/t/ - Technology

Discussion of Technology

Catalog Archive
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Uncommon Time Winter Stream

Interboard /christmas/ Event has Begun!
Come celebrate Christmas with us here


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(10.65 KB 474x266 nc.jpg)

What happened nanochan? Anonymous 10/27/2022 (Thu) 00:30:41 No. 10381 [Reply]
Haven't been able to access it for a while, is it gone, being DDOSed, something else? It had some of the best technology / privacy discussions and I haven't found anything else like it,
2 posts omitted.
I think the owner gave up on moderating spam attacks

ALIEN-UFO INTELLIGENCE- Heavy National Security.pdf Download Anonymous 01/22/2023 (Sun) 22:05:52 No. 11343 [Reply]
ALIEN-UFO INTELLIGENCE- Heavy National Security.pdf Download https://archive.org/details/alien-ufo-intelligence-heavy-national-security

System Transparency Anonymous 10/04/2023 (Wed) 22:25:41 No. 13279 [Reply]

There is no such thing as Ukrainian hackers. Anonymous 05/12/2022 (Thu) 18:39:37 No. 8419 [Reply]
There is no such thing as Ukrainian hackers. These so-called Ukrainian hackers are agents of the USA, England and Israel. Cyber attacks are constantly being carried out against Russia.These attacks are said to be made by these so-called "ukrainian hackers". In reality, there is no cyber attack on Russia. Attacks on Russian systems are not made over tcp/ip and udp networks. The main source of attacks on Russia are crypto-Jews living in Russia who have embedded the NSA's Cottonmouth and Bulldozer hardware into Russian computer systems. These equipments are managed remotely via radio signals, not internet network. Attacks on Russia are not cyber attacks but electronic signal attacks
20 posts and 4 images omitted.
>>8419 you'll never be a woman btw
while i doubt its really true, mainly the "crypto Jews".. lol
you can smell the schizophrenia in this thread

(61.31 KB 1070x618 PC.png)

Anonymous 09/16/2023 (Sat) 03:04:41 No. 13092 [Reply]
Hello anons, does this computer work (if I don't forget to put a component in it) or is it a tremendous kamikaze? >also thread about computers and drivers for dummies
Get 2 sticks of ram so they run in dual channel, drop the hdd for a larger nvme ssd, otherwise sure.

(3.51 KB 180x180 faggot.png)

The final solution of the document problem. Anonymous 10/31/2022 (Mon) 23:59:25 No. 10458 [Reply]
What is the final document format? Not text file (unformatted). I am asking for formatted text document, with tables and embedded images. What is the final solution? Proposals: -ODF (.odt) -Rich Text Format (.rtf) -HTML -DOC (.doc) -DOCX Considerations: -is the format simple, efficient, small? -is it open source, free, or at least without patents or some other shit -is it supported by large amount of software? for import and export -is it malware? has hidden metadata and other shit? complex and proprietary? -does the format allow for huge documents? -what the format supports? formatted text, embedded fonts, images, tables, embedded files, hyperlinks, what else? -is it simple to open both for viewing and editing?

Message too long. Click here to view full text.

9 posts and 2 images omitted.
>>10458 > formatted text document, with tables and embedded images. > -is the format simple, efficient, small? YOU CAN ONLY HAVE ONE
(105.00 KB 625x1024 1686012452836812m.jpg)

>>11288 >t. based niggerbrained Bangalore-politechnic mathematician The suggestion of a file format analogous toa tape that describes itself is not new, it would be any .exe file, perhaps assuming batch files and such instructions could be coded in a more compact manner. This is obviously not a new idea, nor an untested idea, however, parsing an .exe file for instance, compared to any other format takes more processing power and is often on itself a "black box" because we don't know what's inside until we open it, which is obviously not convenient. >muh uncommon novelty opinion >muh boomer RSA encryptiun le couppled with brain-interfacr Intelligence Amplifiers TOTAL NIGGER DEATH O T A L N

Message too long. Click here to view full text.


(1.15 MB 750x715 image0.png)

Bypassing bot detection on betting sites Anonymous 12/19/2022 (Mon) 00:39:14 No. 11041 [Reply]
Sup /t/, I dont really frequent chans so apologies in advance if I'm not following the proper etiquette. I'm trying to set up a script which does arbitrage across sportsbooks if it identifies a big enough spread in the odds. While this part isn't so difficult, the real issue is that apparently most sportsbooks will ban you if they catch you doing arbitrage. Is there a way which I can write my bots so that they interact with websites close enough to how a human would where they don't get my accounts banned? Do I even need to worry about this? If anyone has any tips/ experience that would be great. tl;dr how do i not get banned off of sportsbetting sites for botting
6 posts omitted.
>>11059 Why do you care what random retards on a traditional Austrian painting forum think is "Jewish"? Are you a {{{goy}}}?
(73.12 KB 1280x720 maxresdefault.jpg)

>>11041 >I can write my bots so that they interact with websites close enough to how a human would where they don't get my accounts banned? Maybe with userscripts, but it depends a lot on the site and what you mean by "close enough to how a human would". >>12836 >do you guys think it is real? Not quite, the original image is this and apparently it comes from https://www.youtube.com/watch?v=V1nBJKtSs4E
>>11051 >>11059 >>12863 to be fair: "jewish" has also remained a racial thing on top of the nominal religious thing it's why jews are racist in israel

(43.70 KB 526x224 ghostBSD.jpg)

Do I need to install JAVA on ghostBSD ? Anonymous 09/16/2023 (Sat) 14:54:21 No. 13096 [Reply]
Hi. I just installed ghostBSD and I wonder if I need to install JAVA on it or what should I install once install ghostBSD is intalled ?
>>13096 For God sake ! I've been asking this question about nearly a month and posted it on 3 or 4 sites and can't get a single fuckin' answer.
>>13096 why not just install Java anyway? it's not like it'll hurt anything

(81.63 KB 640x427 Cybersecurity.jpg)

Learn hacking/cybersecurity from 0 Anonymous 12/22/2022 (Thu) 04:48:17 No. 11081 [Reply]
I want to learn hacking/cybersecurity from 0, what do I need to know? Know how to program? If someone here is dedicated to that, please explain to me, I don't know how to start, I feel disoriented.
5 posts and 1 image omitted.
What do i have to consider if i want to use anonymously nmap and metasploit?
How to make a portscan while saying anonmous? Is there a risk of leaking data or is that a stupid fear of mine?
>>12913 >>12968 Use an VPS bought with crypto.

I Built an Air-Gapped Feed Reader and That Unveiled US’ Military Surveillance Anonymous 07/10/2021 (Sat) 23:26:40 No. 4795 [Reply]
I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time. Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors. I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too. I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.
interesting thought but do you have any actual proof
>>4795 Why wouldn't they just inject propaganda into the files that you transfer or whatever?

(184.79 KB 800x600 1691825596397.png)

Anonymous 08/17/2023 (Thu) 14:22:49 No. 12791 [Reply]
Need some explanation on how translucency is solved in 3d software like maybe using picture here as reference and some random light source, how is then glasses or marbles are rendered based on the object's form, properties, material and the scene itself? Pls illustrate or draw over for your convenience No.441552023/08/17 07:04:48 Anonymous Also especially when marbles and glasses are located nearby and supposedly create or bounces light thru and to each others

download multiple subscriptions at once Anonymous 08/07/2023 (Mon) 09:03:15 No. 12685 [Reply]
Is it possible to download multiple subscriptions at once but differenciate between domains? So that one downloader runs for pixiv and another for gelbooru and not twice pixiv if i have two different subscriptions
>>12685 sorry anon idk wtf your talking about but this board is unfortunately basically dead.
>>12685 Retarded questions like that are better in the sticky >>3 But to answer your question, what restrictions do you have trying to download them in the first place? Just google X downloader, follow any necessary instructions, run it, and ask for help if you get any issues you can't figure out. We're not going to spoonfeed for basic shit if you make no attempt to do something yourself.

(24.09 KB 1500x900 feliz.jpg)

pito Anonymous 07/26/2023 (Wed) 20:54:28 No. 12595 [Reply]
+52 561 447 0902
If you want to show your dick, this is not the place.

Any anti glow nigger advice? Anonymous 07/27/2023 (Thu) 17:01:34 No. 12605 [Reply]
Any way to stop dreams? Any way to convince people to stay strong against them and not gas light you? i just lazily taped over my laptop cam thinking about buying a phone case with the duel camera covers my friend had one when i was a kid i also have adblock which helps too Is there anything they would hate people to participate in that i could do to push them out of my life a little?
>>12605 >Is there anything they would hate people to participate in that i could do to push them out of my life a little? Become a muslim and take the qur'an literally.

RESTRICT Act Anonymous 03/31/2023 (Fri) 03:25:28 No. 11887 [Reply]
* https://en.wikipedia.org/wiki/RESTRICT_Act * https://www.govtrack.us/congress/bills/118/s686/summary * https://www.congress.gov/bill/118th-congress/senate-bill/686/text?s=1&r=15 The RESTRICT Act (S.686) has now been introduced into U.S. Congress. If passed, it could mean a lot of things. Some highlights: The U.S. Government has the right to ban anything on the Internet if they claim it is a «risk» to integrity, national security etc. If an internet service has >1M users, they may be forced to hand over any and all personal user data without reason or notice Use of VPNs/proxys may result in up to 20 years jail time Probably a lot of other stuff I'm leaving out..reply if you have some From what I've figured out, this bill is basically the Patriot Act on steroids. I'm suspecting the U.S. is trying to build its own Great Firewall, given this act seems to pave the way for it. If this gets passed(and any future bills),, how would 8chan be affected?
bump
noone cares about americans you retard

(218.79 KB 600x600 CommunityEditionUBports.png)

The Pinephone Anonymous 05/18/2020 (Mon) 09:17:14 No. 114 [Reply] [Last]
>what is the Pinephone It's an open hardware phone that runs specialized Linux distros with touch friendly DEs, you can also just install arch and dwm on it if you're insane. >muh privacy The phone has hardware switches that allow you to physically disconnect privacy infringing peripherals. >muh repairability Pine64 sells all spare parts for the phone, display module is 30$ for example. Battery is the same as a Samsung j700 and extremely cheap. >muh touch screen Pine64 is developing two keyboard cases. One is a clamshell PDA style, and the other is a slide out kb like the n900. They integrate directly into the phone since they will replace the backplate. >muh peripherals It has a 3.5mm headphone jack, which doubles as a UART port. It also has a set of pogo pins on the back that exposes an I2C bus. Charging is done through USB-C which also doubles as display out and OTG. >muh shady company Pin64 is not a company as such. It's a community run project where an entrepreneur from HK supplies hardware, and the community gets to buy it at very low cost and do whatever they want. They donate much of their earnings to open source projects, and use the rest to develop new devices. >full specs and more info https://www.pine64.org/pinephone/ >wiki

Message too long. Click here to view full text.

83 posts and 14 images omitted.
>>10096 I was fully vaccinated before I could form memories of what it was, because I got the MMR near infancy. I'm told I was a cranky child for quite some time afterward.
Got the pinephone, works great for what it is. Got the keyboard, remember to avoid using the phone usb with the keyboard mounted. 1 year later, battery unit in keyboard still works great, but keyboard died after auto-repeating a ton of characters while writing a text message. Felt like a cable failure to me, similar to how a laptop keyboard goes out sometimes. Now I need to pry open the keyboard and try to figure out why pine64 does not sell replacement cables for the keyboard's internal pogo pin interface to the phone. The hinge still works good, but the cable was routed through there, and would obviously flex a little. I do not think it is a ribbon cable, at least. Just really thin gauge wires in a sheath.
>>114 <GLOWIE POST >GLOWIE POST <GLOWIE POST >GLOWIE POST <GLOWIE POST >GLOWIE POST

[ 1234567891011121314151617181920 ]
Forms
Delete
Report