/t/ - Technology

Discussion of Technology

Catalog Archive Bottom
Mode: Thread

Max message length: 8000


Max file size: 32.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more


(used to delete files and postings)


Remember to follow the rules

The backup domain is located at 8chan.se. .cc is a third fallback. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 2.0.

We denounce the actions and motivations of shooters

Please be aware of the Site Fallback Plan!
In case outages in Eastern Europe affect site availability, we will work to restore service as quickly as possible.

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

Board Nuking Issue should be resolved. Apologies for any missing posts.

(291.84 KB 450x399 stallman_saves.png)

/t/ - Technology Codexx Board owner 04/25/2020 (Sat) 07:10:33 No. 2 [Reply]
Welcome to /tech/ - ∞chan's technology board. Please check the rules before you post: https://8chan.moe/rules.js?boardUri=t Looking for hardware or software recommendations? Check out the InstallGentoo Wiki: https://wiki.installgentoo.com/ /tech/ is for the discussion of technology and related topics. /tech/ is NOT your personal tech support team or personal consumer review site. We have stickies for that. Keep those kinds of posts in there. For tech support, software recommendations, and other questions that don't warrant their own thread, please use the '/tech/ Questions and Support' sticky. For consumer advice, please use the consumer advice sticky located below. For tech support/issues with computers: https://startpage.com/ or https://ixquick.com (i.e., fucking Google it) https://stackexchange.com/

Message too long. Click here to view full text.

Edited last time by codexx on 04/25/2020 (Sat) 07:14:46.

(2.82 KB 200x200 questionmark.png)

/t/ech Questions and Support Anonymous 04/25/2020 (Sat) 07:16:43 No. 3 [Reply] [Last]
Bring all your hardware, software and other troubles here.
1833 posts and 419 images omitted.
>>8497 Do you mean so you can put a different sim card in? Depends on your country, some countries it's legal to permanently lock the IMEI number to a single carrier. Others it was made illegal so now the carrier has to unlock it for free when you call them to bitch about it. Others you need to pay someone to unlock it.

(4.65 KB 200x200 dollarsign.png)

Consumer Advice Anonymous 04/25/2020 (Sat) 07:18:24 No. 4 [Reply] [Last]
Looking to buy something but aren't sure what to get? Ask here.
546 posts and 146 images omitted.
>>8437 How good are WD's My Book and My Passport external HDD's?

Programming Thread: Up and Running Edition Anonymous 04/27/2020 (Mon) 19:03:16 No. 9 [Reply] [Last]
Hey Anon, Learn to Code! There's a bunch of free resources for learning to program. Come here to ask for advice or to discuss current projects. Download the complete Gentooman's Library: https://g.sicp.me/books/ Visit MIT OpenCourseware on (((YouTube))) https://www.youtube.com/user/MIT Or take one of these free online courses being offered by universities right now: https://www.freecodecamp.org/news/free-courses-top-cs-universities/
Edited last time by codexx on 05/04/2020 (Mon) 00:54:19.
240 posts and 65 images omitted.
the SICP book is not 10$ :/ ....
Is PajeetScript really that much on demand? I don't wanna use it, but it feels like everyone is telling you to do so.

Let's Learn C Together, Imageboard Style Anonymous 05/02/2022 (Mon) 02:31:22 No. 8314 [Reply] [Last]
So I'm recently getting back into writing code again after a multi-year break. I used to be pretty proficient at BASIC and Visual Basic, BASH scripting, and I dabbled in Perl and PHP. Recently I've decided I want to learn C and git gud at it, but going through lessons and tutorials alone is boring when you have no feedback. There's already a dedicated programming thread, but I think there's enough here to warrant a standalone thread where we go through things together. We'll be using two resources. >C: How to Program - an in-depth textbook >The C Programming Language - long considered the beginner's bible for C >Why bother with C when C++ is a thing? C++ is basically object-oriented C, or C with classes. While C++ is a very useful language C is often more immediately applicable to simple, no-bullshit programs that do useful things. C is simpler, with less weeds to get lost in and is thus quicker to learn. And if you are good at C, then it's just a short hop to learning C++. We learn C to walk before we run. Since I'm a newbie too I'll post useful things I learn and code examples I write ITT for anons to play with, and explain the things I learn both for your benefit and to help me remember them better. If you want to join me, start off by reading The C Programming Language cover-to-cover. If something seems confusing, cross reference it in C: How to Program for a different perspective. Here we go.
38 posts and 22 images omitted.
>>8501 >char user_input[1800] = {}; That's retarded. Either initialize it to some explicit value or leave it uninitialized. If you compile with -Wpedantic you'll see: trash.c:10:25: warning: ISO C forbids empty initializer braces [-Wpedantic] 10 | char user_input[1800] = {}; | ^ The reason it misbehaves if you don't initialize the array is because you're ignoring the end of string null character that fgets puts there so you move on to the uninitialized territory (which is technically undefined behavior). Just test whether the current array position contains the '\0' and stop printing there, or even better, catch the strlen() return from earlier and just print until strlen()-1. Also get the syntax right already you dumb nigger, that's a part of learning too and submissions like this would not be accepted anywhere. Having retarded syntax is why >>8477 is difficult to detect, but that guy made it on purpose to be clever and you're doing it because you're a nigger.
(103.39 KB 762x1048 look at the time.jpg)

Continuing to play with the same ideas. # include <stdio.h> # include <stdlib.h> # include <unistd.h> # include <string.h> int main(){ //Declare an array with 1,800 elements, the size of a standard page char user_input[1800] = {}; //Take text input from the console and store it in the array puts("Enter some text, faggot"); fgets(user_input, 1800, stdin); //Cut out the newline characters from fgets() because they make our shit misbehave user_input[strlen(user_input) -1] = '\0';

Message too long. Click here to view full text.

Taking it one more step tonight. Using XOR on the input and key to generate an actual cipher, and then testing reversing the XOR operation, using the key, to recover the user_input value. And it works! # include <stdio.h> # include <stdlib.h> # include <unistd.h> # include <string.h> # include <math.h> int main(){ //Declare an array with 1,800 elements, the size of a standard page char user_input[1800] = {}; //Take text input from the console and store it in the array puts("Enter some text, faggot"); fgets(user_input, 1800, stdin); //Cut out the newline characters from fgets() because they make our shit misbehave user_input[strlen(user_input) -1] = '\0';

Message too long. Click here to view full text.

Spurious native interrupt Anonymous 05/15/2022 (Sun) 16:21:30 No. 8449 [Reply]
When my computer is not connected to the internet, even though I formatted, changed the bios software and changed the hard disk firmware, the program opens by itself and the mouse cursor moves by itself. When I examine with the Wireshark program, an interrupt signal comes from the usb ports even though the device is not plugged into the usb ports. In this case, I am complaining. Logs are attached.
Boot to a livecd with no storage installed.

(17.16 KB 474x253 th-2382814816.jpeg)

Connect to Tor Anonymous 05/10/2022 (Tue) 14:22:14 No. 8395 [Reply]
What is the safest way to connect to the Tor-Network? Is this the safest possible way: Tails (VM) -> VPN -> Bridge -> Tor-Network
3 posts omitted.
>>8395 You seem inexperienced with anonymizing software, I will give you some advice. Connect to Tor before anything else. If you wish to obfuscate your Tor connections, use Tor bridges, don't connect to a VPN before Tor. Do not listen to the dunces telling you to connect to a VPN before Tor newfriend, by relaying your connection through another proxy before Tor you are routing your traffic through their servers before Tor, this is idiotic as that traffic can and inevitably will be linked to you. These services are not trustworthy, nor is Tor, Tor is a damn sight better than any VPN service. By using Tor to mask your IP address you are allowing yourself to hide among the countless other people using the Tor network, this is just one of the many reasons Tor is superior to normal proxies. If you must connect to proxies, chain said proxies to the end of your Tor circuit, never before. Why are you running Tails in a VM? Just use Whonix, Whonix outclasses Tails, Whonix can be run live just like Tails. There is no need to use Tails anymore, use Whonix. I would recommend running Whonix KVM to avoid Virtualbox, however it almost certainly makes no difference at all as regular Whonix is KVM, Virtualbox just acts as a paravirtualizer interface. Are you using Windows with Tails in vmware? It tends to be windowsniggers running Tails in vmware.
>>8436 You wouldn't. By connecting to a proxy before Tor you are undoing the entire purpose of using Tor: hiding among the millions of people using the Tor network. >>8470 >Because some nodes are compromised and expose your IP when in clearnet Your VPN is compromised. There has never been a privacy respecting VPN service. You can never know a VPN provider is not logging your traffic or spying on you. Tor has a far better track record than any VPN service, where are all of the people being arrested through the Tor network for crimes? Zero. Not a single one, only people who made operational security errors (like connecting to a honeypot proxy before Tor). IP leaks have rarely happened to people who used Tor properly, those vulnerabilities were also patched long ago so I don't know why people keep harping on about it. VPNs can also leak your IP, they are far more likely to leak your IP than Tor. People at risk of IP leakage now are tor users with janky configurations, and they still have a very low chance of leaking their IP. The chance is there, they should check their IP regularly to ensure it is not leaking. Everyone should do that.
>>8436 Tor relies on encryption. Encryption relies on relatively slow brute forcing. If computers improve significantly in your lifetime then you are vulnerable to anyone who can grab your traffic. Governments of the world have already claimed they grab all encrypted traffic and likely have vast processing power.

(4.11 KB 300x100 simplebanner.png)

Hydrus Network General #4 Anonymous Board volunteer 04/16/2022 (Sat) 17:14:57 No. 8151 [Reply] [Last]
This is a thread for releases, bug reports, and other discussion for the hydrus network software. The hydrus network client is an application written for Anon and other internet-fluent media nerds who have large image/swf/webm collections. It browses with tags instead of folders, a little like a booru on your desktop. Advanced users can share tags and files anonymously through custom servers that any user may run. Everything is free, privacy is the first concern, and the source code is included with the release. Releases are available for Windows, Linux, and macOS. I am the hydrus developer. I am continually working on the software and try to put out a new release every Wednesday by 8pm EST. Past hydrus imageboard discussion, and these generals as they hit the post limit, are being archived at >>>/hydrus/ . If you would like to learn more, please check out the extensive help and getting started guide here: https://hydrusnetwork.github.io/hydrus/
108 posts and 13 images omitted.
>>8475 >>8493 Okay, thanks for the response. When the development is finished, I assume there will be an announcement. I had considered the VNC option. I'm not sure who's developing the app, if it's you or someone else, but do you know if it will be like a remote control of hydrus on a host computer, if it'll be a kind of a port of existing hydrus, or if it'll have functionality of both options? I'm also curious as of an approximate timeframe as well.
>>8455 I got it work via URL like that thouhg Hydrus url import page: https://www.pixiv.net/ajax/user/YOURPIXIVID/illusts/bookmarks?lang=en&limit=48&offset=96&rest=show&tag= I didn't try to change the limit key (was afraid of ban), so whole process was page by page - increasing offset by 48 every input of URL

(18.14 KB 256x256 retroshare-symbol.png)

Anonymous 10/25/2021 (Mon) 16:36:44 No. 5889 [Reply]
Lets discuss Retroshare. Why aren't you using it? It has: >Chat >Mail >Forums >Channels >Boards >File Sharing >And More It is an encrypted peer to peer network which can be set up to use Tor and/or I2P to hide your IP from glowniggers. Given that this is a tech board, I'm sure you'll figure out how to set it up. To get started you'll need frens, add me and post your certificate so other frens can add you too. ABAmchg80CCBtxnrp6aOLvxfAxRVqjSuLTmBrHtFyS1IXEVqyo/m6wEDZG16kEIAAAAE5s5jZTJjaXB2NmVxbWptZWhxYnVuZHB5 Mml3aXhxdTJxN2JneHk0YWRneGxnNXI3d2ZmeDdhLmIzMi5pMnCTBgEAAH/mzAQD1Xh0
6 posts omitted.
Has anyone seen any security audits of Retroshare? It is open source, but I've never seen a code audit.
>>6652 Also, what do you think it is best used for? It has a lot of functionality including chat, email, forums, channels, file sharing, and supposedly VOIP if you install the right plugin I've tried all of that except for VOIP. It seems to work pretty well, but some things seem a little buggy or not well polished
>>5913 >Is it impossible to have a P2P anonymous message board? If you have something to say you are not anon

(127.77 KB 1200x1200 1200px-KeePass_icon.svg.png)

Password Managers Anonymous 06/01/2021 (Tue) 17:14:56 No. 4278 [Reply]
Ok it's time to get a password manager. It has to be open source, free and without any cloud crap because I trust nobody. Which PM do you anons use? Which KeepAss is better? There's the OG, X and XC now. Is there any way to extend my PM to android manually without any company getting their hands on my database? Let's discuss.
17 posts and 4 images omitted.
I mentally encrypt my passwords from plain text to AES-256, then use invisible ink to write them down on a grain of rice. Then I take the rice and hide it under a loose floorboard in my bedroom. I did lose my passwords once to a hungry mouse, but other than that, I'm pretty happy with this arrangement.
>>5658 You should cipher your written passwords. If someone were to sneak into your home they could collect all of your passwords. In the event of a raid I am capable of destroying my written passwords, however in the event of a clandestine operation to access them, I am also protected somewhat. However if pictures of the ciphered keys were taken they could be deciphered.

(642.83 KB 1138x1078 firefox.png)

(59.52 KB 256x256 pale_moon.png)

(13.26 KB 262x119 libre_js.png)

Browser and Internet Privacy Thread Anonymous 08/13/2020 (Thu) 06:48:58 No. 984 [Reply] [Last]
A place to shill for your favorite browsers & addons. Learn how to protect yourself from the botnet. What are your favorite addons and browsing tricks to protect your privacy? Share them here so we can all be a little safer. Browsers Chrome Chrome is somehow still in the lead due to sheer momentum, despite even the dumbest lusers cracking jokes about memory usage. Google has continued to abuse their position as the largest website and browser to force non-standards compliant changes to the way rendering works, generally to their benefit. Should be avoided at all costs. They track everything you do in some way. Chromium Even "de-Google'd" it still phones home and tracks your every move. Plus it gives them market share to bully smaller browsers and websites into complying with their standards. Avoid. Firefox Mozilla is pretty cucked and it's running on Rust these days, but it's a decent compromise between the modernity of Chrome and the standards compliance of something like Pale Moon. It's the closest you can get to a proper browser that's also updated regularly. Addons are worse now that they use Google's "web extensions" API, which is a downgrade from the Mozilla API and no more secure. But the whole "Quantum" thing has it flying, and they are better about standards compliance than Chrome is, and usually only break away because Chrome gives them no choice. Pale Moon The Gentooman's preferred choice, although some sites just don't play nice with it anymore. The last real holdout of old Gecko rendering. Has a diverse ecosystem, but it's basically the remnants of Firefox from yesteryear repackaged. Not bad if you can stand many sites not playing nice.

Message too long. Click here to view full text.

155 posts and 35 images omitted.
>>8405 oW0 whats this flash was abandoned because it had goatse level gapping security holes, flash should never be allowed to connect to the internet ever again, if you want to run flash files use a standalone that you can firewall dont run flash on any site, the sites that still have flash should be treated as malicious and are probably still running beef hooks just download the .swf file from the html page and run it in a standalone flash player, not on the fucking site
>>8406 Flash was abandoned because jewgle and crapple were mad adobe cornered the online interactive content sector and conspired together to destroy it from within via HTML5. You have mobile phones and browser companies to blame. With almost all modern browsers running some form of Chrome and phones phasing out Flash support at the beginning of the 2010s, there was zero reason to continue its development.
Hardened Tor browser or a torified CLI browser is the only way to go for privacy assuming you have taken measures outside internet privacy. Hard block javascript. Disable telemetry and webgl. Only use TBB at the highest security level, disable automatic updates, remove NoScript and replace it with uBlock Origins or uMatrix.

How do i make mods for games? Anonymous 05/16/2022 (Mon) 22:28:15 No. 8459 [Reply]
Hello everyone i was wondering on how i could get started in modding video games and if there any guides out there thank you :)
>>8459 What game or type of game? You should probably start by picking one with mod tools, and ideally one you actually like to play.
>>8461 I want to mod postal 2 and thank you :)

How to communicate with the devil using ions ? Anonymous 05/16/2022 (Mon) 13:54:06 No. 8457 [Reply]
How to communicate with the devil using ions ? You will provide three "lead container". You will obtain sodium chloride, potassium and calcium powders. Put the sodium chloride powder in a container, calcium powder in a container and potassium powder in a separate container. Connect the "bulb that gives ultraviolet light" to lead containers. Connect the "ultraviolet light bulb" to a sound amplifier with a microphone. Give Arabic, Persian and ancient-Hebrew commands using the microphone. Satan does not know other languages.

There is no such thing as Ukrainian hackers. Anonymous 05/12/2022 (Thu) 18:39:37 No. 8419 [Reply]
There is no such thing as Ukrainian hackers. These so-called Ukrainian hackers are agents of the USA, England and Israel. Cyber attacks are constantly being carried out against Russia.These attacks are said to be made by these so-called "ukrainian hackers". In reality, there is no cyber attack on Russia. Attacks on Russian systems are not made over tcp/ip and udp networks. The main source of attacks on Russia are crypto-Jews living in Russia who have embedded the NSA's Cottonmouth and Bulldozer hardware into Russian computer systems. These equipments are managed remotely via radio signals, not internet network. Attacks on Russia are not cyber attacks but electronic signal attacks
>The main source of attacks on Russia are crypto-Jews living in Russia ah so you finally discovered her; the main attacker?
US, UK and Israel Intelligence

where Sell nft gasless free ? Anonymous 05/15/2022 (Sun) 16:30:53 No. 8450 [Reply]
Where mates?

(2.21 MB 1963x2500 f4460216.png)

Operation Download And Conquer Anonymous 10/02/2021 (Sat) 13:51:54 No. 5546 [Reply] [Last]
Given how majority of the internet's audio and video services are provided by Google, thanks to Youtube, the purpose of this operation is to loosen the death-grip that has taken hold. This process will only require that you have a steady internet connection and (Advisably) 100 GB of free space. Here is the process: Step 1 Download the latest versions of FFMpeg and Youtube-DL, and put all the programs into the same folder: http://ffmpeg.org/ https://ytdl-org.github.io/youtube-dl/index.html Step 2 Create an account to any video sites that you wish to distribute videos on. Here are some of the more well-known alternatives, as well as some recommended sites: AfreecaTV: https://www.afreecatv.com/ Bitchute: https://www.bitchute.com/ BitTube: https://bittube.tv/ D.tube: https://d.tube/ Dailymotion: https://www.dailymotion.com/ LBRY: https://lbry.com/ NicoNico: https://www.nicovideo.jp/ Rumble: https://rumble.com/

Message too long. Click here to view full text.

55 posts and 19 images omitted.
>>8424 Buy my balls nigga
>>8423 The whole point to requiring your number is so that they could have your data, being able to get a temporary number or a virtual one would defeat the purpose of that now wouldn't it. If something demands your phone number to use it and refuses to function without it, it isn't worth it in the first place.
Cool, but do any of these websites have an API that allows you to upload videos? Doing the uploads by hand sounds like a waste of time. And if there was an upload API, you could just set up a process to download and upload things in the background, which is a lot more efficient.

[ 123456789101112 ]
Manage Board Moderate Board Moderate Threads