both client and server are available on "/usr/share/doc/openvpn/examples/sample-config-files". You can reuse and edit the example server configuration: cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz /etc/openvpn/ gzip -d /etc/openvpn/server.conf.gz Edit "server.conf" as you see fit, explanations of how to edit them are available within the file. Just make sure the configuration is consistent to your inteded client configuration. For example, if the server does not use compression while the client uses compression then communication will not work and vice versa. Here's an example of my server configuration: port 1194 proto udp dev tun ca ca.crt cert myservername.crt key myservername.key dh dh2048.pem server 10.8.0.0 255.255.255.0 ifconfig-pool-persist /var/log/openvpn/ipp.txt keepalive 10 120 cipher AES-256-CBC persist-key persist-tun status /var/log/openvpn/openvpn-status.log verb 3 explicit-exit-notify 1 push "route 192.168.0.0 255.255.255.0" client-to-client push "redirect-gateway def1 bypass-dhcp" push "dhcp-option DNS 8.8.8.8" The last four lines are my own additional where I want the VPN to find the local network 192.168.0.0 attached to it and allows connection between clients. The last two lines are probably the ones you want to add which is to allow the use of Internet connection of the VPN and add 8.8.8.8 Google DNS. Next is to edit "/etc/sysctl.conf" to allow port forwarding by setting "#net.ipv4.ip_forward=1". Finally, reload sysctl and start or restart openvpn server: sysctl -p /etc/sysctl.conf systemctl start openvpn@server OpenVPN in ClientAt first I used tunnel bear in Indonesia to access my entertainments which are manga, manhua, manhwa, and anime but eventually, I ran out of quota. Luckily, my appartment in Japan provides a dynamic public IP address in my apartment and I was able to install an openvpn server during those periods. So, I connect to that server which is suprisingly, more reliable then tunnel bear, probably because I was the only one using it. OpenVPN client LinuxYou can either use the network manager or install openvpn just like you install on the server (only "apt install openvpn"). If you use the network manager, input the keys and certificates, username and password if you set, and go to advance and make sure you match the configuration to the server. One difference will make it unconnectable. If you install openvpn, just copy the sample client configuration to the openvpn configuration subdirectory: cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf /etc/openvpn/ Match the client configuration to the server with the differences are declaring the configuration file as client along with the client certificates and keys and inform the hostname or address of the remote openvpn server: ca ca.crt cert client1.crt key client1.key client remote 0fajarpurnama0.ddns.net 1194 Then start the openvpn client: systemctl start openvpn@client OpenVPN client WindowsIt's more convenient to rename the "client.conf" to "client.OVPN" where for some reason, the extension must be in capital letter to work. You can keep it in the same directory as the certificates and keys, but it is more convenient to have them embeded into "client.OVPN": client dev tun_c_ovpn proto udp remote 0fajarpurnama0.ddns.net 1194 resolv-retry infinite keepalive 5 10 nobind persist-key persist-tun verb 3 -----BEGIN CERTIFICATE----- MIIFXDCCBESgAwIBAgIUbZAu8yajhVulFYZ4CWNqGc8xWncwDQYJKoZIhvcNAQEL BQAwgccxCzAJBgNVBAYTAkpQMQ8wDQYDVQQIEwZLeXVzaHUxETAPBgNVBAcTCEt1 bWFtb3RvMRcwFQYDVQQKEw4wZmFqYXJwdXJuYW1hMDEXMBUGA1UECxMOMGZhamFy cHVybmFtYTAxGjAYBgNVBAMTETBmYWphcnB1cm5hbWEwIENBMRcwFQYDVQQpEw4w ZmFqYXJwdXJuYW1hMDEtMCsGCSqGSIb3DQEJARYeZmFqYXJAaGljYy5jcy5rdW1h bW90by11LmFjLmpwMB4XDTE5MTIwMTE2NDQ1M1oXDTI5MTEyODE2NDQ1M1owgccx CzAJBgNVBAYTAkpQMQ8wDQYDVQQIEwZLeXVzaHUxETAPBgNVBAcTCEt1bWFtb3Rv MRcwFQYDVQQKEw4wZmFqYXJwdXJuYW1hMDEXMBUGA1UECxMOMGZhamFycHVybmFt YTAxGjAYBgNVBAMTETBmYWphcnB1cm5hbWEwIENBMRcwFQYDVQQpEw4wZmFqYXJw dXJuYW1hMDEtMCsGCSqGSIb3DQEJARYeZmFqYXJAaGljYy5jcy5rdW1hbW90by11 LmFjLmpwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6HwIppc9/Kwl Hkd+yUpEk8UveacjcGvEsvBdSLzn1IeUgDNkvKy8uuFcptV3sqg89+lagaM3z1MI Ere2GFHQFPHX1of78v2XY9r31KSArtN2tqpIWS8EMpt7xOLaFXTJiSBgG0LwVy/7 DppaloPiFwYXu/itzZXjN26fuHvbFQEfYlh1MdcxpHj9Reswjk3+EOrtnLchHdQ+ E/xIR5WzA2vlpw1ie4fy1SLPulUZf7ZG/SIPTrXcWvTljti2LJgxt3xHElD/KmTN 6t5KIHv7Mx9BY2Q98YgwmzPzkG0FQ03NygEan4HXJ85RIK5rJVmbR2+9hWqFDV54 RQL42Nq6hwIDAQABo4IBPDCCATgwHQYDVR0OBBYEFMvHUSxayCjwg9n4z8NzHNQ1 e8zBMIIBBwYDVR0jBIH/MIH8gBTLx1EsWsgo8IPZ+M/DcxzUNXvMwaGBzaSByjCB xzELMAkGA1UEBhMCSlAxDzANBgNVBAgTBkt5dXNodTERMA8GA1UEBxMIS3VtYW1v dG8xFzAVBgNVBAoTDjBmYWphcnB1cm5hbWEwMRcwFQYDVQQLEw4wZmFqYXJwdXJu YW1hMDEaMBgGA1UEAxMRMGZhamFycHVybmFtYTAgQ0ExFzAVBgNVBCkTDjBmYWph cnB1cm5hbWEwMS0wKwYJKoZIhvcNAQkBFh5mYWphckBoaWNjLmNzLmt1bWFtb3Rv LXUuYWMuanCCFG2QLvMmo4VbpRWGeAljahnPMVp3MAwGA1UdEwQFMAMBAf8wDQYJ KoZIhvcNAQELBQADggEBAJS159tPUrmnPjVffVZi5fvRBishiuaB91EUH5MEbqkk hrootBEQSNSxCGh3nOlGVFherpyla1a+G1F0pnyobrnzLTpcf28fQdKN6ZbV5psA /+CSwBYO1BLnarwu+VYnZeQxHYc/3v3xMNNZV5oE9uil7VAxMJV5zGUSxQi7fQZS Wo4AV8AHpKKdpdOXr8UyirXqDgiZY7nZpmnJaTPYacKbCk/pziTEjSkwGiYIE8q4 EWaAD+3WnjpE7K2ky7TWGuK/a0G+Jx2YZCkirXnc9znWELa7B5M7RLJrDhTC0Whz 4zNpn5HClk+XzTu850So9xxPQ73L0Veob7sBfNZlBu8= -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIFoTCCBImgAwIBAgIBAjANBgkqhkiG9w0BAQsFADCBxzELMAkGA1UEBhMCSlAx DzANBgNVBAgTBkt5dXNodTERMA8GA1UEBxMIS3VtYW1vdG8xFzAVBgNVBAoTDjBm YWphcnB1cm5hbWEwMRcwFQYDVQQLEw4wZmFqYXJwdXJuYW1hMDEaMBgGA1UEAxMR MGZhamFycHVybmFtYTAgQ0ExFzAVBgNVBCkTDjBmYWphcnB1cm5hbWEwMS0wKwYJ KoZIhvcNAQkBFh5mYWphckBoaWNjLmNzLmt1bWFtb3RvLXUuYWMuanAwHhcNMTkx MjAxMTY0ODExWhcNMjkxMTI4MTY0ODExWjCBvTELMAkGA1UEBhMCSlAxDzANBgNV BAgTBkt5dXNodTERMA8GA1UEBxMIS3VtYW1vdG8xFzAVBgNVBAoTDjBmYWphcnB1 cm5hbWEwMRcwFQYDVQQLEw4wZmFqYXJwdXJuYW1hMDEQMA4GA1UEAxMHY2xpZW50 MTEXMBUGA1UEKRMOMGZhamFycHVybmFtYTAxLTArBgkqhkiG9w0BCQEWHmZhamFy QGhpY2MuY3Mua3VtYW1vdG8tdS5hYy5qcDCCASIwDQYJKoZIhvcNAQEBBQADggEP ADCCAQoCggEBAJ2GVHKPqK/xfCCjK0+bVI07BTpbM4dCE3IElGBmKALY28D43zGF 74OjAWo+ifTru2ThlpOkfa9PtBaMxqY/EWj6sjY6Bt1fm3QmcnasOeFWMSH5ZTV3 PiNcb8QJeusWL0EtDjz1anbe2H1UqYepAHhmFxTKap6oqQnXDTO/gQuDBvC/LgfF S07GxGfjTUSM6CyPKAmWOJIIqM7KRR0UA3cLiIDbbmQy4RicBAF6jfKUSa6SeFQn 7YTNrnOOrbK0r78JcDJ+OU0whnr1dW7PZdByzRFxXxzlHZM1m9Me/4I8VcNFeh0Z Y3ATmIGaIcfQmfC4nO14W4k1XULvzF5pGA0CAwEAAaOCAZ4wggGaMAkGA1UdEwQC MAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBDZXJ0aWZpY2F0 ZTAdBgNVHQ4EFgQUxH6LrB12M55RSYC4FGcVZaWp5kkwggEHBgNVHSMEgf8wgfyA FMvHUSxayCjwg9n4z8NzHNQ1e8zBoYHNpIHKMIHHMQswCQYDVQQGEwJKUDEPMA0G A1UECBMGS3l1c2h1MREwDwYDVQQHEwhLdW1hbW90bzEXMBUGA1UEChMOMGZhamFy cHVybmFtYTAxFzAVBgNVBAsTDjBmYWphcnB1cm5hbWEwMRowGAYDVQQDExEwZmFq YXJwdXJuYW1hMCBDQTEXMBUGA1UEKRMOMGZhamFycHVybmFtYTAxLTArBgkqhkiG 9w0BCQEWHmZhamFyQGhpY2MuY3Mua3VtYW1vdG8tdS5hYy5qcIIUbZAu8yajhVul FYZ4CWNqGc8xWncwEwYDVR0lBAwwCgYIKwYBBQUHAwIwCwYDVR0PBAQDAgeAMBIG A1UdEQQLMAmCB2NsaWVudDEwDQYJKoZIhvcNAQELBQADggEBABzfVo8l4yUplgrb wi3TT3nZnfz9j+5bHHvy2NRIGGmLlcZGrr+qJ+zwvDF6aPuaJ1goB9nSuPfcHEnR HTVsHIcUQ+yOSiNIrUIFuasQlWiZ5TA0CIChVWrKaWpvuZUgBUIra4Qj8qrHypj0 M2X551F6vspNA8to+oNpH6/wDtRIo6y3wac/hnv2vrpCg5TmVcAqammk02GMxITh wa/zMWZsCccbt/jmeJ7QVX33nZGWykep2vf3CbROxmK0L9amPkMCOPvG7evCuLE4 UMOA7q2KARVeoSq6xVVi65h+KCzXvhUQ/Z2W+9g88L+w0Jcr666CgHUjYc0pBHCW LKvLkjs= -----END CERTIFICATE----- -----BEGIN PRIVATE KEY----- MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCdhlRyj6iv8Xwg oytPm1SNOwU6WzOHQhNyBJRgZigC2NvA+N8xhe+DowFqPon067tk4ZaTpH2vT7QW jMamPxFo+rI2OgbdX5t0JnJ2rDnhVjEh+WU1dz4jXG/ECXrrFi9BLQ489Wp23th9 VKmHqQB4ZhcUymqeqKkJ1w0zv4ELgwbwvy4HxUtOxsRn401EjOgsjygJljiSCKjO ykUdFAN3C4iA225kMuEYnAQBeo3ylEmuknhUJ+2Eza5zjq2ytK+/CXAyfjlNMIZ6 9XVuz2XQcs0RcV8c5R2TNZvTHv+CPFXDRXodGWNwE5iBmiHH0JnwuJzteFuJNV1C 78xeaRgNAgMBAAECggEBAIdKmvb1uXy7W8+wNH+fugO+gCP5tozhzE+t7T3KH20q kbrwRMmE7gxSEOIOKnCHkh/3vFq7+RJ70wFXEToxiqNuRWdbeQ/ikGI2rzKLgv6t B2/Vgf5klqLKPlfRiJemKxnAN61VXoYPqUIjV6NjHDtL+2Do5J+13dDMudMLFCss meMzGCchAQ3Lm2zybdRUNOsVCIQIgIGpVAsmn80lCr+DWWsdee6PIknn/76Wc2Ie phi0tAruQAGxxDnMJMPG03yRQ6xmllVRoNncNVEr3gRk4NiKBWn2R26ia7Llw6K0 Z3abIO1qJj3SoRzb1ZIevPoYPqH8GE1EceXD5RfqwCECgYEAzMMQExmXvImbYoi7 dxQQiUPwt1FDIr9mYZHmhd6z2DDF3T8bOU5Z8DG5oMrIIofQK0flesvULastuheB wmbId4KUBl6STEg4uOXCTZeYNp3pTQu2MDOvICgVcrQSnkOuZTckasvq+5l2jE/7 DL2i4ZQE4FwlSEE4a+Nr8/IgfJUCgYEAxPFGpZ18CN/dKanchVWDC9crAZ5F2Qb/ RT0yJKie1WF4LkI+E4we+BegDginy5pGjaRUueUB5IRtCefvb4dp+6rFFhSMluIM Na64FAJYM+5J227iYjo8rtYhQVWCjkcXUcJDQTUfoogtXBj3X3TP+VCHwxawtMYw v+8gnFIIV5kCgYAMzCQ1DWRuZCtR/Tm6N4bRDW3+BxYrFctQTc4aj9Ctsl6rdUY+ TqdQW8s+QW5AujxIeDXfdt3L/ObeuplhjQr6bS7TNxXtrpXc+H8sWk0pHLV4G0NH v/MyD09H2/lN6uz7ZnbgNd552x2Np3IJWdDUSGwFmby6x1i/ZXdZx8hAAQKBgQCS FDEFuRl+b6ZZOAA0+ieYycHBkodWokUIM4sU++nMdl6xWTs4Po/eD5ANuMfVUpqQ h1q9BCtyN/O1DE9iV3v6S0Gizh018XeC/hTV6qNH6bDozYenunC2cmf6URXkuMCI SWKfZGsRoJacoHwkVr3IvL3mq9boT7VrOFDlAkfjyQKBgECDXo/MJoB22loxjFX9 1PycP92ZLYHUnIDHhAkgzmd65+qCrhk10d0BIiBcgfgL3Z0Kv/G/xNhEbZu20tua cEKPaqUD5xUjZyZKXLzQ8k7pLCRN6XQ26UhnUPNZS8BxqkJIAu2x0SbIZjnXblF3 GZ+xa6lVwhHCq7EKcDvGHvLe -----END PRIVATE KEY----- You can now carry that .OVPN file anywhere with you. Next is to download the openvpn client for Windows if your Windows default client does not support. OpenVPN client AndroidSame method as Windows, get your .OVPN file and download openvpn client for Android. DescriptionInstead of going straight ahead to the destination address the packets turns around to the proxy server and processed there before going to the original destination. I use it because the connection in my country here doesn't allow direct contact with certain sites, in short, blocked or censored. Ofcourse it won't work also if the destination is blocked by the proxy server or to the proxy server itself is blocked. Borrowing Web ProxyBorrowing a web proxy is the next simple step to changing DNS. In this section is posted not the technical stuff but introduce web proxies available on the web. Below are steps of example web proxies or skip and go further below to watch the video. Borrowing Network ProxyWhile web proxies are hosted on webpages as interfaces, netwrok proxies are usually in form of IP addresses and ports. You need to find your proxy configuration in your browsers or operating systems to input the proxies' IP addresses and ports. Below are examples in Windows: If you want to set them through command line (cmd) then try the following commands: set HTTP_PROXY=http://proxy_userid:proxy_password@proxy_ip:proxy_port set FTP_PROXY=%HTTP_PROXY% set HTTPS_PROXY=%HTTP_PROXY% Set them empty if you want to stop using proxy: set HTTP_PROXY= set FTP_PROXY= set HTTPS_PROXY= Setting Proxy in LinuxIf you want to do it from terminal, then write the following into "/etc/environment": http_proxy="http://:@:/" https_proxy="http://:@:/" ftp_proxy="http://:@:/" no_proxy="localhost,127.0.0.1,::1" Setting Proxy in AndroidBuilding Proxy Server LinuxI used "squid" as my proxy server on Debian Linux. Install squid server: sudo apt install squid sudo cp /etc/squid/squid.conf /etc/squid/squid.conf.original edit "/etc/squid/squid.conf". Basic setup:
authenticated setup: auth_param basic program /usr/lib/squid/basic_ncsa_auth /etc/squid3/passwords auth_param basic realm proxy acl authenticated proxy_auth REQUIRED http_access allow authenticated Restart squid server: sudo htpasswd -c /etc/squid3/passwords username_you_like Mirror
OverviewChanging the domain name server (DNS) is one of the easiest way. If the contents restriction is by DNS we simply only need to use another DNS, if not then this method cannot be use. Changing DNS on client is also among the most basic because there are many open DNS server out there compared to proxy and VPN server. Many users used Google's DNS server "8.8.8.8" to bypass censorship or sometimes, it is just faster. Another reason is, if your censorship only comes from DNS, it is much easier to change your DNS setting the performing overkills such as setting proxy and VPN, and in some cases, even you do set proxy and VPN, sometimes it just doesn't work if the censorship comes from the DNS. Here DNS will be introduced on public level in other words simple term. More information can be found in my article Simple Introduction to Computer Network and technical term will be upcoming. To make things short we browse the web mainly using the domain address for example "www.facebook.com", but our machine itself prefer internet protocol (IP) address which is still version 4 of IP "173.252.74.22". When we write, the DNS translate it from "www.facebook.com" > "173.252.74.22". Setting DNS WindowsIf you want to change from command line, then type the following on cmd.exe: netsh interface ip show config (find the connection for example:) interface ip set dns "Ethernet0" static 8.8.8.8 Setting DNS AndroidSetting DNS LinuxIf you want to do it from terminal, then be administrator using "sudo su", edit "/etc/resolve.conf" file using nano, vim, etc, and set for example "nameserver 8.8.8.8". Building DNS Server LinuxHere I will only demonstrate locally using bind9. If you want to put on public domain, just change to public IP addresses. sudo su apt install bind9 Edit "/etc/bind/named.conf.options" if you want to add forwarders such as: forwarders { 1.2.3.4; 5.6.7.8; }; Create a zone in any conf file, in the video above, I added a zone in "/etc/bind/named.conf.local" since it's only for local network. For example: zone "example.com" { type master; file "/etc/bind/db.example.com"; }; In above code, the zone name is "example.com" and the type is "master". The zone file is specified to "/etc/bind/db.example.com" but you can change the name and directory of the file as you wished but for now in "/etc/bind/db.example.com": ; ; BIND data file for example.com ; $TTL 604800 @ IN SOA example.com. root.example.com. ( 2 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire 604800 ) ; Negative Cache TTL IN A 192.168.1.10 ; @ IN NS ns.example.com. @ IN A 192.168.1.10 @ IN AAAA ::1 ns IN A 192.168.1.10 We defined "example.com" as "192.168.1.10", we also define a subdomain "ns.example.com" the same as "example.com". Note, there are example zone files such as "/etc/bind/db.local" if you need a skeleton, else go to bind9 official website for further technical details. Next is creating a reverse zone file to resolve names to IP Address. Edit "/etc/bind/named.conf.local" once again and add for example: zone "1.168.192.in-addr.arpa" { type master; file "/etc/bind/db.192"; }; Replace "1.168.192" with the network you are using if you are using a different one. The reverse zone file in above video is "/etc/bind/db.192". If you need a skeleton, there is "/etc/bind/db.127". The contents below shows that "ns.example.com" is "192.168.1.10": ; ; BIND reverse data file for local 192.168.1.XXX net ; $TTL 604800 @ IN SOA ns.example.com. root.example.com. ( 2 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire 604800 ) ; Negative Cache TTL ; @ IN NS ns. 10 IN PTR ns.example.com. Finally, "sudo systemctl restart bind9.service" to restart the DNS server. Mirror
DescriptionHyperlink icons are icons applied with hyperlinks. When the icon is clicked, the clicker will open the link designated by the creator of the hyperlink icon. The purpose in my opinion is to beautify and simplify links where there is a saying that a single picture can mean a thousand words. In this case, icon is a very small image which I have seen no larger then 100 pixels (px). I see hyperlink icons are mostly used to link creators' social media profile. Which do you prefer, a text link or a hyperlink icon or both? It depends on the context. If you want to just hyperlink your text passage, then just simply hyperlink a text. If you want it to be permanently part of a webpage layout, then just a hyperlink icon is best because it is small that saves space but still delivers sufficient information for the audience to understand and additionally, icons usually beautifies the webpage. If the platform nor the icon is known, then having both hyperlink text and icon is better to promote them. Making Hyperlink IconsThere are two knowledge that you need to make an hyperlink icon. First is making a hyperlink. Second is inserting an image. Additionally, third is beautifying but for me is only knowing how to configure the size but there are more like handling paddings and margins if you want to go deeper. If you are using an html editor where it is mostly available on most posting platforms, then you don't need to do much. However, if you are editing a blog's or a website's layout, then you probably need to learn some codings. The basic hypertext markup language (HTML) is still mainly used eventhough there are other languages such as markdown (MD). Making Hyperlink<a href=""></a> The above code is a skeleton code to make a hyperlink in html. The "a" tag is usually associated with links, the link is put inside the href="", and the text is put inside the a href="" (here) a. <a href="https://twitter.com/0FajarPurnama0">https://twitter.com/0FajarPurnama0</a> The above hyperlink code have the link https://twitter.com/0FajarPurnama0 and the text "follow me on Twitter". Inserting HTML Image<img src="" /> The above code is a skeleton code to make an image in html. The "img" tag is usually associated with images, and the image source location is put inside the src="". The image source should be an actually image where it is usually identified by either having a format such as .png .jpg .svg at the end of the link or when you try to download link, you will get an image file instead. <img src="https://0fajarpurnama0.github.io/assets/images/icon/twitter.png" /> The above code source the image from https://0fajarpurnama0.github.io/assets/images/icon/twitter.png. <img src="https://0fajarpurnama0.github.io/assets/images/icon/twitter.png" onerror="this.onerror=null;this.src='https://404store.com/2020/02/10/twitter.png';" alt="twitter icon which is a blue bird"/> The above image html code have extra attributes which are "onerror" which is a JavaScript code that shows secondary image source if the primary image source is broken and "alt" which is a text that replaces the image view of the image source is broken. Replacing the Text of Hyperlink with Icon<a href="https://twitter.com/0FajarPurnama0"><img class="myicon" src="https://404store.com/2020/02/10/twitter.png" onerror="this.onerror=null;this.src='https://0fajarpurnama0.github.io/assets/images/icon/twitter.png';" alt="twitter"/></a> Finally to have an hyperlink icon is to replace the text in the hyperlink text code with the image html code. To add additional text, you can add texts before or after the image html code. Additionally, you can adjust the size of the icon by adding for example width="30" and height="30" on the image html code, but best practice is to have the icon image itself resized to reduce network load. If you want to go deeper, you can decorate the hyperlink icon with css style. Icons locationIt is up to you whether you want to put it on the header, footer, or sidebar. If you are on your own website, you know what to do, but if you are on a blogging platform then find the layout option and find a way to insert html and css. If you are in a posting only platform, then just put the icons on top or bottom of the post. If you want to see my icon collection, you visit this link OutlineIntellectual property refers intangible creations which is usually resulted from the mind and almost always published. For example, articles, images, audios, videos, and games, even this article that you are reading that I wrote is an intellectual property. The license of your creations must be taken seriously at the very least declaring yourself as the creator, even using nicknames or naming yourself as anonymous is okay, or at the very least, the precise date and time of the creation is there. Otherwise, others can take the work. If they openly share, is positive, but negatively they can put license on the work meaning, claiming the work as theirs where potentially even you lose all rights to your work, meaning you can't even use including apply, publish, share, and modify. In these modern times during the writing of these article, copyright is automatically given to you on any work that you named. This means that you have full right to your work which includes giving permission to others. In many online platforms usually, you don't need to put your name manually because they will automatically put your registered name whenever you post a content. If you post on your own platform and forgot to put your name, cross you fingers hoping the timestamp is recorded because if it is recorded, it can be as a proof that your content is published by someone anonymous where it will remain open freely until you give proof that you are the owner of the content. By holding the copyrights of your contents means that others always have to ask your permission to use your contents which includes sharing, modifying, and republishing. If others infringed these rights, it can be considered a crime. However, this becomes a hindrance if your intention is really sharing for free. That is where creative commons license comes in. Creative Commons LicensesCreative commons licenses give every person and organization in the world a free, simple, and standardized way to grant copyright permissions for creative and academic works; ensure proper attribution; and allow others to copy, distribute, and make use of those works. Below are the list of license condition when using a work:
Freedom Level of Common LicensesBelow are the level order of the freedom from most to least:
License of My Online ContentsI've known about creative commons for years now but I only explored its type of licenses recently. My personal blogs and Youtube videos are license under creative common attribution for years because it was only one I knew other that copyright. I didn't put license on my posts on other platforms which are not personal because I simply forgot where usually I just need to set on the footer. Now I would like to properly license all of my online contents including this article. The license I choose is Creative Commons Attribution-CustomizedShareAlike 4.0 International License. I Fajar Purnama as the creator customized the ShareAlike (sa) license here where you are also allowed to sell my contents but with a condition that you must mention that the free and open version is available here. In summary, the mention must contain the keyword "free" and "open" and the location such as the link to this content. Mirror
I will create a separate software installation page. Install Ostinato packet generator and all updates: http://software.opensuse.org /download.html?project=home:pstavirs:ostinato&package=ostinato I use Ubuntu 12.04 LTS sudo echo 'deb http://download.opensuse.org/repositories/home:pstavirs:ostinato/xUbuntu_12.04/ /' >> /etc/apt/sources.list sudo apt-get update sudo apt-get install ostinato Install wifi-radar, airmon-ng or aircrack, and wireshark. For the wireless adapter to be monitored: sudo ifconfig wlan0 is down sudo iwconfig wlan0 monitor mode sudo ifconfig wlan0 up If you do this, you cannot connect to the hotspot. To restore as before, do the above but "sudo iwconfig wlan0 managed mode". In my opinion DOS is hacking which prevents other users from doing activities on the network. Here I will demonstrate DOS on a wifi using CommView for WIFI on Windows. Downloading CommViewDownload the program first and install. It is recommended on the developer's website http://www.tamos.com . Installing CommViewRun the program that you just downloaded or extracted immediately. After installing the software you need to install the driver from the existing commview in the packet installer (usually). Select the wireless adapter that suits you. (if you don't support it, you can't). If true, the device manager will look like this: Starting DOS on a WifiOpinionI think that happened because I sent a lot of "requests" (requests) to access the network and responded with "respond" (responses). Because access point is too busy sending "responses" to me, I don't have time to do anything else. The burden on access point becomes very much or even too much. ReferenceMirror
|
Archives
August 2022
Categories
All
source code
old source code Get any amount of 0FP0EXP tokens to stop automatic JavaScript Mining or get 10 0FP0EXP tokens to remove this completely. get 30 0FP0EXP Token to remove this paypal donation. Get 40 0FP0EXP Token to remove this donation notification! get 20 0FP0EXP Token to remove my personal ADS. Get 50 0FP0EXP Token to remove my NFTS advertisements! |