Skip to content
Rex Bytes

Rex Bytes

  • Home
  • All
  • Tutorials
  • Topics
  • Projects
  • Blog
Rex Bytes
Rex Bytes

vpn

1 tutorial series · 1 project · 2 posts

Tutorial Series

WireGuard VPN

In this compelling guide to VPN networking basics, you'll discover the essential concepts that empower your online privacy. Learn about IP addresses, the crucial differences between public and private networks, subnet masks, and CIDR notation. Embrace the power of effective routing and understand the significance of ports and DNS within VPN configurations. Equip yourself with the knowledge needed to navigate upcoming VPN tutorials seamlessly!

4 Parts · Feb 2026 Start Series →

Projects

RexBytes Software: Bumper VPN Kill Switch Package

I've put together a python package to automate the iptables firewall commands we've covered. It's available NOW on pypi.org

Oct 11, 2022

Posts

VPN Kill Switch With Docker

You might have set up some great rules in your iptables to act as a kill switch, only to find out that on installing Docker and running some containers they completely override your rules. Fortunately the fix is easy. Let me show you how. 1. Required Reading I’m going to apply the fix to my...

Oct 4, 2022

OpenVPN: Create A Linux VPN iptables Killswitch

If your VPN connection drops your machine usually continues to connect to the internet leaking information. Let me show you how to make an iptables killswitch.

Oct 3, 2022

© 2026 Rex Bytes - WordPress Theme by Kadence WP

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
 

Loading Comments...
 

You must be logged in to post a comment.

    • Home
    • All
    • Tutorials
    • Topics
    • Projects
    • Blog