Catalog of /tech/

Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Uncommon Time Winter Stream

Interboard /christmas/ Event has Begun!
Come celebrate Christmas with us here


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

Search:

R: 0 / I: 0 / P: 1

Welcome to /tech/. The board to discuss anything technology-related. These are the rules: -Global rules apply -No flooding or spamming -NSFW images must be spoilered -Stay on topic
Open

R: 0 / I: 0 / P: 1

The "hardware antivirus"

Antivirus and cyber security systems used for computers are software-based. Today, cyber espionage can be done not only with codes and programs, but also on hardware. It is possible to spy directly on the hardware, bypassing the operating system and antivirus by loading harmful codes into the firmware on the chips of the hardware. While it is possible to clean the malicious rootkits infecting the UEFI / BIOS firmware and Harddisk firmware of the computer by reinstalling the original firmware of the hardware manufacturer, the firmware of the chips in the other hardware of the computer (keyboard, mouse, mouse, usb controller, camera, microphone, video card, PCI slots and other hardware) It is not possible for ordinary people to detect and clean rootkits infected with the rootkit. For this reason, a special operating system or special system software is required to detect rootkits that infect the firmware of chips in other hardware. This system and operating system can detect by examining the signals given by other hardware to the system and by examining the operation of the firmware on the hardware chip, if possible, by examining its digital signature. You can claim that the Sniffer and Monitor programs on the market can do this function. But these programs can examine as much as the operating system they are running gives them. Therefore, a different system or operating system is required in this regard. Apart from this, "hardware antivirus" can be developed as an alternative to software antivirus and software cyber security systems. Security software is usually installed on the operating system, the operating system kernel and, if necessary, the motherboard bios/uefi section. Alternatively, a "hardware antivirus" with a different motherboard and processor can be placed inside the existing computer case, regardless of the computer used. The difference of this "hardware antivirus" from IDS, IPS and External Firewalls is that it can directly connect to the computer's memory, hard disk and network paths with a physical cable or implant, and physically control the computer system, ensuring the security of the computer regardless of the current operating system and motherboard. This "hardware antivirus" can physically monitor the computer's input and output ports, stopping hard-to-detect BadUSB and NSA ANT tool attacks.

R: 9 / I: 4 / P: 1

keeping shitty OSes alive?

Is it possible to get a working browser on any windows system that is Vista or older? I want to spin up some VMs to fuck with hindi tech scammers, and I only want to use the most irritating operating systems to do so. I was thinking of some meme linux operating systems to use, but that shit would just scare them off and I need to have as much irritating bloatware as possible. I know teamviewer runs on almost anything even without a browser, but not all scammers use this. Pic somewhat related.

R: 1 / I: 0 / P: 1

Spurious native interrupt

When my computer is not connected to the internet, even though I formatted, changed the bios software and changed the hard disk firmware, the program opens by itself and the mouse cursor moves by itself. When I examine with the Wireshark program, an interrupt signal comes from the usb ports even though the device is not plugged into the usb ports. In this case, I am complaining. Logs are attached.

R: 2 / I: 0 / P: 1

how do you learn cloud computing

it's very confusing... and somehow people thinks i can get job with it easier...
Open

R: 1 / I: 0 / P: 1

Mmm alguien habla español?
Open

R: 1 / I: 0 / P: 1

Alguien me puede ayudar? Necesito un troyano o algún virus que me ayude a dañar un teléfono o algo así

R: 0 / I: 0 / P: 1

Programming advice here?

Looking for solutions to camera clipping like virtuoso(3do), and how it doesnt clip to close. and then games like doom/rise of triad, and how it defines slopes and stairs

R: 0 / I: 0 / P: 1

anal bukkake cameltoe

I love the National Security Agency™. The National Security Agency™ is my friend. I am a soverieng citizen of the United States of America©  and I willingly release all of my personal information to the National Security Agency™. I long for the day when the National Security Agency™ controls the entirety of the internet. The National Security Agency™ has my digital freedoms in mind, so I fully trust the National Security Agency™. <Programming Resources - No starch Press; Essentials these are the only books you really need for programming but niggerfaggots will tell you otherwise

R: 0 / I: 0 / P: 1

haha

R: 2 / I: 0 / P: 1

Trapcode general

This board now belongs to Trapcode

R: 0 / I: 0 / P: 1

Who /ham/ here?

R: 1 / I: 1 / P: 1

All AMD Processors Since Phenom II Have BadBIOS Circuitry That Leaks to the Military

Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer. The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS vastly nastier than Stuxnet. American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.
Open

R: 5 / I: 1 / P: 1

2d6 = 7