/t/ - Technology

Discussion of Technology

Catalog Archive
Options
Subject
Message

Max message length: 0/12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Board Locked? Request Reopening

PNG and GIF uploads are temporarily disabled while we deal with a spammer problem.


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

Banner ad in Krita. Anonymous 10/13/2023 (Fri) 07:57:19 No. 13333 [Reply]
I just opened Krita after a long time and i got a banner ad. Does anyone know what is going on?
3 posts and 1 image omitted.
>>13445 So, no, I can't read English, nor can I use common sense, is what you meant to say htere. I get it.
>>13463 Kek, you could have been less aggressive anon. A simple "I think you know what's going on" would have been sufficiently communicative and snarky for your needs.
>>13445 I know what you mean. How far are they going to go with this sort of thing? Is the next version going to look like a 1990s geocities page? You can say "obviously they don't want to get forked for pushing too hard" and probably they'll avoid going off the deep end, but it's not like there aren't precedents of well-used FOSS becoming adware, exploitative, etc. >10/13/2023 Oh, well. I wonder how this all turned out.

(42.90 KB 400x372 HACKING TOOLS.jpg)

MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB Anonymous 10/21/2022 (Fri) 22:34:23 No. 10311 [Reply]
MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB https://archive.org/details/tools_202210
6 posts omitted.
yeah, no. i think ill just stick to installing blackarch or kali if i wanna get a shit ton of "hacking tools"
Just gonna leave this in here, thank you, maybe someone in here might decode this for me. 192.168.0.184
>>13891 You shouldn't post the IP addresses of Mossad agents.

(730.10 KB 1357x768 gnome-3-36.png)

(245.20 KB 1920x1080 2593505111628596369gol1.jpg)

(436.79 KB 1680x1050 xfce-4-18-desktop-environment.jpg)

(64.35 KB 1366x768 i3-16.webp)

Desktop Environment and Window Manager Thread Anonymous 10/13/2023 (Fri) 05:58:39 No. 13331 [Reply] >>13902
Argue about what desktop environment or window manager is cool and which one sucks. I have been using awesome window manager on my T61 for like a year, but I'm still wondering how much of a meme it is. Kind of sick of endless tweaking. Maybe I should just use Xfce on it - if I'm not used to awesome after so long, I should probably switch. On my more modern computer I use GNOME, while when GNOME3 came out I thought it sucked, I think it's matured really well and is pretty alright as a "default" kind of desktop. What do you like using, and why?
5 posts omitted.
>>13557 Yeah, I tried to install Node and it had the 12 version when the lastest is the 20. It's so fucking out of date.
I just use dwm because outside of 2 niche use cases it does every I need out of the box. I did spend some time patching some extra features but mainly it was just to have a different layout for each tag so it wouldn't be resizing every application when I changed something, as well as systray functionality for dumb applications that demand a systray to store their icon, which frankly none of the applications add any benefit to having a systray icon, I've never once had to click on the dumb things for any reason.
>>13331 For me, the only usable Desktop Environment is Xfce4 (and perhaps Mate). I use Ratpoison on my laptop and IceWM on my desktop (I have also tested LabWC). Ratpoison is manually tiling WM. It's basically Tmux but for managing GUI windows. By default all windows are maximized and you can use ctrl-t n to switch to another ("next") window or you can use ctrl+t 2 to switch to window number 2 (and so on). There is also a command for switching to a window by searching for it's title, but I forgot the keybinding... The great thing is that Ratpoison can show all keybinding with ctrl+t ? (it lists even custom ones!). ctrl+t is the default Ratpoison "prefix key". All Ratpoison commands start with the prefix key but you can change the prefix key if you want, and you can define keybindings that don't need the prefix key (like making WinLogo + r execute your program launcher). Ratpoison is very simple to use and configure but some people want that their WM manages windows in a more dynamic or automatic way. It's also extremely lightweight. IceWM is basically a clone of Windows 95 GUI with additional features (like optional support for sloppy focus). I used to use OpenBox but the development of it has stalled, unfortunately. Both OpenBox and IceWM are very simple to configure, too. LabWC is a clone of OpenBox for Wayland. >>13343 >Gnome >Haven't tried it yet, but from what I've seen looks like something for mobile or touch screens. Gnome 2 was great but Gnome 3 is basically the Windows 8 of Linux world. Avoid. Mate desktop environment is a clone of Gnome 2. >>13557 You should try Debian testing.

Message too long. Click here to view full text.


Anonymous 11/30/2023 (Thu) 07:26:39 No. 13894 [Reply]
fastman thread

(44.92 KB 564x547 draw-glass-11-1.jpg)

are you smarter than a 4channer Anonymous 11/30/2023 (Thu) 03:06:10 No. 13890 [Reply] >>13897
where's the incident ray of the pencil in this image given its refraction seen in the bottle
>>13890 what a lame thread you posted what is probably a drawing too without details about the geometry of the bottles it's pretty useless to muse about its optical properties and whether the drawing is precise or not https://youtube.com/watch?v=dBOzdoIsOEI
[Embed]

(55.17 KB 942x786 Intelleak.png)

20GB Intel leak Anonymous 08/06/2020 (Thu) 23:49:03 No. 884 [Reply]
Some internal stuff from Intel leaked recently, with the leaker mentioning more to come. Contents of this leak (according to the leaker): >Intel ME Bringup guides + (flash) tooling + samples for various platforms >Kabylake (Purley Platform) BIOS Reference Code and Sample Code + Initialization code (some of it as exported git repos with full history) >Intel CEFDK (Consumer Electronics Firmware Development Kit (Bootloader stuff)) SOURCES >Silicon / FSP source code packages for various platforms >Various Intel Development and Debugging Tools >Simics Simulation for Rocket Lake S and potentially other platforms >Various roadmaps and other documents >Binaries for Camera drivers Intel made for SpaceX >Schematics, Docs, Tools + Firmware for the unreleased Tiger Lake platform >(very horrible) Kabylake FDK training videos >Intel Trace Hub + decoder files for various Intel ME versions >Elkhart Lake Silicon Reference and Platform Sample Code >Some Verilog stuff for various Xeon Platforms, unsure what it is exactly. >Debug BIOS/TXE builds for various Platforms >Bootguard SDK (encrypted zip) >Intel Snowridge / Snowfish Process Simulator ADK

Message too long. Click here to view full text.

17 posts and 5 images omitted.
>>895 names seem boring but dling anyway I like the sound of BIOS reference code for historical purposes.
bump
I'm still wanting for the rest. I always wanted to make my own IntelME so I control my Ring-1

(10.65 KB 474x266 nc.jpg)

What happened nanochan? Anonymous 10/27/2022 (Thu) 00:30:41 No. 10381 [Reply] >>13459
Haven't been able to access it for a while, is it gone, being DDOSed, something else? It had some of the best technology / privacy discussions and I haven't found anything else like it,
2 posts omitted.
I think the owner gave up on moderating spam attacks

ALIEN-UFO INTELLIGENCE- Heavy National Security.pdf Download Anonymous 01/22/2023 (Sun) 22:05:52 No. 11343 [Reply] >>13377
ALIEN-UFO INTELLIGENCE- Heavy National Security.pdf Download https://archive.org/details/alien-ufo-intelligence-heavy-national-security

System Transparency Anonymous 10/04/2023 (Wed) 22:25:41 No. 13279 [Reply]

There is no such thing as Ukrainian hackers. Anonymous 05/12/2022 (Thu) 18:39:37 No. 8419 [Reply] >>13205
There is no such thing as Ukrainian hackers. These so-called Ukrainian hackers are agents of the USA, England and Israel. Cyber attacks are constantly being carried out against Russia.These attacks are said to be made by these so-called "ukrainian hackers". In reality, there is no cyber attack on Russia. Attacks on Russian systems are not made over tcp/ip and udp networks. The main source of attacks on Russia are crypto-Jews living in Russia who have embedded the NSA's Cottonmouth and Bulldozer hardware into Russian computer systems. These equipments are managed remotely via radio signals, not internet network. Attacks on Russia are not cyber attacks but electronic signal attacks
20 posts and 4 images omitted.
>>8419 you'll never be a woman btw
while i doubt its really true, mainly the "crypto Jews".. lol
you can smell the schizophrenia in this thread

(61.31 KB 1070x618 PC.png)

Anonymous 09/16/2023 (Sat) 03:04:41 No. 13092 [Reply]
Hello anons, does this computer work (if I don't forget to put a component in it) or is it a tremendous kamikaze? >also thread about computers and drivers for dummies
Get 2 sticks of ram so they run in dual channel, drop the hdd for a larger nvme ssd, otherwise sure.

(1.15 MB 750x715 image0.png)

Bypassing bot detection on betting sites Anonymous 12/19/2022 (Mon) 00:39:14 No. 11041 [Reply] >>12878
Sup /t/, I dont really frequent chans so apologies in advance if I'm not following the proper etiquette. I'm trying to set up a script which does arbitrage across sportsbooks if it identifies a big enough spread in the odds. While this part isn't so difficult, the real issue is that apparently most sportsbooks will ban you if they catch you doing arbitrage. Is there a way which I can write my bots so that they interact with websites close enough to how a human would where they don't get my accounts banned? Do I even need to worry about this? If anyone has any tips/ experience that would be great. tl;dr how do i not get banned off of sportsbetting sites for botting
6 posts omitted.
>>11059 Why do you care what random retards on a traditional Austrian painting forum think is "Jewish"? Are you a {{{goy}}}?
(73.12 KB 1280x720 maxresdefault.jpg)

>>11041 >I can write my bots so that they interact with websites close enough to how a human would where they don't get my accounts banned? Maybe with userscripts, but it depends a lot on the site and what you mean by "close enough to how a human would". >>12836 >do you guys think it is real? Not quite, the original image is this and apparently it comes from https://www.youtube.com/watch?v=V1nBJKtSs4E
[Embed]
>>11051 >>11059 >>12863 to be fair: "jewish" has also remained a racial thing on top of the nominal religious thing it's why jews are racist in israel

(43.70 KB 526x224 ghostBSD.jpg)

Do I need to install JAVA on ghostBSD ? Anonymous 09/16/2023 (Sat) 14:54:21 No. 13096 [Reply] >>13102 >>13159
Hi. I just installed ghostBSD and I wonder if I need to install JAVA on it or what should I install once install ghostBSD is intalled ?
>>13096 For God sake ! I've been asking this question about nearly a month and posted it on 3 or 4 sites and can't get a single fuckin' answer.
>>13096 why not just install Java anyway? it's not like it'll hurt anything

(81.63 KB 640x427 Cybersecurity.jpg)

Learn hacking/cybersecurity from 0 Anonymous 12/22/2022 (Thu) 04:48:17 No. 11081 [Reply]
I want to learn hacking/cybersecurity from 0, what do I need to know? Know how to program? If someone here is dedicated to that, please explain to me, I don't know how to start, I feel disoriented.
5 posts and 1 image omitted.
What do i have to consider if i want to use anonymously nmap and metasploit?
How to make a portscan while saying anonmous? Is there a risk of leaking data or is that a stupid fear of mine?
>>12913 >>12968 Use an VPS bought with crypto.

I Built an Air-Gapped Feed Reader and That Unveiled US’ Military Surveillance Anonymous 07/10/2021 (Sat) 23:26:40 No. 4795 [Reply] >>12897
I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time. Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors. I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too. I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.
interesting thought but do you have any actual proof
>>4795 Why wouldn't they just inject propaganda into the files that you transfer or whatever?

(184.79 KB 800x600 1691825596397.png)

Anonymous 08/17/2023 (Thu) 14:22:49 No. 12791 [Reply]
Need some explanation on how translucency is solved in 3d software like maybe using picture here as reference and some random light source, how is then glasses or marbles are rendered based on the object's form, properties, material and the scene itself? Pls illustrate or draw over for your convenience No.441552023/08/17 07:04:48 Anonymous Also especially when marbles and glasses are located nearby and supposedly create or bounces light thru and to each others

[ 123456789101112131415161718192021 ]
Forms
Delete
Report