/t/ - Technology

Discussion of Technology

Catalog Archive
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

US Election Thread

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

How do I get/use malware? Anonymous 08/01/2022 (Mon) 10:06:51 No. 9082 [Reply]
How do you get malware for personal use. Such as a trojen virus to install on a pc.
Metasploit or learn hacker tools. Beginners can start with Kali Linux.
Start working for an indian call center

(8.67 KB 735x386 deepwebs.jpeg)

Anonymous SSH chat Anonymous 08/13/2022 (Sat) 06:34:48 No. 9252 [Reply]
Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf. ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.

Spurious native interrupt Anonymous 05/15/2022 (Sun) 16:21:30 No. 8449 [Reply]
When my computer is not connected to the internet, even though I formatted, changed the bios software and changed the hard disk firmware, the program opens by itself and the mouse cursor moves by itself. When I examine with the Wireshark program, an interrupt signal comes from the usb ports even though the device is not plugged into the usb ports. In this case, I am complaining. Logs are attached.
Boot to a livecd with no storage installed.
I tried it doesn't work. Again the same interrupt signals are coming.
>>8449 Post logs in plaintext .txt format.

Oy vey, throw out your accessories, it's the future! Anonymous 08/29/2020 (Sat) 13:05:15 No. 1178 [Reply]
https://www.usb.org/sites/default/files/2019-09/USB-IF_USB4%20spec%20announcement_FINAL.pdf >USB-C connectors mandated >USB 2.0 backwards compatibility minimum (your 1.1 keyboard is now moot) >b-but now you can tunnel PCI-Express Jesus Christ, even Micro$oft gives somewhat of a fuck about backwards compatibility. Do they really think that we'll send a fuckton of hardware right to trash, just because they feel like changing the connector?
13 posts omitted.
>>1181 >native USB 2 ports even though I don't think there's any reason to have those some usb bluetooth adapters say right on the box they need to be in a usb 2.0 port because usb 3.0 operates at 2.4GHz, which interferes with the bluetooth signal. also usb 2.0 is more compatible with stock windows 7 and earlier
>>1180 >Find a keyboard with an usb-c plug in your house. A year and a half late it may be, but the board I've been using for the past four or five years takes USB-C. The computer end is USB-A right now, but a replacement C-to-C cable would be cheap even if I'm still using this board a decade from now and I need to plug into a type C port. Don't tell me, are you using some Jew hardware with non-replaceable cables, so it needs to be thrown away and replaced entirely once the cable frays even if the actual hardware is still good? Do you do that with headphones too?
>>7910 Stop using wireless and Windows.

(134.45 KB 1920x720 101.176.95.67.png)

http://101.176.95.67 Anonymous 07/28/2022 (Thu) 07:26:36 No. 9036 [Reply]
Hello, here's a one time advertisement for a new search engine. http://101.176.95.67 Do not expect me to advertise this a second time, write down the website address if you want to find it again. The search engine is free to use but additionally you may purchase complete search results in .txt documents. There is additional features planned for this search engine. You may use this search engine currently to explore a very weird internet.
>>9036 I am a new /t user, I am somewhat tech illiterate. Can someone explain what this is supposed to do? I don’t get what this engine does different from google.
>>9048 >google Goolag is known to be harmful. It includes ads (as search results) and censors results. Moreover, Google spies on you and collects data. I recommend you use https://searx.neocities.org/ instead of Goolag.

Let's Learn C Together, Imageboard Style Anonymous 05/02/2022 (Mon) 02:31:22 No. 8314 [Reply] [Last]
So I'm recently getting back into writing code again after a multi-year break. I used to be pretty proficient at BASIC and Visual Basic, BASH scripting, and I dabbled in Perl and PHP. Recently I've decided I want to learn C and git gud at it, but going through lessons and tutorials alone is boring when you have no feedback. There's already a dedicated programming thread, but I think there's enough here to warrant a standalone thread where we go through things together. We'll be using two resources. >C: How to Program - an in-depth textbook >The C Programming Language - long considered the beginner's bible for C >Why bother with C when C++ is a thing? C++ is basically object-oriented C, or C with classes. While C++ is a very useful language C is often more immediately applicable to simple, no-bullshit programs that do useful things. C is simpler, with less weeds to get lost in and is thus quicker to learn. And if you are good at C, then it's just a short hop to learning C++. We learn C to walk before we run. Since I'm a newbie too I'll post useful things I learn and code examples I write ITT for anons to play with, and explain the things I learn both for your benefit and to help me remember them better. If you want to join me, start off by reading The C Programming Language cover-to-cover. If something seems confusing, cross reference it in C: How to Program for a different perspective. Here we go.
98 posts and 50 images omitted.
>>8867 >Though I'm curious if I'd need to free all the elements of (Current) as well, since its just a string and not an array of structs. No, that wouldn't make any sense. Each element in the string is basically an integer, not a pointer. >its just a string and not an array of structs. Technically you've never used an array of structs, only an array of pointers. Try to make a drawing of the memory layout to understand it properly if it's confusing. Then post it so that we can bully you.
>>8870 I mean, in the struct dirent **pages line I'm dereferencing a pointer twice. I suppose it'd be more explicit to say I'm "looking at a pointer that's looking at a pointer that's pointing into an array of structs", but is the pages array created by scandir() not an array of structs? The official literature is a little obtuse as to the structure of the memory segment that scandir() creates.
>>8867 >int pick = (rand() % (randupper-randlower+1)+2); what is this shit its like this idiot pick = rand() % ((randupper+1) - (randlower-1));

/tech/ shows and podcasts? Anonymous 07/11/2022 (Mon) 04:00:56 No. 8859 [Reply]
Any kino /t/ recommendations?

Using Secure Passwords - Tips and Tricks Anonymous 05/28/2022 (Sat) 20:54:15 No. 8560 [Reply]
You know the old sayings when it comes to password security. >Never use the same password twice >Choose hard passwords that use numbers, symbols, caps and lowercase >Never write down or store passwords in a way that could be compromised >Change passwords semi-regularly >Never reuse an old password These are great ideas from a technical standpoint, but they completely and totally ignore the human factor. A hard password is difficult to remember, let alone when you have ten of them for ten different sites. Without writing them down somewhere you're likely to forget them, and even more likely to forget the ones you change frequently. This sucks, so I'm going to share a couple tips and tricks I use for making and remembering secure passwords. These two tricks are Passphrases and Catches. >Passphrases A passphrase is like a password but it much easier to structure and remember. It can be any line or quote that is memorable to you for some reason, which you then modify in a rememberable way to make more secure. Let me show you some examples. Starting with a simple phrase like "the quick brown fox" from the famous example of "using every letter in the alphabet", you could easily make this into a very memorable, hard to break passphrase. The addition of one symbol in a particular spot, and capitalizing each word in the phrase other than the first, is a simple adjustment. As a rule, don't always capitalize the first letter of your password, and don't always put your symbols or punctuation at the end, because cracking programs often anticipate this. >the#QuickBrownFox is a seventeen character, secure password. For comparison, try remembering iQd#rgYtbaLsdevPG. The strength is comparable. >Catches

Message too long. Click here to view full text.

2 posts omitted.
>>8561 >being this retarded password breaches happen all the time you moron https://haveibeenpwned.com/
>>8560 >A passphrase is like a password but it much easier to structure and remember. Not so great if shoulder surfing is in your threat model
How about just slapping your hands on the keyboard, selecting a section that's 8-32 characters long, writing it down, and burning the paper after the 20th time you use it? And/or intentionally add characters that are absent from standard keyboards such as £, ¥, ü, ç, æ, ø, and so on.

(642.83 KB 1138x1078 firefox.png)

(59.52 KB 256x256 pale_moon.png)

(13.26 KB 262x119 libre_js.png)

Browser and Internet Privacy Thread Anonymous 08/13/2020 (Thu) 06:48:58 No. 984 [Reply] [Last]
A place to shill for your favorite browsers & addons. Learn how to protect yourself from the botnet. What are your favorite addons and browsing tricks to protect your privacy? Share them here so we can all be a little safer. Browsers Chrome Chrome is somehow still in the lead due to sheer momentum, despite even the dumbest lusers cracking jokes about memory usage. Google has continued to abuse their position as the largest website and browser to force non-standards compliant changes to the way rendering works, generally to their benefit. Should be avoided at all costs. They track everything you do in some way. Chromium Even "de-Google'd" it still phones home and tracks your every move. Plus it gives them market share to bully smaller browsers and websites into complying with their standards. Avoid. Firefox Mozilla is pretty cucked and it's running on Rust these days, but it's a decent compromise between the modernity of Chrome and the standards compliance of something like Pale Moon. It's the closest you can get to a proper browser that's also updated regularly. Addons are worse now that they use Google's "web extensions" API, which is a downgrade from the Mozilla API and no more secure. But the whole "Quantum" thing has it flying, and they are better about standards compliance than Chrome is, and usually only break away because Chrome gives them no choice. Pale Moon The Gentooman's preferred choice, although some sites just don't play nice with it anymore. The last real holdout of old Gecko rendering. Has a diverse ecosystem, but it's basically the remnants of Firefox from yesteryear repackaged. Not bad if you can stand many sites not playing nice.

Message too long. Click here to view full text.

159 posts and 36 images omitted.
>>8535 You are almost certainly a mentally ill autist that is either a homosexual or a pedophile If you are this invested in internet browsers.
>>8536 Say that to my face not online and see what happens

Intel is not an American company. Anonymous 05/14/2022 (Sat) 11:10:39 No. 8441 [Reply]
Intel is not an American company. Intel is an Israeli espionage company. Intel processors communicate with Israel using radio signals via amplitude modulation. With this method, he spies on Israel.
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult.

Message too long. Click here to view full text.


(18.14 KB 256x256 retroshare-symbol.png)

Anonymous 10/25/2021 (Mon) 16:36:44 No. 5889 [Reply]
Lets discuss Retroshare. Why aren't you using it? It has: >Chat >Mail >Forums >Channels >Boards >File Sharing >And More It is an encrypted peer to peer network which can be set up to use Tor and/or I2P to hide your IP from glowniggers. Given that this is a tech board, I'm sure you'll figure out how to set it up. To get started you'll need frens, add me and post your certificate so other frens can add you too. ABAmchg80CCBtxnrp6aOLvxfAxRVqjSuLTmBrHtFyS1IXEVqyo/m6wEDZG16kEIAAAAE5s5jZTJjaXB2NmVxbWptZWhxYnVuZHB5 Mml3aXhxdTJxN2JneHk0YWRneGxnNXI3d2ZmeDdhLmIzMi5pMnCTBgEAAH/mzAQD1Xh0
8 posts omitted.
>>5913 >Is it impossible to have a P2P anonymous message board? If you have something to say you are not anon
Is it possible to use Retroshare on Tails? Or should I avoid it?
>>5889 >Chat that's the first reason that comes to mind

How do i make mods for games? Anonymous 05/16/2022 (Mon) 22:28:15 No. 8459 [Reply]
Hello everyone i was wondering on how i could get started in modding video games and if there any guides out there thank you :)
2 posts and 1 image omitted.
>>8459 well if they dont provide a public API for people to modify the game behavior with then you'll have to get a binary analyzer tool like ghidra or IDA and start reverse engineering the program. Find out where & how it loads stuff, where important memory structs are allocated, how the game logic runs, etc. Then simply patch bytes in the original program to add your own behavior. You can also just try to decompile the entire thing and modify it like that, this is how most java programs are modded, but thats not such an easy process for native programs like this game but maybe its still possible idk never tried. I recommend watching this: https://www.youtube.com/watch?v=w7gBkVXuDSQ&list=PLpnX4b2uRf5-_aLRjuIpav2Zh45C4f2QH
You missed the golden age of [everything] development, there's no going back. https://web.archive.org/web/20040524034647/http://collective.valve-erc.com/

How to communicate with the devil using ions ? Anonymous 05/16/2022 (Mon) 13:54:06 No. 8457 [Reply]
How to communicate with the devil using ions ? You will provide three "lead container". You will obtain sodium chloride, potassium and calcium powders. Put the sodium chloride powder in a container, calcium powder in a container and potassium powder in a separate container. Connect the "bulb that gives ultraviolet light" to lead containers. Connect the "ultraviolet light bulb" to a sound amplifier with a microphone. Give Arabic, Persian and ancient-Hebrew commands using the microphone. Satan does not know other languages.

(58.88 KB 600x675 show_me_the_booty.jpg)

(843.85 KB 1200x1839 blackbeard.jpg)

(70.42 KB 1024x1024 IPFS.png)

/p2p/ General Anonymous 05/06/2020 (Wed) 02:13:46 No. 23 [Reply] [Last]
Welcome to /p2p/, the dedicated peer-to-peer thread for /tech/ and the bunker for /t/orrentfags. What is P2P? Peer-to-Peer technologies allow decentralized networks to share data. They can be used to bypass oppressive government regulations on speech or to download the latest seasonal anime. What are my options? First and foremost is BitTorrent, a common protocol where files are split into chunks which are then shared via swarm, which works to get everyone a copy. There are many BitTorrent clients out there, and everyone has a personal preference. Some are owned my corporations and full of spyware. It's recommended you use something open source, like Deluge or qBitTorrent. Won't my internet get shut down? If your ISP is cucked then they might, but thankfully there is a solution. Use a VPN! Don't trust any VPNs that advertise all over the place. What is IPFS?

Message too long. Click here to view full text.

67 posts and 14 images omitted.
>>7454 IIRC I2P-Bote hid metadata better. But it seems to be abandoned.
>>7457 Might be a place from which to bootstrap a node list?
>>7457 damn thats gay. gave me false hope. i2p also easy to censor and block as case with china evidenced that there are more tor users than i2p users. i2p is too pozzed it has no obfuscation whatsoever and your isp can see your router wide in the open >>5382 can i send them money in envelope from russia how would that look like, wouldnt that be too sus (for russian customs that is) and what about conversion rates or do i just send dollars?

How do you make a person hear sounds that don't exist ? Anonymous 05/12/2022 (Thu) 20:08:50 No. 8422 [Reply]
How do you make a person hear sounds that don't exist ? Get a high-wattage sound system. Get a microwave oven. Remove the magnetron in the microwave oven. Remove the "magnetic coil" from the high-wattage sound system and replace it with the magnetron used in microwave ovens. You can give the inspiration you want in the high-wattage sound system. Russia and China are at this level right now. The US and Israel are at a much higher level.
they would just need to listen to my music because i aint making it anymore lul

Anonymous 10/27/2021 (Wed) 16:15:02 No. 5923 [Reply]
why fed's doesn't take down the tor and how people get caught on tor
>They use it too >Operational security blunders, human errors
>>5923 >why fed's doesn't take down the tor same reason doctors dont cure disease, theyd rather hit up your healthcare plan for a lifetime of "treatments" instead. why would feds unemploy themselves? >>https://arstechnica.com/tech-policy/2012/04/the-hidden-side-of-your-soul-how-the-fbi-uses-the-web-as-a-child-porn-honeypot/
fed is my country already made tor access illegal and hard to get to. so it's blocked. makes it 3rd country in the world to block tor 1. china 2. iran 3. russia who is gonna ban tor next?

[ 1234567891011121314151617181920 ]
Forms
Delete
Report