-
**What would you like to add or change?**:
Portmaster network adapter wise blocking needed
**Why do you and others need this?**:
Some people’s wish to block internet for WiFi and vpn adapte…
-
### Description
Hello 👋
I'm wondering if it is technically possible to implement traffic shaping **directly** in the gVisor sandbox, and not rely on external tools (like `tc`) to restrict both ingre…
-
Hello.
Is this an issue?
Getting the message from this metric:
![Screenshot 2024-06-16 143602](https://github.com/wozniakpawel/synology-grafana-prometheus-overly-comprehensive-dashboard/assets/…
-
## User Story
As a Modernisation Platform customer
I want to visualise my traffic flows through a centralised dashboard
So that I can understand how my resources are consuming network bandwidth
## …
-
### Category
WiFi
### Hardware
T-Beam, Heltec V3, Station G2
### Firmware Version
2.5.13
### Description
After a period of time (6-18hrs, no longer than 24hr), WiFi enabled ESP32 based devices …
-
within just a day of installing this program has used
![image](https://github.com/user-attachments/assets/3036af5b-d830-49c3-b27f-1720a1076eba)
4gb of network
i know it downloads artwork for song…
-
Based on research into tools like Xray, the Go crypto/TLS ClientHello fingerprint is highly unique, making it easier for traffic analysis systems to detect and block.
To improve stealth in darkflar…
-
**What happened:**
When using CNI Pod Subnet with Dynamic Allocation, pod traffic is completely influenced by Node's NSG and Routes. I am not even sure that UDR are even applied in the pod subnets.
…
-
At the time of writing, this extension does not yet support AUTH (NIP-42).
If the relay that is configured requires AUTH then this will create an excessive amount of errors in the logfile that ar…
-
Not exactly a project issue.
I use Greenlight on MacOS and I try to sniff the network communication with Charles proxy. I wanted to compare it to the Xbox app on iOS. Proxy configuration is done an…