/t/ - Technology

Discussion of Technology

Catalog Archive
+
-
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0 (Temporarily Dead).

Ghost Screen
Celebrating its fifth anniversary all September


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

Torture/Brainwashing - EM Radiation/Voice2Skull Anonymous 09/25/2023 (Mon) 17:00:53 No. 13173 [Reply]
https://drive.google.com/drive/folders/1DxmzymDIBdhsuzTlUytuYclefcELefsC?usp=drive_link, https://drive.google.com/drive/folders/1iLLJoa7D4kUrvxt3qfAAAi61zLAJDNDd?usp=drive_link, https://drive.google.com/drive/folders/1UceYrz8dCsozAw0zs_QCTO8kTyW2yWcc?usp=drive_link, https://drive.google.com/drive/folders/1PsHCnB4gPqEOhjOXGsLTa4VuhaeLstgC?usp=drive_link, https://drive.google.com/drive/folders/197DwynBiDdJlVVXmY7D3NF7LUcZsknhi?usp=drive_link 11 Months of physical and psychological torture to "get me to eat vegetables" (make better life choices). I found out they were pedophiles and they've ruined my life. Audio files contain all the torture, beratement, humiliation I endure 24/7 and to this very moment done by illegally bombarding me with EM radiation (sound is in the air). Videos, images, text documents contain information I've been collecting, cars that I've seen following me all over the country, etc... it may not all be accurate, but I'm fearing for my life and not sure how much longer I have to live. I most likely now have cancer from prolonged em radiation exposure and have severe PTSD from the trauma they caused me. Patterns emerge over time, and the pattern is clear: I was never supposed to know this was happening, and because I found out, they've been ruining my life in various terrible ways using technology and social engineering. As far as I can tell, they've been doing damage control for months now, perpetuating the whole ordeal while keeping everyone else who is involved in the dark while they tried to figure out what to do with/about me. Now most people involved know that they've been lied to and that I never consented to any of this nor wanted it in the first place. Even to this very moment as I type I'm hearing, "nobody is going to believe. just kill yourself" over and over. I'm not sure if anybody can help me and I'm suicidal at this point, not because I want to die, but because I've been tortured for 11 months now with no end in sight all to emotionally blackmail me into not doing things they don't want me to like leaving my own house or eating sugar. I was literally actually tortured (isolation, sleep deprivation, drugging, shocking, food/water deprivation, and beratement) for 2 weeks straight earlier this year until they coerced a "confession" out of me to both use as emotional blackmail and to shift their blame onto me while others perpetuated the "process" thinking they were "fixing" me or "helping" me. In the end, they were all lied to by a certain few individuals to cover what they were doing. Evidence I have can be corroborated by others involved and literally anyone who may have been recording anything at any time in the area for any reason........ People involved can corroborate my story and the identities of the people involved; some that I have already identified. I have evidence in my body as far as I can tell and as far as I have been told, but every time I get X-rays to prove such, I never get the results. I've requested medical records from a recent hopsital visit and a doctor visit, both of which I had X-rays done, but I never receive the images with the records even when specifically asking for them. They've stolen my identity and have been controlling basically every aspect of my life for years now. I haven't received any mail for years pertaining to SSD, Medicaid, or otherwise because as far as I can tell, they are lying to the government in my name. I can't work regardless because of what they have done and are still doing to me at this very moment: keeping me in a highly distressed state, running my mind in circles, going through the same story over and over for......brainwashing. And because of that, I sit at home, staring off in space, unable to function as a human. All so they can attempt to force me to do what they believe is "right" or what's "better" for me. - As I type this, they are telling me they are going to tell everyone I'm a pedophile and/or paranoid schizophrenic to smear my name and/or discredit me. It seems quite telling to me that instead of denying any of this, they have already planned to smear my name instead of defending from the facts. So be prepared for some social engineering to sway opinions/emotions instead of focusing on the validity of my claims. I'm currently uploading all of my evidence. I have 200GB of data uploaded already and much more is coming. I am unable to review the evidence myself as they have full control of all my online accounts and computer/phone as far as I can tell. - My physical body is failing at this point, so all I want is to attempt to stop these people from doing this to anyone else before I perish. I've lost 60-70lbs since they started doing this to me. I have a lump on my testicle. I have moles and red spots all over my skin. This may or may not be from radiation exposure they've given me, but I didn't have a lump on my testicle until a few weeks ago. They manipulate my emotions by various means to prevent me from getting the help I need - health, legal, otherwise. And I have accumulated severe PTSD which has affected every aspect of my life. "Nobody is ever going to believe you. Just kill yourself." Torture and brainwashing to eat my vegetables. Please help. Please advise. Some of torturers:

Message too long. Click here to view full text.

4 posts and 2 images omitted.
Just go innawoods and grow vegetables
Your torture was all masterminded by Mike Lindell from Wisconsin. He is the source of all your pain and suffering. You should ask him about it.
>>13173 Read Robert O. Becker's books. Especially Cross Currents!

(52.93 KB 640x427 Gadsden_flag.svg.png)

ICANN wants to censor the internet Anonymous 08/29/2023 (Tue) 21:48:04 No. 12916 [Reply]
7 posts and 1 image omitted.
censorship is a good thing
>>15035 Fuck off retard

(148.21 KB 1280x1856 Asukabun smol.jpeg)

(66.14 KB 750x1000 POW Block.jpg)

POWBlock - Developing a system agnostic Proof of Work backend Anonymous 07/08/2024 (Mon) 01:36:13 No. 15564 [Reply]
You know, it occurs to me that despite being the site's sysadmin, and this being my bro Codexx's board, I literally never post my tech autism here. Maybe I should change that. If you'll pardon me making the equivalent of a /blog thread, I want to talk about some of my current ideas. As some anons are aware, over the past 4 and a half years I've become something of a guru at programming Varnish VCL. 8chan's entire network is bespoke and we've had to deal with requirements that no normal, Cuckflare-and-cloud-storage website needs. As a result I gained an absolute shitfuckload of hands on experience in hacking Varnish code. This has led to a minor obsession with pushing its boundaries, and making it do useful things that it was never designed to do. One thing that's been on my mind for literally *years* was the idea to make Varnish do the Cloudflare thing with a frontal POW and bot detection system. You can do this with Nginx and setups like this: https://github.com/C0nw0nk/Nginx-Lua-Anti-DDoS which is what Josh used as the basis of his "Kiwiflare" system. But no such tool exists for Varnish. I wanted to change that, and funnily enough I pulled it off several weeks back. It can be done though careful hacks of the error handling subsystem and abusing the object cache to track user session keys. But then I got to thinking, why hoard it? Since my original system was already using an external validator script (the prototype was written in Bash using netcat rofl) why couldn't I just move the system itself to a fast little backend that was designed to hook up with *any* frontend proxy? Not only would it save me a lot of work in the big picture, but other people might use it too. This became the idea for POWBlock. The first thing I decided was that I wanted it to run as a script. There are several reasons for this but the big ones are: Portability, lack of dependencies, and simplicity. The Bash prototype is obviously garbage from a production standpoint, but Python is fat and fucking slow. There is a reason why the Nginx POW system uses Lua. Lua is small, light, fast, low overhead because it was meant for embedded systems, its in every server repo, and has an HTTP server module with solid security and concurrency. Its not good enough to run a whole website off of, but if you want a zippy little script-based HTTP application like this it is far and away the best choice if its something you actually mean to deploy. Since I wasn't a Luafag I needed to start learning. After a week of reading and basic practice, I decided to move forward with some help from ChatGPT, henceforth called "the nig." I've found over the past year that this is great for practicing code. You learn the very basics, design your program yourself and break it into key sections and functions, throw your ideas and functions at the nig, and then learn as you go because you have to debug its shit and occasionally hand-write functions where the bot can't get it right. Its shockingly effective hands-on learning and I've been picking up Lua in record time. Its also nice to just hand the nig a big block of code you banged out and say "comment all this shit for me." Saves a lot of writing. Now you have the backstory, so let's get into the concept. POWBlock is a Lua-based mini-server that has exactly one job: It runs on a box somewhere and serves as an alternate backend for an existing frontend proxy. When a user visits the shielded site, the proxy can send them to POWBlock and force them through a Cloudflare-style Proof of Work browser check (and eventually other checks), give them a cookie to prove they passed, and send them back to the site. You can do this with Varnish, Nginx, and even fucking Apache. Control is handled by the frontend proxy, where you configure rate limiting and other basic anti-DoS functions to protect POWBlock itself from being flooded out, and it uses a system of custom HTTP headers to communicate and for security. My next post will be the prototype code for the server, so you can get an idea what it does.
2 posts and 1 image omitted.
# luapow.vcl - Varnish module for handling Proof of Work (PoW) authentication import redis; # Define a subroutine to handle POW control sub POW { # Check for POW cookie in the request if (req.http.Cookie) { # Parse cookies cookie.parse(req.http.Cookie); # Get POW cookie value set req.http.Cookie-POW = cookie.get("POW"); # Fetch cached POW value from Redis based on user's IP from X-Forwarded-For set redis_key = "user_pow:" + req.http.X-Forwarded-For; if (!redis.is_error(redis.get("RedisServer", "RedisPort", redis_key))) {

Message too long. Click here to view full text.

(106.43 KB 1170x892 Asuka ohai.jpeg)

This is called a VCL Module. They plug into the main VCL code that drives the caching engine via a leading include"" statement. 8chan's network frontends use about 24 of these that I've written over the years, so this is just one more. But you can see some of what we need to handle: First we scrub all custom header values from the client's side, to make sure he can neither spoof nor see any of the headers or values that we're using. Then we parse the user's Cookies looking for POW, and if it exists we ping the Redis storage for the user's IP address to see if there's a stored value. If both exist, and match, the user is let into the site. If they don't match, we run the rest of the POW subroutine, which: >Generates an X-Pow header with a random 8 character session token >Sends the token to the Redis store keyed to the user's IP address >Sets the magic header >Switches the backend from the 8chan main CDN gateway to the POWBlock server >Saves the URL the user was coming in on and sends it in a header >Connects the user to POWBlock with all necessary information supplied What isn't shown: Forward rate limits, DoS throttling, URL locking, request sanitizing, header normalizing, and a bunch of other shit the main VCL code will do for security before it even gets to this spot. I'm sure it'll need to be tweaked for an actual deploy, but I'll cross that bridge when I get to it. And I need to write a nullification module so that if a user gets past this and fucks around, it will null the value of their key in the shared store and force them back to the POW or even ban them entirely. >Why bother with all this shit and why make a Lua server instead of just putting it on the site, maybe with the splash disclaimer? Because it can take upwards of 60% of the load off the frontends in the case of a major attack. POWBlock can run on its own shitbox server (and even have DDoS protection there) and if the site is getting hammered like hell, then its POWBlock taking most of the assraping instead of the servers we actually care about. And these things are so cheap and easy to set up (install Lua, install 3 Lua modules, stick the script in systemd, fucking done) that the servers it would run on can be wholly disposable. You could have 50 of em, each running a forking instance, and divide a big attack up between them.

Message too long. Click here to view full text.

>>15566 >We also generate a weak but unique "server nonce" that is part of the POW calculation No it isn't you nigger. Also if you do this correctly the nonce controls the size of the table an attacker needs to precalculate challenges and 2 bytes is just 65k unique solutions you double nigger. Additionally I imagine you should also clean server_nonces in case users never complete the pow.

(344.05 KB 1278x344 how to code windows.jpg)

Anonymous 03/16/2021 (Tue) 11:31:58 No. 2967 [Reply]
Why Windows sucks so much?
25 posts and 13 images omitted.
>>15312 >installing Japanese Wangblows 10 for 超寝取られ in a VM running inside Wangblows 10+1 instead of putting LANG=ja_JP.utf8 in front of wine gemu.exe on Gentoo Sodomy defenda.
(1.60 MB 3264x2448 IMG_1580.jpeg)

alguien conoce a ese Daniel? vive en Cumbres Le Fontaine
>>15312 Using Linux and wime/vm for uncompatible software is not that hard, nigger; and yes, tinkering is fun, if you don't find it fun then computers are not for you.

Good Microphone for VA? Anonymous 05/28/2020 (Thu) 22:07:57 No. 272 [Reply]
Hey guys, I'm starting to get into voice-acting, and it's honestly something that I've been wanting to do for a long, long time, so now that I have the money and the time, I wanted to really dive into it. Problem is, I am very inept when it comes to audio technology. I'm doing my best to try and learn about the different kinds of mics, and how to hook them all up, i.e. XLR vs. USB, audio interfaces, etc., and it's SORT OF making sense, but really, there's just a kind of overload of information online. Can you guys just help me decide on a good microphone for voice-acting, even entry-level? I have a Blue Snowball iCE right now, but I'd really like something more professional, even if I have to spend a couple hundred. Thoughts? Recommendations? Two that've caught my attention so far are the Shure Beta 58a and the MXL 990, but I don't want to make a shitty purchase and regret it.
6 posts and 1 image omitted.
i have never used these mics but I hear they're good Shure SM57 SM58 SM58 SM58 SM58 AT4040 AT2035 AKG P220
>>471 These plus SM58 Beta and Rode NT1 is good entry level
<How good is this video?

What Program is Best for Decrypting Opera Login Data Files? Anonymous 10/18/2023 (Wed) 17:02:45 No. 13390 [Reply]
So at the beginning of this year my laptop started to fail and I had to send it into PC world for repair. Not long before I did so I was made to change the password for my Google account. I have always relied on web browsers to remember my passwords for some stupid reason. I was able to copy the contents of my C Drive before I did so and so I thought that I would be able to recover my passwords and such easily. Yet I found that opera now encrypts you passwords based on you dapai code and login details. This was never the case before and it seems stupidly paranoid that go to such lengths. I know them all except the one that has been changed yet that password is pretty vital. So I have spent months looking into this, first I thought that the keys hadn’t copied over but they were hidden and I do have the DPAPI master keys and CREDHIST, I also have found a way to view the encrypted passwords and the ones that are the same are encrypted in similar way so that should also make the password easier to find. Yet I still have not found a program that I could use. Windows password recovery program tells me that I entered my password wrong even though I entered it in right, DataProtectionDecryptor gives me “Failed to extract the encryption key” and mimikatz gives me Error kull_m_dpapi_unprotect_blob ; CryptDecrypt(0x80090005), I also found a bunch of linux and python troon programs that claim to be able to do what I am looking for but they require so many addon programs to be installed that you loose track. What am I doing wrong here? What is the best program that can do what I am looking for?
15 posts and 9 images omitted.
I absolutely hate the state of online accounts now, this two factor bullshit is going to lock me out of every account I've had for years. I'm already permanently locked out of several yahoo accounts because I never even knew they were implementing 2FA, now that they have I have no way back in without paying for premium support, they paywalled my fucking accounts. Worse yet is how many accounts on other websites I used those addresses for. All gone. Because of automatic opt-out enforcement of 2FA bullshit. And can we talk about how much of a fucking joke 2FA is? All it does is protect accounts from the fucking owner, the majority of security breaches are always because of exploits and flawed setups on the SERVER side, nothing to do with bad opsec of the end users. so these services continue to build a personally identifiable profile on the user by grabbing your phone number or forcing you to use proprietary phone apps or hardware keys that I'm convinced can be used to de-anonymize since now you have a trail from the key back to whatever company you bought the hardware key from. The fucking irony is that years ago it was always consider poor security to write down a password instead of using one you could just remember, now with hardware keys you have to create a backup of the secret code in case your key breaks or you lose it so you can recover with a second hardware key, which I've heard several "security tubers" advocate for writing down. In spite of the known security issues with SMS for 2FA, businesses like banks continue to only offer SMS, and google makes sure to block virtual numbers. We live in a fucking INSANE ASYLUM. >>15200 it wouldn't be hard to write a python script that takes things you know are in your password and shuffle them around while also adding numbers/special characters, even without threading you could end up generating a thousand possible combinations within a few seconds
>>15309 There's a bit of a problem with that idea, at least if you're talking about an automated I-forgot-my-password-but-I-think-it-contained-this-string bot. If it doesn't guess right in the first three tries, your account is locked for one hour. Set up a bot to do this. It will not achieve one thousand iterations/sec. It will be limited to 72 iterations/day. Bring a lunch.
>>15359 yeah, to actually try each password will take literally forever because websites block you after so many failed attempts, but if all you wanted was to get every possible combination and hand pick the ones you think might be right, that process alone wouldn't take hardly any time

(108.81 KB 600x400 cicada-husks.jpg)

P2P Imageboard Anonymous 02/29/2024 (Thu) 02:50:00 No. 14729 [Reply]
Sup /t/ I've been working on getting a p2p imageboard functioning for a while and I decided to start fresh more recently with a new project. It's still not fully featured per se, but I feel like releasing it in it's current form since it's still functional and I want to see if it works in the wild. Hopefully you'll be able to see the existing boards and start posting. https://gitgud.io/threshold862543/gladden To install: >install node and yarn (or npm instead of yarn) >run "yarn build" to get the dependencies >run "yarn start" to start the server And you can add whatever boards you like. This basically works like a torrent. Moderation is local, so you can delete files and posts that you don't like, but it won't be deleted for others necessarily (unless everyone else blocks them and there are no more seeders). "Subscribing" to others as moderators so you can trust them to delete for you is also possible I just haven't hooked it all up yet.
4 posts and 3 images omitted.
This already existed in a way via Millchan on Zeronet. >>15280 An idea that I had to fix this was to split every file into two parts, a "file" and a "key", with checks on both sender and recipient to make sure that no user ever possessed both the key and file for the same object at the same time, and that when a file was browsed by a user only then would the network also seek out the key and decode it. But it had to be implemented in a particular way. You can't just encrypt a file because possessing "encrypted CP" is still CP, so the idea was that the file would actually be split somehow, like a pattern of alternating bytes, such that the "file" and "key" were each half of the completed object and not merely an encoding scheme applied to the whole.
>>15298 What about a setting (perhaps on by default) for holding images in RAM only, and only while you have the thread open? Is it still a problem since you technically download and upload the data despite not having it on hard drive?
>>15335 Yeah, exactly. If you had the file, and you browsed the site and it tried to load that file, then your system would request the key from someone and then hold it and the resulting completed object in memory only.

(11.33 KB 187x270 watwat.jpeg)

Structure and interpreation of computer programmes 2022 Anonymous 05/25/2022 (Wed) 19:18:43 No. 8522 [Reply]
Found out theres an javascript version of this book i havent read it yet but iam sure its cool.Its kinda wierd they didnt use a programming language like c or c++
3 posts omitted.
>js How do they deal with such gems?
Fuck that faggot language and fuck the kike authors and publishers for using that faggot language. It's all gone to shit.
>>15208 >>15236 I shouldn't have to explain this, but .... Javascript was originally intended to be "Scheme in the browser", and, as such, it shares far more features with Scheme than C or C++ or Jabba. Of those, modern Jabba is probably the most "functional". Eichmann wrote the original in a week, and then his boss came in and said: "we're going to mooch the publicity of Java, make it look like C, we're calling it Javascript." It is a piece of shit that was written in two weeks. One sprint. I bet the agile fags are sperging.

(2.71 MB 4272x2848 yellow_nigger_gov_fags.jpg)

i hate xiaomi so much bros Anonymous 07/22/2022 (Fri) 07:33:20 No. 8927 [Reply]
>xiaomi says that you can unlock bootloader with their tool >make xiaomi account and do all the stuff you must do to unlock device >download windows because the tool is only available in windows >device not getting recognized >connect xiaomi device with 3 different pcs (win 10 and 11) and download a bunch of drivers >still nothing >a guy in a forum says that you must do it in win 7 and it will work for sure >download win 7 >install win 7 in my pc

Message too long. Click here to view full text.

12 posts omitted.
>>11688 It's not about your formatting per se, it's about you not conforming to imageboard culture. The locals think you're an annoying tourist and want you to either assimilate properly or go back home.
>>8927 > He bought chinkshit You fell for the meme. Sure you can get lucky sometimes, but mostly for anything that needs to be reliable, chinkshit is shit. Plain and simple.
>>8927 Did you get the right drivers? Also I why not just use a VM? Or buy a temp sim.

(73.39 KB 618x864 1.jpg)

Anonymous 10/10/2022 (Mon) 17:15:23 No. 10047 [Reply]
I really want this photo without the watermark and in original resolution (to print it out and get it autographed). Is there any way to dig it out? www*nordicfocus*com/ski-jumping/event/sjwomen-202122-12/view/491683
3 posts and 1 image omitted.
In fact, if you want to print it at HUGEASS size, here's an upscaled version.
>>10360 just tell him how you did it, instead of mocking him, smart-aleck.
>>14818 he did, use your brain nigger

How to unblock factory resetting on a school laptop Anonymous 12/05/2021 (Sun) 04:59:39 No. 6568 [Reply]
So i have a laptop that i was given but factory resetting is blocked the year ended the school said keep it but they left all the admin stuff on it making it inaccessible for actual personal use it is a lenovoe11 think pad and i can't access any administrative setting and can reset it by clicking f12 so what should i do
5 posts omitted.
tldr, you have to disassemble the chromebook, and use a flashprogramer. also, please don't do this with a stolen device. I get that schools give these away without properly releasing them. only worth it if you like a challenge, and have the time. expect to brick the device at least once, so long as you don't blowup the bios ic and you have a dump of the bios chip, you can recover it. if you want to run linux you will need to flash coreboot on it using this project mrchromebox.tech the bios chip will need a manual flash using a ch431a with a 5v to 3.3v converter, or a ch431a modded to run at 3.3v. see this page for instructions on using the programmer https://wiki.mrchromebox.tech/Unbricking (heads up, I had some issues with the flashrom app in the manjaro repo. ended up using the other flashrom app in the repo "flashrom-starlabs" and that worked)

Message too long. Click here to view full text.

it uses nand flash, and you have to flash the bios chip with new firmware. lol (yes some older chromebooks (not this one) had hdds and msata ssds, that doesn't matter though since you'ld still have locked down firmware that can only run chromeos)
what doesn't work right about it? not sure if you can even get a shell without dev mode enabled. and enabling dev mode isn't possible unless the admins allowed it/removed from there list of owned devices. if you successfully enabled dev mode, you have everything you need.

(4.72 KB 259x194 Anon 2.jpg)

Black Hat Money Anonymous 06/15/2023 (Thu) 21:58:31 No. 12323 [Reply]
Hello 8chan, I have seen most people asking what is the best method to start with on dw to make easy illegal money. From experience I will advise you to start with PayPal logs since they are easy to cash out. It is easy money since you will be using the balance to buy btc and use local monero to exchange the coins to xmr to make it more anonymous. Am willing to share my knowledge as a sign of giving back since I was also put on game by some one else a while back and I believe that a candle does not lose any of its light by lighting up another candle. Let's fuck the system and make money together but always remember to prioritize your opsec since it's illegal.Message me on session I will easily guide you from there. You gotta have your own one time initial capital required to start. Session download link: https://getsession.org/ Session ID: 052e6ee742c7bbffdecc4781ebf34d73ee42c0a80c7ee0eb817be2501badd25249
4 posts omitted.
socks and proxy for cc
(49.89 KB 474x674 th-1305116898.jpg)

>>12323 What a fucking glowie
I would like to acquire knowledge.

(52.14 KB 508x500 1660734558866225.jpg)

/smg/ - software minimalism general Anonymous 08/18/2022 (Thu) 14:59:01 No. 9388 [Reply]
For discussing software minimalism. >What is computing minimalism? https://en.wikipedia.org/wiki/Software_bloat https://en.wikipedia.org/wiki/Unix_philosophy https://wiki.installgentoo.com/wiki/Software_minimalism >Why is software minimalism good? - Fewer bugs - Better performance - Lower memory footprint - Better maintainability - Higher scalability - Longer software lifetime - Smaller attack surface >Who hates software minimalism? - Script kiddies (Muh Kali Linux)

Message too long. Click here to view full text.

23 posts and 5 images omitted.
I'm using W10 LTSC for now.
Is Arch not considered minimal? Is it cause of systemd?
>>9388 i use tails for software minimalism. My laptop sucks less power from the batery since i use it.

Banner ad in Krita. Anonymous 10/13/2023 (Fri) 07:57:19 No. 13333 [Reply]
I just opened Krita after a long time and i got a banner ad. Does anyone know what is going on?
3 posts and 1 image omitted.
>>13445 So, no, I can't read English, nor can I use common sense, is what you meant to say htere. I get it.
>>13463 Kek, you could have been less aggressive anon. A simple "I think you know what's going on" would have been sufficiently communicative and snarky for your needs.
>>13445 I know what you mean. How far are they going to go with this sort of thing? Is the next version going to look like a 1990s geocities page? You can say "obviously they don't want to get forked for pushing too hard" and probably they'll avoid going off the deep end, but it's not like there aren't precedents of well-used FOSS becoming adware, exploitative, etc. >10/13/2023 Oh, well. I wonder how this all turned out.

(42.90 KB 400x372 HACKING TOOLS.jpg)

MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB Anonymous 10/21/2022 (Fri) 22:34:23 No. 10311 [Reply]
MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB https://archive.org/details/tools_202210
6 posts omitted.
yeah, no. i think ill just stick to installing blackarch or kali if i wanna get a shit ton of "hacking tools"
Just gonna leave this in here, thank you, maybe someone in here might decode this for me. 192.168.0.184
>>13891 You shouldn't post the IP addresses of Mossad agents.

(730.10 KB 1357x768 gnome-3-36.png)

(245.20 KB 1920x1080 2593505111628596369gol1.jpg)

(436.79 KB 1680x1050 xfce-4-18-desktop-environment.jpg)

(64.35 KB 1366x768 i3-16.webp)

Desktop Environment and Window Manager Thread Anonymous 10/13/2023 (Fri) 05:58:39 No. 13331 [Reply]
Argue about what desktop environment or window manager is cool and which one sucks. I have been using awesome window manager on my T61 for like a year, but I'm still wondering how much of a meme it is. Kind of sick of endless tweaking. Maybe I should just use Xfce on it - if I'm not used to awesome after so long, I should probably switch. On my more modern computer I use GNOME, while when GNOME3 came out I thought it sucked, I think it's matured really well and is pretty alright as a "default" kind of desktop. What do you like using, and why?
5 posts omitted.
>>13557 Yeah, I tried to install Node and it had the 12 version when the lastest is the 20. It's so fucking out of date.
I just use dwm because outside of 2 niche use cases it does every I need out of the box. I did spend some time patching some extra features but mainly it was just to have a different layout for each tag so it wouldn't be resizing every application when I changed something, as well as systray functionality for dumb applications that demand a systray to store their icon, which frankly none of the applications add any benefit to having a systray icon, I've never once had to click on the dumb things for any reason.
>>13331 For me, the only usable Desktop Environment is Xfce4 (and perhaps Mate). I use Ratpoison on my laptop and IceWM on my desktop (I have also tested LabWC). Ratpoison is manually tiling WM. It's basically Tmux but for managing GUI windows. By default all windows are maximized and you can use ctrl-t n to switch to another ("next") window or you can use ctrl+t 2 to switch to window number 2 (and so on). There is also a command for switching to a window by searching for it's title, but I forgot the keybinding... The great thing is that Ratpoison can show all keybinding with ctrl+t ? (it lists even custom ones!). ctrl+t is the default Ratpoison "prefix key". All Ratpoison commands start with the prefix key but you can change the prefix key if you want, and you can define keybindings that don't need the prefix key (like making WinLogo + r execute your program launcher). Ratpoison is very simple to use and configure but some people want that their WM manages windows in a more dynamic or automatic way. It's also extremely lightweight. IceWM is basically a clone of Windows 95 GUI with additional features (like optional support for sloppy focus). I used to use OpenBox but the development of it has stalled, unfortunately. Both OpenBox and IceWM are very simple to configure, too. LabWC is a clone of OpenBox for Wayland. >>13343 >Gnome >Haven't tried it yet, but from what I've seen looks like something for mobile or touch screens. Gnome 2 was great but Gnome 3 is basically the Windows 8 of Linux world. Avoid. Mate desktop environment is a clone of Gnome 2. >>13557 You should try Debian testing.

Message too long. Click here to view full text.


[ 1234567891011121314151617181920 ]
Forms
Delete
Report