/t/ - Technology

Discussion of Technology

Catalog Archive
Options
Subject
Message

Max message length: 8001

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Ghost Screen
Don't forget the global announcement this week
Saturday Evening


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(134.45 KB 1920x720 101.176.95.67.png)

http://101.176.95.67 Anonymous 07/28/2022 (Thu) 07:26:36 No. 9036 [Reply]
Hello, here's a one time advertisement for a new search engine. http://101.176.95.67 Do not expect me to advertise this a second time, write down the website address if you want to find it again. The search engine is free to use but additionally you may purchase complete search results in .txt documents. There is additional features planned for this search engine. You may use this search engine currently to explore a very weird internet.
>>9036 I am a new /t user, I am somewhat tech illiterate. Can someone explain what this is supposed to do? I don’t get what this engine does different from google.
>>9048 >google Goolag is known to be harmful. It includes ads (as search results) and censors results. Moreover, Google spies on you and collects data. I recommend you use https://searx.neocities.org/ instead of Goolag.

(27.47 KB 260x410 moooooooooot.jpeg)

Anonymous 07/31/2021 (Sat) 16:19:51 No. 4998 [Reply]
>can't post on 4chan using TOR because 'muh CP!!!!' >can't use vpns to evade ban cus 'muh abuse!!!!!!' >can't use 4chan pass with mobile clients without risking ban cus 'mah cool desktop design!!!!!!!!!!!!!!' >can do all those things on TOR/privacy compatible *chan's and there's way less CP and abuse What did moot mean by this?
13 posts and 1 image omitted.
>>7549 Wirechan better though.
>>7740 >>7742 <that never happen
It's common knowledge that the FBI has mod access to /b/. Probably the TOR/VPN policies are in place to make their job easier.

Let's Learn C Together, Imageboard Style Anonymous 05/02/2022 (Mon) 02:31:22 No. 8314 [Reply] [Last]
So I'm recently getting back into writing code again after a multi-year break. I used to be pretty proficient at BASIC and Visual Basic, BASH scripting, and I dabbled in Perl and PHP. Recently I've decided I want to learn C and git gud at it, but going through lessons and tutorials alone is boring when you have no feedback. There's already a dedicated programming thread, but I think there's enough here to warrant a standalone thread where we go through things together. We'll be using two resources. >C: How to Program - an in-depth textbook >The C Programming Language - long considered the beginner's bible for C >Why bother with C when C++ is a thing? C++ is basically object-oriented C, or C with classes. While C++ is a very useful language C is often more immediately applicable to simple, no-bullshit programs that do useful things. C is simpler, with less weeds to get lost in and is thus quicker to learn. And if you are good at C, then it's just a short hop to learning C++. We learn C to walk before we run. Since I'm a newbie too I'll post useful things I learn and code examples I write ITT for anons to play with, and explain the things I learn both for your benefit and to help me remember them better. If you want to join me, start off by reading The C Programming Language cover-to-cover. If something seems confusing, cross reference it in C: How to Program for a different perspective. Here we go.
98 posts and 50 images omitted.
>>8867 >Though I'm curious if I'd need to free all the elements of (Current) as well, since its just a string and not an array of structs. No, that wouldn't make any sense. Each element in the string is basically an integer, not a pointer. >its just a string and not an array of structs. Technically you've never used an array of structs, only an array of pointers. Try to make a drawing of the memory layout to understand it properly if it's confusing. Then post it so that we can bully you.
>>8870 I mean, in the struct dirent **pages line I'm dereferencing a pointer twice. I suppose it'd be more explicit to say I'm "looking at a pointer that's looking at a pointer that's pointing into an array of structs", but is the pages array created by scandir() not an array of structs? The official literature is a little obtuse as to the structure of the memory segment that scandir() creates.
>>8867 >int pick = (rand() % (randupper-randlower+1)+2); what is this shit its like this idiot pick = rand() % ((randupper+1) - (randlower-1));

/tech/ shows and podcasts? Anonymous 07/11/2022 (Mon) 04:00:56 No. 8859 [Reply]
Any kino /t/ recommendations?

Using Secure Passwords - Tips and Tricks Anonymous 05/28/2022 (Sat) 20:54:15 No. 8560 [Reply]
You know the old sayings when it comes to password security. >Never use the same password twice >Choose hard passwords that use numbers, symbols, caps and lowercase >Never write down or store passwords in a way that could be compromised >Change passwords semi-regularly >Never reuse an old password These are great ideas from a technical standpoint, but they completely and totally ignore the human factor. A hard password is difficult to remember, let alone when you have ten of them for ten different sites. Without writing them down somewhere you're likely to forget them, and even more likely to forget the ones you change frequently. This sucks, so I'm going to share a couple tips and tricks I use for making and remembering secure passwords. These two tricks are Passphrases and Catches. >Passphrases A passphrase is like a password but it much easier to structure and remember. It can be any line or quote that is memorable to you for some reason, which you then modify in a rememberable way to make more secure. Let me show you some examples. Starting with a simple phrase like "the quick brown fox" from the famous example of "using every letter in the alphabet", you could easily make this into a very memorable, hard to break passphrase. The addition of one symbol in a particular spot, and capitalizing each word in the phrase other than the first, is a simple adjustment. As a rule, don't always capitalize the first letter of your password, and don't always put your symbols or punctuation at the end, because cracking programs often anticipate this. >the#QuickBrownFox is a seventeen character, secure password. For comparison, try remembering iQd#rgYtbaLsdevPG. The strength is comparable. >Catches

Message too long. Click here to view full text.

2 posts omitted.
>>8561 >being this retarded password breaches happen all the time you moron https://haveibeenpwned.com/
>>8560 >A passphrase is like a password but it much easier to structure and remember. Not so great if shoulder surfing is in your threat model
How about just slapping your hands on the keyboard, selecting a section that's 8-32 characters long, writing it down, and burning the paper after the 20th time you use it? And/or intentionally add characters that are absent from standard keyboards such as £, ¥, ü, ç, æ, ø, and so on.

(642.83 KB 1138x1078 firefox.png)

(59.52 KB 256x256 pale_moon.png)

(13.26 KB 262x119 libre_js.png)

Browser and Internet Privacy Thread Anonymous 08/13/2020 (Thu) 06:48:58 No. 984 [Reply] [Last]
A place to shill for your favorite browsers & addons. Learn how to protect yourself from the botnet. What are your favorite addons and browsing tricks to protect your privacy? Share them here so we can all be a little safer. Browsers Chrome Chrome is somehow still in the lead due to sheer momentum, despite even the dumbest lusers cracking jokes about memory usage. Google has continued to abuse their position as the largest website and browser to force non-standards compliant changes to the way rendering works, generally to their benefit. Should be avoided at all costs. They track everything you do in some way. Chromium Even "de-Google'd" it still phones home and tracks your every move. Plus it gives them market share to bully smaller browsers and websites into complying with their standards. Avoid. Firefox Mozilla is pretty cucked and it's running on Rust these days, but it's a decent compromise between the modernity of Chrome and the standards compliance of something like Pale Moon. It's the closest you can get to a proper browser that's also updated regularly. Addons are worse now that they use Google's "web extensions" API, which is a downgrade from the Mozilla API and no more secure. But the whole "Quantum" thing has it flying, and they are better about standards compliance than Chrome is, and usually only break away because Chrome gives them no choice. Pale Moon The Gentooman's preferred choice, although some sites just don't play nice with it anymore. The last real holdout of old Gecko rendering. Has a diverse ecosystem, but it's basically the remnants of Firefox from yesteryear repackaged. Not bad if you can stand many sites not playing nice.

Message too long. Click here to view full text.

159 posts and 36 images omitted.
>>8535 You are almost certainly a mentally ill autist that is either a homosexual or a pedophile If you are this invested in internet browsers.
>>8536 Say that to my face not online and see what happens

Intel is not an American company. Anonymous 05/14/2022 (Sat) 11:10:39 No. 8441 [Reply]
Intel is not an American company. Intel is an Israeli espionage company. Intel processors communicate with Israel using radio signals via amplitude modulation. With this method, he spies on Israel.
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult.

Message too long. Click here to view full text.


(18.14 KB 256x256 retroshare-symbol.png)

Anonymous 10/25/2021 (Mon) 16:36:44 No. 5889 [Reply]
Lets discuss Retroshare. Why aren't you using it? It has: >Chat >Mail >Forums >Channels >Boards >File Sharing >And More It is an encrypted peer to peer network which can be set up to use Tor and/or I2P to hide your IP from glowniggers. Given that this is a tech board, I'm sure you'll figure out how to set it up. To get started you'll need frens, add me and post your certificate so other frens can add you too. ABAmchg80CCBtxnrp6aOLvxfAxRVqjSuLTmBrHtFyS1IXEVqyo/m6wEDZG16kEIAAAAE5s5jZTJjaXB2NmVxbWptZWhxYnVuZHB5 Mml3aXhxdTJxN2JneHk0YWRneGxnNXI3d2ZmeDdhLmIzMi5pMnCTBgEAAH/mzAQD1Xh0
8 posts omitted.
>>5913 >Is it impossible to have a P2P anonymous message board? If you have something to say you are not anon
Is it possible to use Retroshare on Tails? Or should I avoid it?
>>5889 >Chat that's the first reason that comes to mind

How do i make mods for games? Anonymous 05/16/2022 (Mon) 22:28:15 No. 8459 [Reply]
Hello everyone i was wondering on how i could get started in modding video games and if there any guides out there thank you :)
2 posts and 1 image omitted.
>>8459 well if they dont provide a public API for people to modify the game behavior with then you'll have to get a binary analyzer tool like ghidra or IDA and start reverse engineering the program. Find out where & how it loads stuff, where important memory structs are allocated, how the game logic runs, etc. Then simply patch bytes in the original program to add your own behavior. You can also just try to decompile the entire thing and modify it like that, this is how most java programs are modded, but thats not such an easy process for native programs like this game but maybe its still possible idk never tried. I recommend watching this: https://www.youtube.com/watch?v=w7gBkVXuDSQ&list=PLpnX4b2uRf5-_aLRjuIpav2Zh45C4f2QH
You missed the golden age of [everything] development, there's no going back. https://web.archive.org/web/20040524034647/http://collective.valve-erc.com/

How to communicate with the devil using ions ? Anonymous 05/16/2022 (Mon) 13:54:06 No. 8457 [Reply]
How to communicate with the devil using ions ? You will provide three "lead container". You will obtain sodium chloride, potassium and calcium powders. Put the sodium chloride powder in a container, calcium powder in a container and potassium powder in a separate container. Connect the "bulb that gives ultraviolet light" to lead containers. Connect the "ultraviolet light bulb" to a sound amplifier with a microphone. Give Arabic, Persian and ancient-Hebrew commands using the microphone. Satan does not know other languages.

(58.88 KB 600x675 show_me_the_booty.jpg)

(843.85 KB 1200x1839 blackbeard.jpg)

(70.42 KB 1024x1024 IPFS.png)

/p2p/ General Anonymous 05/06/2020 (Wed) 02:13:46 No. 23 [Reply] [Last]
Welcome to /p2p/, the dedicated peer-to-peer thread for /tech/ and the bunker for /t/orrentfags. What is P2P? Peer-to-Peer technologies allow decentralized networks to share data. They can be used to bypass oppressive government regulations on speech or to download the latest seasonal anime. What are my options? First and foremost is BitTorrent, a common protocol where files are split into chunks which are then shared via swarm, which works to get everyone a copy. There are many BitTorrent clients out there, and everyone has a personal preference. Some are owned my corporations and full of spyware. It's recommended you use something open source, like Deluge or qBitTorrent. Won't my internet get shut down? If your ISP is cucked then they might, but thankfully there is a solution. Use a VPN! Don't trust any VPNs that advertise all over the place. What is IPFS?

Message too long. Click here to view full text.

67 posts and 14 images omitted.
>>7454 IIRC I2P-Bote hid metadata better. But it seems to be abandoned.
>>7457 Might be a place from which to bootstrap a node list?
>>7457 damn thats gay. gave me false hope. i2p also easy to censor and block as case with china evidenced that there are more tor users than i2p users. i2p is too pozzed it has no obfuscation whatsoever and your isp can see your router wide in the open >>5382 can i send them money in envelope from russia how would that look like, wouldnt that be too sus (for russian customs that is) and what about conversion rates or do i just send dollars?

How do you make a person hear sounds that don't exist ? Anonymous 05/12/2022 (Thu) 20:08:50 No. 8422 [Reply]
How do you make a person hear sounds that don't exist ? Get a high-wattage sound system. Get a microwave oven. Remove the magnetron in the microwave oven. Remove the "magnetic coil" from the high-wattage sound system and replace it with the magnetron used in microwave ovens. You can give the inspiration you want in the high-wattage sound system. Russia and China are at this level right now. The US and Israel are at a much higher level.
they would just need to listen to my music because i aint making it anymore lul

Anonymous 10/27/2021 (Wed) 16:15:02 No. 5923 [Reply]
why fed's doesn't take down the tor and how people get caught on tor
>They use it too >Operational security blunders, human errors
>>5923 >why fed's doesn't take down the tor same reason doctors dont cure disease, theyd rather hit up your healthcare plan for a lifetime of "treatments" instead. why would feds unemploy themselves? >>https://arstechnica.com/tech-policy/2012/04/the-hidden-side-of-your-soul-how-the-fbi-uses-the-web-as-a-child-porn-honeypot/
fed is my country already made tor access illegal and hard to get to. so it's blocked. makes it 3rd country in the world to block tor 1. china 2. iran 3. russia who is gonna ban tor next?

(1.44 MB 1643x2048 2.png)

Anonymous 02/28/2022 (Mon) 08:18:16 No. 7607 [Reply]
How would one theoretically cash out money out of stolen Russian credit cards without possessing names/addresses or phones associated with them? What if said person was theoretically willing to share a lot of said cards with helpful Anons?
2 posts omitted.
>>7676 State employees and their families. Don't think I have anyone big but if I did I wouldn't know.
this is Putin smiling! lol
>>7687 united russia parliament then?

Cock.li stopped allowing new emails to register Anonymous 05/21/2021 (Fri) 21:24:08 No. 4144 [Reply]
Cock.li stopped allowing new emails to register and is only allowing new emails on an invite basis. Vincent claims do to this in reaction to governments using cock.li for foreign intelligence. Is this a canary?
2 posts omitted.
yes because big tech doesnt work directly with governments, theyre literally going to use a literal fucking joke server run by a literal nobody who has access to literally all of their emails how fucking retarded are you, literally vacccine yourself
dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/E-Mail
I'd help the fellow anons out, but I never made a cock.li account to begin with, but I'd definitely help you out otherwise.

Phone Numbers without providers. Anonymous 04/30/2022 (Sat) 06:36:24 No. 8302 [Reply]
How do provider-less phone numbers work?
Never heard of that. Sounds impossible to me, like trying to set up a domain name for your website without using a registrar. Without going through the cartel, none of the other members will recognize your independant web site/phone number. If you call your custom unregistered phone number from a standard Verizon/AT&T/whatever phone, it won't get routed properly. Basically your phone numbers would only work on your own internal phone network.

[ 12345678910111213141516171819 ]
Forms
Delete
Report