Founded in 2005, located in Linglong Industrial Park, the west of Hangzhou.
ZGSM is a hi-tech and private Enterprise devoted to R&D, producing and selling of high quality LED indoor/outdoor lights, LED traffic lights, solar panels and solar powered LED lighting system and so on. As one of the patent model enterprises and the first batch of Energy-saving Service Company in Zhejiang Province, we have registered more than fifty products; we are also the members of Illuminating Engineering Society and Semiconductor Industry Association in China.
Our products covers LED street lights, LED high bay lights, LED gas station lights, LED flood lights, LED tunnel lights, LED stadium lights and other indoor/outdoor LED lights; LED traffic lights and signal controllers; PV modules, solar LED street lights and solar powered generation systems. Our products take the advantage of energy saving, environmental friendly, long life and so on.
Been widely used in indoor/outdoor lighting, city lighting, traffic instruction, solar power generation projects and other fields.
CE, GS, UL, RoHS, CB, ENEC, SAA, DLC, LM79,LM80, ISO9001, ISO14001
Chip mounter,EVERFINE GO-2000 Photometric test equipment, Vigor VG2302 Leakage current Tester, Vigor VG2679 Insula?on Resistance Tester, Vigor VG2670A Dielectric strength tester, Vigor VG2678A Ground Resistance Tester, TDS1002 Integra?ng sphere
our products have been exported to more than 80 countries and regions
Sales, technical and aftersales is 24hours on line for servicecheap tunnel light led
From a security standpoint, there are few good cipher options to use with SSH, such as ChaCha20, AES 128/256 GCM/CTR. As I understand (please correct me if I wrong), all of these offer pretty strong encryption.
However, what are the performance differences between aforementioned ciphers? In certain SSH tunneling applications (like tunneling NFS, for example) the performance is absolutely critical. How does one chose the cipher for the best performance, while maintaining reasonable security?
Of course I could just try and measure the difference, but this data will only be applicable to my specific hardware and particular measurement technique (in my simple benchmark AES 128 GCM seems to show the best results both in terms of throughput and low CPU load).
Speaking more general (and assuming CPU has AES-NI support):
- Does ChaCha20 take advantage of AES-NI?
- Is GCM mode faster than CTR?
- How does key size (128 vs 256) affects performance?
- Apart from the raw throughput, what ciphers tend to load CPU more?
I came across Ngrok and Localtunnel but after a while, the tunnel gets disconnected/discontinued, meaning I cannot link my localhost (with port number) in Visual Studio 2015 to a public URL. Are there any free softwares/platforms to do the same thing but permanent?
What befits does a VPN have over just using a regular SSH Tunnel?
I’m considering setting up OpenVPN on a server, but was wondering what benefits that would have over just using that same server as an SSH Tunnel which is very easy to setup and allows connecting via SOCKS5 which is already supported everywhere. Wouldn’t both show the same IP address as source anyways in which case you’re no longer anonymous?
SSH Tunnel seems to be much easier, just open an SSH tunnel and setup computer to connect to that port via localhost and a SOCKS5 proxy.
ssh -D 1723 -f -C -q -N email@example.com
VPN on the other hand seems like a bit more work to setup and i’m unable to see what benefits it offers over just a simple SSH Tunnel.
I have a server running a OpenVPN client to route all internet traffic via the VPN.
I have excluded the local subnet from the tunnel and this is all working well so far.
The server also has a webserver running, which is publicly accessible using port forwarding from my router.
The web server is only working when the VPN client is stopped. I assume when the vpn is open the packets to respond are being sent back over the VPN link, rather than back to the router.
Question: is it possible to prevent this?
I’m running Ubuntu Server 18.04.
We have five interfaces in the server.
I would like to route traffic from IP 10.8.0.150 behind tun0 to 10.130.219.68 behind interface em2.
I have enabled port forwarding and done IP tables rules but the traffic reaches the server but goes back to tun0, because .
How can I achieve this, to route traffic from a 10.8.0.150 behind tun0 to 10.130.219.68 behind interface em2 without interfering with other VPS communicating in the VPN (tun0)?
em2 Link encap:Ethernet HWaddr 94:18:82:33:3a:85 inet addr:172.17.247.242 Bcast:172.17.247.255 Mask:255.255.255.240 inet6 addr: fe80::9618:82ff:fe33:3a85/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1564 errors:0 dropped:0 overruns:0 frame:0 TX packets:336 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:140656 (140.6 KB) TX bytes:56927 (56.9 KB) Interrupt:19 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:63491 errors:0 dropped:0 overruns:0 frame:0 TX packets:63491 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1 RX bytes:5828461 (5.8 MB) TX bytes:5828461 (5.8 MB) tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:10.8.0.98 P-t-P:10.8.0.97 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1 RX packets:78487 errors:0 dropped:0 overruns:0 frame:0 TX packets:89611 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:7480633 (7.4 MB) TX bytes:24983338 (24.9 MB)
ROUTES in host server :
default 10.2.0.1 0.0.0.0 UG 0 0 0 br1 10.0.0.0 10.8.0.97 255.255.255.0 UG 0 0 0 tun0 10.0.1.0 10.8.0.97 255.255.255.0 UG 0 0 0 tun0 10.2.0.0 * 255.255.255.0 U 0 0 0 br1 10.8.0.0 10.8.0.97 255.255.255.0 UG 0 0 0 tun0 10.8.0.97 * 255.255.255.255 UH 0 0 0 tun0 10.130.219.68 172.17.247.241 255.255.255.255 UGH 0 0 0 em2 188.8.131.52 10.8.0.97 184.108.40.206 UG 0 0 0 tun0 link-local * 255.255.0.0 U 1000 0 0 em2 172.17.247.240 * 255.255.255.240 U 0 0 0 em2
Iptables in host:
-A FORWARD -i em2 -j ACCEPT -A FORWARD -i tun0 -j ACCEPT -A FORWARD -i em1 -j ACCEPT -A FORWARD -i tun0 -o em2 -j ACCEPT -A FORWARD -i em2 -o tun0 -j ACCEPT -A FORWARD -i tun0 -o em2 -m state --state RELATED,ESTABLISHED -j ACCEPT
Routes in 10.8.0.150:
10.0.0.0 10.8.0.149 255.255.255.0 UG 0 0 0 tun0 10.0.1.0 10.8.0.149 255.255.255.0 UG 0 0 0 tun0 10.2.0.0 10.8.0.149 255.255.255.0 UG 0 0 0 tun0 10.8.0.0 10.8.0.149 255.255.255.0 UG 0 0 0 tun0 10.8.0.149 * 255.255.255.255 UH 0 0 0 tun0 10.18.0.0 * 255.255.0.0 U 0 0 0 eth0 10.130.219.60 * 255.255.255.255 UH 0 0 0 tun0 10.130.219.68 10.8.0.149 255.255.255.255 UGH 0 0 0 tun0
Traceroute from 10.8.0.150:
traceroute to 10.130.219.68 (10.130.219.68), 30 hops max, 60 byte packets 1 10.8.0.1 (10.8.0.1) 179.067 ms 179.062 ms 179.073 ms 2 10.0.0.1 (10.0.0.1) 179.083 ms 179.093 ms 179.104 ms
I have a computer A, a server B (Azure VM) and a second computer C. I want to connect from A to C through the server B.
A: ssh -i location_of_private_key -L 12000:public_IP_of_B:20000 user@serverB C: ssh -i location_of_private_key -R 20000:localhost:12000 user@serverB
A: nc localhost 12000 C: nc -l 12000
But the first testing command (in A) fails, I can’t establish connection to B on port 20000.
What am I missing ?
The title is pretty much it.
There’s a tunnel that, when I’m in a train entering or exiting it, frequently reboots my phone.
It’s quite rare for me to see spontaneous reboots otherwise.
Why would such a thing happen?
So a Bugbear with a polearm has a 15ft reach(Long-Limbed) each creature who enters its reach gets attacked(Polearm Master) and they must stop if hit(Sentinel) they would have to take 3 turns to be able to attack the character or anyone by/behind them stopping every time they move 5ft(Tunnel Fighter)providing the attacks hit. This seems really OP.
When you take the Attack action and attack with only a glaive, halberd, or quarterstaff, you can use a bonus action to make a melee attack with the opposite end of the weapon. This attack uses the same ability modifier as the primary weapon. The weapon’s damage die for this attack is a d4, and the attack deals bludgeoning damage. While you are wielding a glaive, halberd, pike, or quarterstaff, other creatures provoke an opportunity attack from you when they enter the reach you have with that weapon.
Tunnel Fighter (Unearthed Arcana):
You excel at defending narrow passages, doorways, and other tight spaces. As a bonus action, you can enter a defensive stance that lasts until the start of your next turn. While in your defensive stance, you can make opportunity attacks without using your reaction, and you can use your reaction to make a melee attack against a creature that moves more than 5 feet while within your reach.
You have mastered techniques to take advantage of every drop in any enemy’s guard, gaining the following benefits:
When you hit a creature with an opportunity attack, the creature’s speed becomes 0 for the rest of the turn. Creatures provoke opportunity attacks from you even if they take the Disengage action before leaving your reach. When a creature within 5 feet of you makes an attack against a target other than you (and that target doesn’t have this feat), you can use your reaction to make a melee weapon attack against the attacking creature