/t/ - Technology

Discussion of Technology

Catalog Archive Bottom
Mode: Thread
Options
Subject
Message

Max message length: 8000

Files

Max file size: 32.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

Captcha
E-mail
Password

(used to delete files and postings)

Misc

Remember to follow the rules

The backup domain is located at 8chan.se. .cc is a third fallback. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 2.0.

Please be aware of the Site Fallback Plan!
In case outages in Eastern Europe affect site availability, we will work to restore service as quickly as possible.

WE ARE PLANNING THE 2.8 SITE UPGRADE FOR THIS WEEKEND, MONDAY EVENING 6-27. DOWNTIME WILL BE BRIEF, AND THEN WE HUNT FOR BUGS.
(Estamos planeando la actualización del sitio 2.8 para este fin de semana, del lunes 6 al 27 por la tarde o por la noche en CST. El tiempo de inactividad será breve y luego buscaremos errores.)


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

Board Nuking Issue should be resolved. Apologies for any missing posts.

(291.84 KB 450x399 stallman_saves.png)

/t/ - Technology Codexx Board owner 04/25/2020 (Sat) 07:10:33 No. 2 [Reply]
Welcome to /tech/ - ∞chan's technology board. Please check the rules before you post: https://8chan.moe/rules.js?boardUri=t Looking for hardware or software recommendations? Check out the InstallGentoo Wiki: https://wiki.installgentoo.com/ /tech/ is for the discussion of technology and related topics. /tech/ is NOT your personal tech support team or personal consumer review site. We have stickies for that. Keep those kinds of posts in there. For tech support, software recommendations, and other questions that don't warrant their own thread, please use the '/tech/ Questions and Support' sticky. For consumer advice, please use the consumer advice sticky located below. For tech support/issues with computers: https://startpage.com/ or https://ixquick.com (i.e., fucking Google it) https://stackexchange.com/

Message too long. Click here to view full text.

Edited last time by codexx on 04/25/2020 (Sat) 07:14:46.

(2.82 KB 200x200 questionmark.png)

/t/ech Questions and Support Anonymous 04/25/2020 (Sat) 07:16:43 No. 3 [Reply] [Last]
Bring all your hardware, software and other troubles here.
1901 posts and 431 images omitted.
Is there a webpage or a program that renders matrix characters for windows like the terminal program Unimatrix?

(4.65 KB 200x200 dollarsign.png)

Consumer Advice Anonymous 04/25/2020 (Sat) 07:18:24 No. 4 [Reply] [Last]
Looking to buy something but aren't sure what to get? Ask here.
551 posts and 146 images omitted.
>>8736 looks like Casio is my best bet, ~$29 at Walmart for one with Vibration Alarm

(4.11 KB 300x100 simplebanner.png)

Hydrus Network General #4 Anonymous Board volunteer 04/16/2022 (Sat) 17:14:57 No. 8151 [Reply] [Last]
This is a thread for releases, bug reports, and other discussion for the hydrus network software. The hydrus network client is an application written for Anon and other internet-fluent media nerds who have large image/swf/webm collections. It browses with tags instead of folders, a little like a booru on your desktop. Advanced users can share tags and files anonymously through custom servers that any user may run. Everything is free, privacy is the first concern, and the source code is included with the release. Releases are available for Windows, Linux, and macOS. I am the hydrus developer. I am continually working on the software and try to put out a new release every Wednesday by 8pm EST. Past hydrus imageboard discussion, and these generals as they hit the post limit, are being archived at >>>/hydrus/ . If you would like to learn more, please check out the extensive help and getting started guide here: https://hydrusnetwork.github.io/hydrus/
194 posts and 29 images omitted.
>>8753 The good catch-all solution here is to hit up services->review services and click 'refresh account' on the repository page. That forces all current errors to clear out and tries to do a basic network resync immediately. Assuming your internet connection and the server are ok again, it'll fix itself and you can upload again. >>8755 >>8756 >>8757 Yeah, Inno. There's some /silent or something commands I know you can give the installer to do it quietly, and in fact that's one reason the installer now defaults to not checking the 'open client' box on the last page, so some automatic installer a guy was making can work in the background. I'm afraid I am no expert in it though. If I can help you here, let me know what I can do. >>8758 Ah, yeah, sorry--there's no real detailed log kept or data structure made of your precise decisions. If you do always delete worse duplicates though, then I think you can get an analogue for this data you want. Any time you have a duplicate that is still in 'my files', you know that was set as 'same quality', since it wasn't deleted. Any time a duplicate is deleted, you know you set it as 'worse'. If you did something like: 'sort by modified time' (maybe a creator tag to reduce the number of results) system:file relationships: > 0 dupe relationships

Message too long. Click here to view full text.

>>8759 >Unironically being that guy Buddy, you just replied to a reply about easier updating with something that would make it ten times harder. Not to mention that hilariously dated meme. >>8760 Yeah, Choco passes /verysilent IIRC, and /DIR would work, but Powershell's quote parsing is fucking indecipherable, Choco's documention on the matter is outright wrong, and I can't 'sudo' in cmd. I'm considering writing a script to just produce update PRs for the Winget repo myself, since it's starting to seem like that would be easier, but I don't want to go through all of Github's API shit.
Pyside is nearly PyPy compatible (see https://bugreports.qt.io/browse/PYSIDE-535). What work would need to be done in Hydrus to support running under PyPy?

Using Secure Passwords - Tips and Tricks Anonymous 05/28/2022 (Sat) 20:54:15 No. 8560 [Reply]
You know the old sayings when it comes to password security. >Never use the same password twice >Choose hard passwords that use numbers, symbols, caps and lowercase >Never write down or store passwords in a way that could be compromised >Change passwords semi-regularly >Never reuse an old password These are great ideas from a technical standpoint, but they completely and totally ignore the human factor. A hard password is difficult to remember, let alone when you have ten of them for ten different sites. Without writing them down somewhere you're likely to forget them, and even more likely to forget the ones you change frequently. This sucks, so I'm going to share a couple tips and tricks I use for making and remembering secure passwords. These two tricks are Passphrases and Catches. >Passphrases A passphrase is like a password but it much easier to structure and remember. It can be any line or quote that is memorable to you for some reason, which you then modify in a rememberable way to make more secure. Let me show you some examples. Starting with a simple phrase like "the quick brown fox" from the famous example of "using every letter in the alphabet", you could easily make this into a very memorable, hard to break passphrase. The addition of one symbol in a particular spot, and capitalizing each word in the phrase other than the first, is a simple adjustment. As a rule, don't always capitalize the first letter of your password, and don't always put your symbols or punctuation at the end, because cracking programs often anticipate this. >the#QuickBrownFox is a seventeen character, secure password. For comparison, try remembering iQd#rgYtbaLsdevPG. The strength is comparable. >Catches

Message too long. Click here to view full text.

2 posts omitted.
>>8561 >being this retarded password breaches happen all the time you moron https://haveibeenpwned.com/
>>8560 >A passphrase is like a password but it much easier to structure and remember. Not so great if shoulder surfing is in your threat model
How about just slapping your hands on the keyboard, selecting a section that's 8-32 characters long, writing it down, and burning the paper after the 20th time you use it? And/or intentionally add characters that are absent from standard keyboards such as £, ¥, ü, ç, æ, ø, and so on.

Let's Learn C Together, Imageboard Style Anonymous 05/02/2022 (Mon) 02:31:22 No. 8314 [Reply] [Last]
So I'm recently getting back into writing code again after a multi-year break. I used to be pretty proficient at BASIC and Visual Basic, BASH scripting, and I dabbled in Perl and PHP. Recently I've decided I want to learn C and git gud at it, but going through lessons and tutorials alone is boring when you have no feedback. There's already a dedicated programming thread, but I think there's enough here to warrant a standalone thread where we go through things together. We'll be using two resources. >C: How to Program - an in-depth textbook >The C Programming Language - long considered the beginner's bible for C >Why bother with C when C++ is a thing? C++ is basically object-oriented C, or C with classes. While C++ is a very useful language C is often more immediately applicable to simple, no-bullshit programs that do useful things. C is simpler, with less weeds to get lost in and is thus quicker to learn. And if you are good at C, then it's just a short hop to learning C++. We learn C to walk before we run. Since I'm a newbie too I'll post useful things I learn and code examples I write ITT for anons to play with, and explain the things I learn both for your benefit and to help me remember them better. If you want to join me, start off by reading The C Programming Language cover-to-cover. If something seems confusing, cross reference it in C: How to Program for a different perspective. Here we go.
88 posts and 43 images omitted.
>>8748 >mfw That's an interesting one. The syntax in the file would need to be a bit different though, but let us know how it goes.
>uint8_t nigger=0; uint8_t specifying a 1-byte standard unsigned integer, corresponding to an unsigned char. I think that's the piece I was missing. >>8750 I can confirm this works, hilariously. You have to comma delineate the input file and remember to put the path in quotes. Its useless for this application, but yeah it works. It just pulls the text from the file into the array brackets and off you go.
>>8752 "uint8_t" is for practical purposes the same as "unsigned char" on desktop platforms nigger. It's literally going to be aliased to unsigned char inside your system's headers.

(642.83 KB 1138x1078 firefox.png)

(59.52 KB 256x256 pale_moon.png)

(13.26 KB 262x119 libre_js.png)

Browser and Internet Privacy Thread Anonymous 08/13/2020 (Thu) 06:48:58 No. 984 [Reply] [Last]
A place to shill for your favorite browsers & addons. Learn how to protect yourself from the botnet. What are your favorite addons and browsing tricks to protect your privacy? Share them here so we can all be a little safer. Browsers Chrome Chrome is somehow still in the lead due to sheer momentum, despite even the dumbest lusers cracking jokes about memory usage. Google has continued to abuse their position as the largest website and browser to force non-standards compliant changes to the way rendering works, generally to their benefit. Should be avoided at all costs. They track everything you do in some way. Chromium Even "de-Google'd" it still phones home and tracks your every move. Plus it gives them market share to bully smaller browsers and websites into complying with their standards. Avoid. Firefox Mozilla is pretty cucked and it's running on Rust these days, but it's a decent compromise between the modernity of Chrome and the standards compliance of something like Pale Moon. It's the closest you can get to a proper browser that's also updated regularly. Addons are worse now that they use Google's "web extensions" API, which is a downgrade from the Mozilla API and no more secure. But the whole "Quantum" thing has it flying, and they are better about standards compliance than Chrome is, and usually only break away because Chrome gives them no choice. Pale Moon The Gentooman's preferred choice, although some sites just don't play nice with it anymore. The last real holdout of old Gecko rendering. Has a diverse ecosystem, but it's basically the remnants of Firefox from yesteryear repackaged. Not bad if you can stand many sites not playing nice.

Message too long. Click here to view full text.

159 posts and 36 images omitted.
>>8535 You are almost certainly a mentally ill autist that is either a homosexual or a pedophile If you are this invested in internet browsers.
>>8536 Say that to my face not online and see what happens

(78.56 KB 1200x1200 rose.jpg)

How to monetize two pwned servers Anonymous 12/01/2021 (Wed) 09:24:49 No. 6459 [Reply]
Now I happen to have root on two servers (not vps, real servers). What would be the best way to make some bucks out of them?
2 posts omitted.
get persistence first
>>6459 Who do they belong to?
>>6459 Mine some crypto lol.

(20.30 KB 708x828 image.png)

Wazup my wiggas learn computer science Anonymous 05/29/2022 (Sun) 21:04:55 No. 8575 [Reply]
List of books to teach yourself computer science https://teachyourselfcs.com/ Just pirate the books from zlibrary
>>8575 Kino, thanks OP.

(121.26 KB 1280x720 defeating-microwave-weapons.jpg)

Defeating Microwave Weapons Anonymous 06/03/2022 (Fri) 11:08:08 No. 8634 [Reply]
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult.

Message too long. Click here to view full text.


Intel is not an American company. Anonymous 05/14/2022 (Sat) 11:10:39 No. 8441 [Reply]
Intel is not an American company. Intel is an Israeli espionage company. Intel processors communicate with Israel using radio signals via amplitude modulation. With this method, he spies on Israel.
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult.

Message too long. Click here to view full text.


There is no such thing as Ukrainian hackers. Anonymous 05/12/2022 (Thu) 18:39:37 No. 8419 [Reply]
There is no such thing as Ukrainian hackers. These so-called Ukrainian hackers are agents of the USA, England and Israel. Cyber attacks are constantly being carried out against Russia.These attacks are said to be made by these so-called "ukrainian hackers". In reality, there is no cyber attack on Russia. Attacks on Russian systems are not made over tcp/ip and udp networks. The main source of attacks on Russia are crypto-Jews living in Russia who have embedded the NSA's Cottonmouth and Bulldozer hardware into Russian computer systems. These equipments are managed remotely via radio signals, not internet network. Attacks on Russia are not cyber attacks but electronic signal attacks
1 post and 1 image omitted.
US, UK and Israel Intelligence
>>8434 nakadashi
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult.

Message too long. Click here to view full text.


Programming Thread: Up and Running Edition Anonymous 04/27/2020 (Mon) 19:03:16 No. 9 [Reply] [Last]
Hey Anon, Learn to Code! There's a bunch of free resources for learning to program. Come here to ask for advice or to discuss current projects. Download the complete Gentooman's Library: https://g.sicp.me/books/ Visit MIT OpenCourseware on (((YouTube))) https://www.youtube.com/user/MIT Or take one of these free online courses being offered by universities right now: https://www.freecodecamp.org/news/free-courses-top-cs-universities/
Edited last time by codexx on 05/04/2020 (Mon) 00:54:19.
245 posts and 65 images omitted.
Has anyone ever made a webscrapper for collecting images under a tag/hashtag on twatter/oixiv/some booru? How would you go about doing such?
Bump this awesome thread. I'm learning prog from scratch, whish me luck.
>ctrl + f >"the art of programming" not found contempt.png

(18.14 KB 256x256 retroshare-symbol.png)

Anonymous 10/25/2021 (Mon) 16:36:44 No. 5889 [Reply]
Lets discuss Retroshare. Why aren't you using it? It has: >Chat >Mail >Forums >Channels >Boards >File Sharing >And More It is an encrypted peer to peer network which can be set up to use Tor and/or I2P to hide your IP from glowniggers. Given that this is a tech board, I'm sure you'll figure out how to set it up. To get started you'll need frens, add me and post your certificate so other frens can add you too. ABAmchg80CCBtxnrp6aOLvxfAxRVqjSuLTmBrHtFyS1IXEVqyo/m6wEDZG16kEIAAAAE5s5jZTJjaXB2NmVxbWptZWhxYnVuZHB5 Mml3aXhxdTJxN2JneHk0YWRneGxnNXI3d2ZmeDdhLmIzMi5pMnCTBgEAAH/mzAQD1Xh0
8 posts omitted.
>>5913 >Is it impossible to have a P2P anonymous message board? If you have something to say you are not anon
Is it possible to use Retroshare on Tails? Or should I avoid it?
>>5889 >Chat that's the first reason that comes to mind

(202.65 KB 474x474 ClipboardImage.png)

Lithium Ion Batteries Anonymous 11/27/2021 (Sat) 19:48:57 No. 6405 [Reply]
I fucking have lithium ion batteries so fucking much. Every god damn device on the fucking planet now has some stupid fucking soldered in lithium ion battery instead of just letting me slot in my own batteries. So now whenever I buy something as stupid as fucking small electric screwdriver I have to account for the fact that when I leave it on the shelf for a couple years and pick the thing up the cheap chink shit battery inside it will have killed itself and made the thing fucking useless. I can't even count the number of times I've picked up an electronic device with one of these useless fucking things inside them only to discover it died and is now a fucking paperweight unless I go onto ebay and comb through a bunch of shitty batteries to find the bizarre form factor they used in that specific device only to have to fucking rip the entire thing down and solder in an entirely new battery to use a basic fucking electronic. Why the fuck can't retards just let me use replaceable standardize batteries in devices. I DON'T WANT TO RECHARGE MY SHIT WITH A USB CABLE JUST LET ME PUT BATTERIES INTO THE FUCKING DEVICES.
13 posts and 3 images omitted.
>>6405 theyre easy to replace theyre almost all 3.7v, I have a bunch of phone batteries I save just for replacing only problem is when the device doesnt have a connector for the third pin and only +- cuz then you need to figure out if its a fuse or just a temp out , you can just solder it to + to complete the circuit but if its a fuse then it will blow as soon as you finish a full charge and kill the battery, no idea how to tell if its fused until it blows but luckily theyre uncommon, most are cheapo chinkos
>>6425 why not? i soldered lipo to my old psp and it was best decision i ever made. so many hours of gameplay that puts steam deck to shame
>>6405 Have you considered making your own technology, my guy? Those are just the mutterings of a tech-slave who is incapable of providing for himself.

How do i make mods for games? Anonymous 05/16/2022 (Mon) 22:28:15 No. 8459 [Reply]
Hello everyone i was wondering on how i could get started in modding video games and if there any guides out there thank you :)
1 post omitted.
>>8461 I want to mod postal 2 and thank you :)
>>8459 well if they dont provide a public API for people to modify the game behavior with then you'll have to get a binary analyzer tool like ghidra or IDA and start reverse engineering the program. Find out where & how it loads stuff, where important memory structs are allocated, how the game logic runs, etc. Then simply patch bytes in the original program to add your own behavior. You can also just try to decompile the entire thing and modify it like that, this is how most java programs are modded, but thats not such an easy process for native programs like this game but maybe its still possible idk never tried. I recommend watching this: https://www.youtube.com/watch?v=w7gBkVXuDSQ&list=PLpnX4b2uRf5-_aLRjuIpav2Zh45C4f2QH

[ 123456789101112 ]
Manage Board Moderate Board Moderate Threads
Forms
Delete
Report