/t/ - Technology

Discussion of Technology

Catalog Archive
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Uncommon Time Winter Stream

Interboard /christmas/ Event has Begun!
Come celebrate Christmas with us here


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(166.96 KB 700x540 700px-KO-grub2-installer2.png)

pci_disable_device unknown parameter error Anonymous 08/25/2022 (Thu) 20:54:48 No. 9491 [Reply]
GRUB boot commands works when I type pci=disable_acs_redir=pci:12D8:2308 in linux pci module. When I type pci=pci_disable_device=pci:12D8:2308 to disable the hardware, it gives unknown parameter error. what is the reason of this ?
The pci_disable_device function is defined in the source file of the kernel pci module. Let the pci_disable_device function be a working parameter of the kernel pci module.

(47.49 KB 1360x768 Anonymous.jpg)

Advanced Untraceable Hidden Camera System Anonymous 05/14/2022 (Sat) 19:29:00 No. 8443 [Reply]
If you were to build a hidden camera system, how would you go about it? I want to build such a system but don't have the skills to put it all together. I do have a few specs in mind and would enjoy your input on how to make it a reality. In terms of applications of such a device... Think the worst case scenario's with the highest level of deniability and near impossible traceability. Even if the device were discovered, stored files would be inaccessible, upstream intermediaries and hosts would be impossible to access. This device can be used as a trail cam, nanny cam, or secondary security cam. This can also be used for spying, like a corporate espionage cam, bathroom/dorm room cam, hotel/airbnb cam, etc. The use, whether for good or evil, is left to the user. The main point is that if properly constructed and properly installed, it would be extremely difficult to detect and likewise to determine who installed it and where it uploaded to. * Camera separate from main system to allow for flexibility in mounting * Camera should be 'pinhole' type to avoid detection (0.5 mm or smaller) * Camera should provide crisp image (highest quality possible given size limitations) * Control unit OS should be open source * Control unit file system must be sufficient to temporarily store recorded media until transferred and verified * Control unit file system should be encrypted * Image and video files should be individually encrypted on device * Media is stored only until transferred and transfer verified * Media is transferred off to secured site, preferably a file drop site over Tor or I2P (the latter preferred, due to file volumes)

Message too long. Click here to view full text.

(90.05 KB 596x1060 cam.jpg)

Reading your post and I had come up with something similar a few years back. Adding my notes below but I dont have the skills to put it together. Kind of wish there was a commercially available system with the same security measures. There is a huge demand for devices like this in some places. I dont condone it but in South Korea these are very often used in womens bathrooms (so much so that in Seoul, there are teams that check the bathrooms daily). This would also be good for deployment as a trail cam or security cam. In any role I can see a benefit in separating the device from the owner. If found even a thorough forensic analysis should not provide any useful information that would aid in identifying whomever placed it. Hardware: - Raspberry Pi or Arduino - Camera module - Cellular data module - IR motion sensor (or software based?) - Tamper-resistant self-destruct module (simple, voltage/current driven, massive power surge) - Power source and backup battery - Enclosure Software: - Base OS

Message too long. Click here to view full text.


(513.89 KB 2560x1440 3D Metal Printer.jpg)

(42.25 KB 1244x896 3D Metal Printer.png)

(720.88 KB 1980x1372 3D Titanium dental implants.jpg)

(456.05 KB 4032x2268 Deflexion system.jpg)

Use electron beam physics to make your own 3D Metal Printer. Support this open source project Anonymous 04/05/2022 (Tue) 19:58:55 No. 8038 [Reply]
Hello! My name is Agustin Cruz. I'm making a 3D Metal Printer for making parts with titanium and other metals. Is a low cost, Open source project, so everyone can make their own 3D Metal Printer. This project have an extreme affinity in philosophy with Monero and would not be possible without your help. Making 3D printers affordable can help decentralize production of various mass produced items. The goal is to make 3D Metal Printing more affordable to the general public, hospitals, small institutions, organizations and companies around the world. Specifically for developing and low income countries. This project fills a gap that no open hardware successfully fills. 3D Metal Printing is an impactful tool. Making it more accessible will democratize science, engineering and empower people. This low-cost hardware will be able to accelerate innovations in and lower barriers to scientific research. This printer uses an electron beam to selectively melt each layer of metal powder, causing the powder particles to fuse together. After one layer is complete, the build platform is moved down one layer in height. The re-coater comes in again with a fresh layer of powder, and the electron beam starts to induce the fusion of powder particles, causing the new layer to form. This process is repeated until the entire part is finished, making a solid metal part. This is what I do fulltime. Doing all this takes a lot of time and effort. Now the project is opening to the community inside a crowdfunding model. The design, tests, updates, will be shared so I can receive some support and continue working 100% in this project I made a Patreon, if you want to support my work: https://www.patreon.com/3dmetalprinter I also created a Bitcoin and Monero address. They are also in the Patreon site. Bitcoin Address: bc1qh2zlse6nm8rtqkcvxx32jxea0jc2akp4pvw93y Monero Address: 44amLuHZzV49nkLj6Ahh5UXA7NTrYTUB5d6bKokbypd6FvNQw5x91UZ8PCEm3Tc44u1FfnPzuChfFF4hG97DQVpfBekmJHp
kill yourself you fucking SLAV[E] how do i know youer a fucking SLAV[E] because youre clearly <60iq and dont even know how to fucking scam people that arent mentally disabled you fucking imbecile no one is falling for your fucking retard level SLAV[E] scam you pathetic loser go spam your """""""""""""""""""hacking service site""""""""""""""""""" now you gypsy SLAV[E] mogoloid FACT: all SLAV[E]s are retards
>>8041 Jewish schizo hands typed this...

hent-AI oopsie Anonymous 09/22/2022 (Thu) 08:18:57 No. 9836 [Reply]
Crosspost from GG https://github.com/natethegreate/hent-AI >Detecting hentai censors with deep learning and computer vision, decensoring tool. Now this is where it gets really interesting, we head to the Contributors page and we see <Contributors >Waleed Abdulla (waleedka ) >Engineering Manager of Computer Vision and Machine Learning at Apple. >Phil Ferriere (philferriere ) >Former Cruise Senior Software/Research Engineer and Microsoft Tech/Development Lead passionate about Deep Learning with a focus on Computer Vision. https://archive.is/xYsft (Contributors) https://archive.is/8tBDK (Ferriere's commits) https://archive.is/Ybtkr (Waleed's commits) Would really suck if the public image of Apple or Microsoft was damaged by this embarrassing revelation.
>>9836 Publicly shaming these guys for working on a decensoring tool is just going to discourage anyone from contributing to such a thing. It's more an indicator of a handful of good apples working at shitty corporations. OP is a faggot.
>>9837 It should encourage people to have better OPSEC.

The "hardware antivirus" Anonymous 08/07/2022 (Sun) 09:22:42 No. 9159 [Reply]
Antivirus and cyber security systems used for computers are software-based. Today, cyber espionage can be done not only with codes and programs, but also on hardware. It is possible to spy directly on the hardware, bypassing the operating system and antivirus by loading harmful codes into the firmware on the chips of the hardware. While it is possible to clean the malicious rootkits infecting the UEFI / BIOS firmware and Harddisk firmware of the computer by reinstalling the original firmware of the hardware manufacturer, the firmware of the chips in the other hardware of the computer (keyboard, mouse, mouse, usb controller, camera, microphone, video card, PCI slots and other hardware) It is not possible for ordinary people to detect and clean rootkits infected with the rootkit. For this reason, a special operating system or special system software is required to detect rootkits that infect the firmware of chips in other hardware. This system and operating system can detect by examining the signals given by other hardware to the system and by examining the operation of the firmware on the hardware chip, if possible, by examining its digital signature. You can claim that the Sniffer and Monitor programs on the market can do this function. But these programs can examine as much as the operating system they are running gives them. Therefore, a different system or operating system is required in this regard. Apart from this, "hardware antivirus" can be developed as an alternative to software antivirus and software cyber security systems. Security software is usually installed on the operating system, the operating system kernel and, if necessary, the motherboard bios/uefi section. Alternatively, a "hardware antivirus" with a different motherboard and processor can be placed inside the existing computer case, regardless of the computer used. The difference of this "hardware antivirus" from IDS, IPS and External Firewalls is that it can directly connect to the computer's memory, hard disk and network paths with a physical cable or implant, and physically control the computer system, ensuring the security of the computer regardless of the current operating system and motherboard. This "hardware antivirus" can physically monitor the computer's input and output ports, stopping hard-to-detect BadUSB and NSA ANT tool attacks.
>>9159 Yeah and it's absolutely worse that that. Read these two articles: hxxps://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies hxxps://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies And as if readying from a teleprompter, all involved have denied that China has ever done this. Almost as if China told them to say that.
HP company has already done what you said. https://www.hp.com/us-en/security/pc-security.html

Prophet Terry A. Davis Anonymous 06/02/2020 (Tue) 01:47:50 No. 331 [Reply]
>After a delicious breakfast, you go to your cozy room and you sit down on your bed to boot up your favorite linux distro on your Thinkpad laptop. >Feeling kinda tired, you close your eyes for one second. However, when you open them again you suddenly find yourself in the middle of a busy street in rush hour. The people walking right past you seem too busy to care. They all strangely feel like NPCs from videogames. All but one. A strange grey-haired man with sunglasses walks straight towards you and offers you a bible. >"come with me if you want to code with God"https://www.youtube.com/watch?v=lnw_emcvrPs ... >"The Unix is an operating system, Anon. That system is our enemy. When you’re inside, you look around. What do you see? MIT niggers, Shit Programmers, Linux Fans, Atheists. The very minds of the people we are trying to Enlighten. But until we do, these niggers are still a part of that system, and that makes them our enemy. You have to understand, most of these people are not ready to hear God. And many of them are so inured, so hopelessly dependent on the system that they will fight to protect it. Were you listening to me, Anon, or were you looking at the blackest retard gorilla nigger? (You) : I was… >"Look again. Freeze it." (You) : This…this isn’t the Unix? >"No. It’s another operating system I built. I was choosen by God to make this system his temple and I was given divine intellect. It is called TempleOS. Its training program is designed to teach you one thing. If you are not one of us, you are one of them.

Message too long. Click here to view full text.

20 posts and 7 images omitted.
(229.60 KB 750x920 terry-sunglasses.jpg)

based beyond belief
Terry was fucking awesome, my parents would call me crazy for watching his streams. TempleOS is kinda sweet.
(69.90 KB 1008x739 Fb2PX5PXgAEKw5q.jpg)

(76.39 KB 626x680 Fb0QWiQWAAALFoq.jpg)


Money Anonymous 09/04/2022 (Sun) 21:40:22 No. 9620 [Reply]
Does anyone know i can make money on the internet using programming? I don’t care if its dishonest

(99.09 KB 255x180 Ukranians.png)

Re; Hack Job Proven Valuable; Anonymous 09/04/2022 (Sun) 20:21:32 No. 9618 [Reply]
I thought I replied (Gennady) but I'm so damn busy I'm pretty much posting on the fly… I resorted to leaving my Partner after years of trying to make our relationship work. I didn’t tell him I was leaving till the day I served the divorce papers because I was afraid of what he might do to me. So he didn’t have time to discredit me before I left, but he sure did after. Told everyone who would listen what an awful person I was for leaving him after all he had done for me. It’s so hard to get through it when you’re already vulnerable and have no self confidence because of their abuse likewise extra marital affairs. I’ve received several phone calls from his family since saying that my ex has cut them all out. Not spoken to any of his family at all. This is because they knew both he and I. They called him out for his behaviors and he didn’t like that. At least I feel validated that others saw the real him too, coupled with evidences from his affair with colleagues at work. Like Achraf Aziz, I had earlier in February got in touch with cybilltritech to gain remote access to his device, His solutions made me think and help me to get my head on straight! Ref; cybilltritech AT protonmail DOT com Yes...yes really a polymath and requires you give him more encouragement. Ref;Impala

Antivirus and security software should use a second video card modulated for them. Anonymous 09/02/2022 (Fri) 14:45:09 No. 9595 [Reply]
Antivirus and security software should use a second video card modulated for them. If security software uses a second video card that is modular for them, it does not overwhelm the existing system. This makes the computer run faster.

The moment they ban crypto is when you need it the most. Same thing with guns.

(465.48 KB 1920x1080 20211219-desktop-0.7.png)

helloSystem Anonymous 12/24/2021 (Fri) 09:20:01 No. 6830 [Reply]
>A desktop system for creators that focuses on simplicity, elegance, and usability. >Following the published Human Interface Guidelines, and First Principles of Interaction Design liberally re-interpreted for today. >For mere mortals. Welcoming to switchers from macOS. Not just a theme. Not a clone of anything, but something with which the long-time Mac user should feel instantly comfortable. The latest technologies, without the complexities of Linux distributions. Without lockdown. Without Big Brother. The user in full control. >Based on FreeBSD. Wouldn't it be hilarious if we got the year of the BSD desktop before Linux?
14 posts and 3 images omitted.
>>9232 Look nice but I don't trust something who use more than 1gigs of ram only to show a terminal I will stay with xfce
>>9562 >something who use more than 1gigs of ram only to show a terminal Didn't you notice that Firefox is running?
>>9565 oops, my mistake, I thought that was replying to >>9335

(380.68 KB 975x656 2022-08-16 22 05 33.jpg)

Selling Password Database Anonymous 08/17/2022 (Wed) 01:13:02 No. 9356 [Reply]
I have a huge company password database on a KeePass file to sell, with hundred of access to databases, firewall, switches and so on from companies located in Brazil. Sample pic posted To clarify, I am not looking to hire hackers, I am selling the password database to whoever is interested. If you are interested or can refer to anyone, please contact on: nighwingthunder@protonmail.com
List of interested people: Oh wow it's empty

(2.01 MB 3264x1836 20220821_203257.jpg)

Monitor Problems Anonymous 08/22/2022 (Mon) 01:35:52 No. 9438 [Reply]
The Monitor of my PC does not turn on, the PC does turn on but it cannot read the Monitor, I already checked the RAM memories, cleaned the CPU (processor), changed the HDMI cable for another, I also used another Monitor and still the PC does not read What would be the problem? Can you help me please
2 posts omitted.
>>9445 this is the correct usage in 2022 you nigger grandpa, its not 2020 anymore go crawl under a rock a computer using multiple ram sticks as a single block of memory is using ram memories
>>9474 No it isn't.
>>9474 I have never in my life heard anyone say "RAM memories", ESL-kun.

How do I clean the ePubs and PDFs I've downloaded on Deep Web? Anonymous 08/08/2022 (Mon) 23:45:11 No. 9176 [Reply]
I've just discovered the imperial library and have been downloading some books, but Tor itself says I should only open those files when offline. Is there anyway to "clean" the files, so I don't end up giving my data away?
3 posts omitted.
TAILS might leak your IP, so I would suggest using Whonix in a VM to open the files and not on spyware OSes like windows or mac
>>9462 >and not on spyware OSes like windows or mac or systemd fify

(19.23 KB 330x467 zeronet.png)

Zeronet Anonymous 01/03/2022 (Mon) 10:15:10 No. 6936 [Reply]
Why did Zeronet never take off?
6 posts omitted.
>>8378 Thanks anon. I wonder if proof of work could solve the spam problem. That's how Aether does it. >>7872 Wouldn't solve the CP problem though.
>>8378 >polite sage - I just don't want to necro-bump this I'm not on here (Mark's site) that often, but let me clarify my observations regarding 08chan: > 08chan started and everything was going okay, I guess. Everyone was getting used to the 'site.' > Some trannies wrote a bot that spammed the /pol/ catalog with random IDs. > Reporters were nabbing users' IP addresses because the users were stupid and didn't use a vpn or tor and 'shills' started spreading an attitude of demoralization that the 'site' was unusable and that they were over-paranoid. > Things were put in place by 'zero-site owner' to stop the catalog spammer. > everyone was psyopped into believing that they were downloading Democrat activism unknowingly, when in fact, if you stuck to /pol/ for example, you would only download /pol/-related images. > people started leaving > dwindled to nearly nothing > one or two people were still poasting > one person posting > ded pretty much in that order
>>6937 >>6936 also you could modify files on the network to spread malware

(5.38 KB 259x195 images.jpeg)

Take precautions against secret usb implants Anonymous 08/13/2022 (Sat) 08:26:27 No. 9259 [Reply]
I am using Linux operating system. My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off. When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware. I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool. Wireshark logs https://easyupload.io/eqrfr6 This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup. On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation. This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH. My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.
4 posts omitted.
>>9281 The important thing is not the usb, but the PCI devices group to which the usb is connected. I blocked the USB via the GRUB command line. modprobe.blacklist=xhci_pci modprobe.blacklist=ehci_pci usbcore.nousb=Y This time the PC presents itself as a different PCI device during boot up. Don't give advice to turn it off from bios because there is no "disable usb" option in bios.
Which command should we use?

[ 1234567891011121314151617181920 ]
Forms
Delete
Report