/t/ - Technology

Discussion of Technology

Catalog Archive
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

US Election Thread

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

The "hardware antivirus" Anonymous 08/07/2022 (Sun) 09:22:42 No. 9159 [Reply]
Antivirus and cyber security systems used for computers are software-based. Today, cyber espionage can be done not only with codes and programs, but also on hardware. It is possible to spy directly on the hardware, bypassing the operating system and antivirus by loading harmful codes into the firmware on the chips of the hardware. While it is possible to clean the malicious rootkits infecting the UEFI / BIOS firmware and Harddisk firmware of the computer by reinstalling the original firmware of the hardware manufacturer, the firmware of the chips in the other hardware of the computer (keyboard, mouse, mouse, usb controller, camera, microphone, video card, PCI slots and other hardware) It is not possible for ordinary people to detect and clean rootkits infected with the rootkit. For this reason, a special operating system or special system software is required to detect rootkits that infect the firmware of chips in other hardware. This system and operating system can detect by examining the signals given by other hardware to the system and by examining the operation of the firmware on the hardware chip, if possible, by examining its digital signature. You can claim that the Sniffer and Monitor programs on the market can do this function. But these programs can examine as much as the operating system they are running gives them. Therefore, a different system or operating system is required in this regard. Apart from this, "hardware antivirus" can be developed as an alternative to software antivirus and software cyber security systems. Security software is usually installed on the operating system, the operating system kernel and, if necessary, the motherboard bios/uefi section. Alternatively, a "hardware antivirus" with a different motherboard and processor can be placed inside the existing computer case, regardless of the computer used. The difference of this "hardware antivirus" from IDS, IPS and External Firewalls is that it can directly connect to the computer's memory, hard disk and network paths with a physical cable or implant, and physically control the computer system, ensuring the security of the computer regardless of the current operating system and motherboard. This "hardware antivirus" can physically monitor the computer's input and output ports, stopping hard-to-detect BadUSB and NSA ANT tool attacks.
>>9159 Yeah and it's absolutely worse that that. Read these two articles: hxxps://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies hxxps://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies And as if readying from a teleprompter, all involved have denied that China has ever done this. Almost as if China told them to say that.
HP company has already done what you said. https://www.hp.com/us-en/security/pc-security.html

Prophet Terry A. Davis Anonymous 06/02/2020 (Tue) 01:47:50 No. 331 [Reply]
>After a delicious breakfast, you go to your cozy room and you sit down on your bed to boot up your favorite linux distro on your Thinkpad laptop. >Feeling kinda tired, you close your eyes for one second. However, when you open them again you suddenly find yourself in the middle of a busy street in rush hour. The people walking right past you seem too busy to care. They all strangely feel like NPCs from videogames. All but one. A strange grey-haired man with sunglasses walks straight towards you and offers you a bible. >"come with me if you want to code with God"https://www.youtube.com/watch?v=lnw_emcvrPs ... >"The Unix is an operating system, Anon. That system is our enemy. When you’re inside, you look around. What do you see? MIT niggers, Shit Programmers, Linux Fans, Atheists. The very minds of the people we are trying to Enlighten. But until we do, these niggers are still a part of that system, and that makes them our enemy. You have to understand, most of these people are not ready to hear God. And many of them are so inured, so hopelessly dependent on the system that they will fight to protect it. Were you listening to me, Anon, or were you looking at the blackest retard gorilla nigger? (You) : I was… >"Look again. Freeze it." (You) : This…this isn’t the Unix? >"No. It’s another operating system I built. I was choosen by God to make this system his temple and I was given divine intellect. It is called TempleOS. Its training program is designed to teach you one thing. If you are not one of us, you are one of them.

Message too long. Click here to view full text.

20 posts and 7 images omitted.
(229.60 KB 750x920 terry-sunglasses.jpg)

based beyond belief
Terry was fucking awesome, my parents would call me crazy for watching his streams. TempleOS is kinda sweet.
(69.90 KB 1008x739 Fb2PX5PXgAEKw5q.jpg)

(76.39 KB 626x680 Fb0QWiQWAAALFoq.jpg)


Money Anonymous 09/04/2022 (Sun) 21:40:22 No. 9620 [Reply]
Does anyone know i can make money on the internet using programming? I don’t care if its dishonest

(99.09 KB 255x180 Ukranians.png)

Re; Hack Job Proven Valuable; Anonymous 09/04/2022 (Sun) 20:21:32 No. 9618 [Reply]
I thought I replied (Gennady) but I'm so damn busy I'm pretty much posting on the fly… I resorted to leaving my Partner after years of trying to make our relationship work. I didn’t tell him I was leaving till the day I served the divorce papers because I was afraid of what he might do to me. So he didn’t have time to discredit me before I left, but he sure did after. Told everyone who would listen what an awful person I was for leaving him after all he had done for me. It’s so hard to get through it when you’re already vulnerable and have no self confidence because of their abuse likewise extra marital affairs. I’ve received several phone calls from his family since saying that my ex has cut them all out. Not spoken to any of his family at all. This is because they knew both he and I. They called him out for his behaviors and he didn’t like that. At least I feel validated that others saw the real him too, coupled with evidences from his affair with colleagues at work. Like Achraf Aziz, I had earlier in February got in touch with cybilltritech to gain remote access to his device, His solutions made me think and help me to get my head on straight! Ref; cybilltritech AT protonmail DOT com Yes...yes really a polymath and requires you give him more encouragement. Ref;Impala

Antivirus and security software should use a second video card modulated for them. Anonymous 09/02/2022 (Fri) 14:45:09 No. 9595 [Reply]
Antivirus and security software should use a second video card modulated for them. If security software uses a second video card that is modular for them, it does not overwhelm the existing system. This makes the computer run faster.

The moment they ban crypto is when you need it the most. Same thing with guns.

(465.48 KB 1920x1080 20211219-desktop-0.7.png)

helloSystem Anonymous 12/24/2021 (Fri) 09:20:01 No. 6830 [Reply]
>A desktop system for creators that focuses on simplicity, elegance, and usability. >Following the published Human Interface Guidelines, and First Principles of Interaction Design liberally re-interpreted for today. >For mere mortals. Welcoming to switchers from macOS. Not just a theme. Not a clone of anything, but something with which the long-time Mac user should feel instantly comfortable. The latest technologies, without the complexities of Linux distributions. Without lockdown. Without Big Brother. The user in full control. >Based on FreeBSD. Wouldn't it be hilarious if we got the year of the BSD desktop before Linux?
14 posts and 3 images omitted.
>>9232 Look nice but I don't trust something who use more than 1gigs of ram only to show a terminal I will stay with xfce
>>9562 >something who use more than 1gigs of ram only to show a terminal Didn't you notice that Firefox is running?
>>9565 oops, my mistake, I thought that was replying to >>9335

(380.68 KB 975x656 2022-08-16 22 05 33.jpg)

Selling Password Database Anonymous 08/17/2022 (Wed) 01:13:02 No. 9356 [Reply]
I have a huge company password database on a KeePass file to sell, with hundred of access to databases, firewall, switches and so on from companies located in Brazil. Sample pic posted To clarify, I am not looking to hire hackers, I am selling the password database to whoever is interested. If you are interested or can refer to anyone, please contact on: nighwingthunder@protonmail.com
List of interested people: Oh wow it's empty

(2.01 MB 3264x1836 20220821_203257.jpg)

Monitor Problems Anonymous 08/22/2022 (Mon) 01:35:52 No. 9438 [Reply]
The Monitor of my PC does not turn on, the PC does turn on but it cannot read the Monitor, I already checked the RAM memories, cleaned the CPU (processor), changed the HDMI cable for another, I also used another Monitor and still the PC does not read What would be the problem? Can you help me please
2 posts omitted.
>>9445 this is the correct usage in 2022 you nigger grandpa, its not 2020 anymore go crawl under a rock a computer using multiple ram sticks as a single block of memory is using ram memories
>>9474 No it isn't.
>>9474 I have never in my life heard anyone say "RAM memories", ESL-kun.

How do I clean the ePubs and PDFs I've downloaded on Deep Web? Anonymous 08/08/2022 (Mon) 23:45:11 No. 9176 [Reply]
I've just discovered the imperial library and have been downloading some books, but Tor itself says I should only open those files when offline. Is there anyway to "clean" the files, so I don't end up giving my data away?
3 posts omitted.
TAILS might leak your IP, so I would suggest using Whonix in a VM to open the files and not on spyware OSes like windows or mac
>>9462 >and not on spyware OSes like windows or mac or systemd fify

(19.23 KB 330x467 zeronet.png)

Zeronet Anonymous 01/03/2022 (Mon) 10:15:10 No. 6936 [Reply]
Why did Zeronet never take off?
6 posts omitted.
>>8378 Thanks anon. I wonder if proof of work could solve the spam problem. That's how Aether does it. >>7872 Wouldn't solve the CP problem though.
>>8378 >polite sage - I just don't want to necro-bump this I'm not on here (Mark's site) that often, but let me clarify my observations regarding 08chan: > 08chan started and everything was going okay, I guess. Everyone was getting used to the 'site.' > Some trannies wrote a bot that spammed the /pol/ catalog with random IDs. > Reporters were nabbing users' IP addresses because the users were stupid and didn't use a vpn or tor and 'shills' started spreading an attitude of demoralization that the 'site' was unusable and that they were over-paranoid. > Things were put in place by 'zero-site owner' to stop the catalog spammer. > everyone was psyopped into believing that they were downloading Democrat activism unknowingly, when in fact, if you stuck to /pol/ for example, you would only download /pol/-related images. > people started leaving > dwindled to nearly nothing > one or two people were still poasting > one person posting > ded pretty much in that order
>>6937 >>6936 also you could modify files on the network to spread malware

(5.38 KB 259x195 images.jpeg)

Take precautions against secret usb implants Anonymous 08/13/2022 (Sat) 08:26:27 No. 9259 [Reply]
I am using Linux operating system. My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off. When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware. I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool. Wireshark logs https://easyupload.io/eqrfr6 This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup. On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation. This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH. My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.
4 posts omitted.
>>9281 The important thing is not the usb, but the PCI devices group to which the usb is connected. I blocked the USB via the GRUB command line. modprobe.blacklist=xhci_pci modprobe.blacklist=ehci_pci usbcore.nousb=Y This time the PC presents itself as a different PCI device during boot up. Don't give advice to turn it off from bios because there is no "disable usb" option in bios.
Which command should we use?

(50.04 KB 780x439 Hackermandirec8chan.jpg)

Anonymous 10/05/2021 (Tue) 04:59:40 No. 5596 [Reply]
I am definitely very excited for windows 10, why am I still recommended to use debian and windows 10 is the only one that has game support, I like to play games and the problem with linux is that it just doesn't run or else it runs more with a lot of workarounds but what the hell. Absolutely thinking I could be a hacker but I can't, I hope you guys can help me with this with magic, I really believe in the damn multiverse and I even talked to my other self in high school. Maybe I am Schizo
1 post and 1 image omitted.
>>8838 ggos
kys retard
No

(1.43 MB 1920x1920 c_data_type_sizes.png)

Master Thesis Anonymous 08/14/2022 (Sun) 21:26:09 No. 9316 [Reply]
I need ideas for my Master Thesis in Computer Engineering anons I'm open to pretty much everything, as my degree doesn't have a specialization per say However, AI, Data Science, Networking and Cybersecurity don't captivate me that much
1 post omitted.
something on ternary cpus what the fuck can you even do with a half bit and i mean a real ternary machine that uses ternary gates exclusively
Write about how to get rid of systemd.
CERN. The “altar of an alien god” idea, and what they claim to be and probably are doing; Accessing parallel dimensions/realities

How do I get/use malware? Anonymous 08/01/2022 (Mon) 10:06:51 No. 9082 [Reply]
How do you get malware for personal use. Such as a trojen virus to install on a pc.
Metasploit or learn hacker tools. Beginners can start with Kali Linux.
Start working for an indian call center

(8.67 KB 735x386 deepwebs.jpeg)

Anonymous SSH chat Anonymous 08/13/2022 (Sat) 06:34:48 No. 9252 [Reply]
Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf. ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.

[ 1234567891011121314151617181920 ]
Forms
Delete
Report