/t/ - Technology

Discussion of Technology

Catalog Archive
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

CAPTCHA
E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Uncommon Time Winter Stream

Interboard /christmas/ Event has Begun!
Come celebrate Christmas with us here


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(291.84 KB 450x399 stallman_saves.png)

/t/ - Technology Codexx Board owner 04/25/2020 (Sat) 07:10:33 No. 2 [Reply]
Welcome to /tech/ - ∞chan's technology board. Please check the rules before you post: https://8chan.moe/t/rules.html Looking for hardware or software recommendations? Check out the InstallGentoo Wiki: https://wiki.installgentoo.com/ /tech/ is for the discussion of technology and related topics. /tech/ is NOT your personal tech support team or personal consumer review site. We have stickies for that. Keep those kinds of posts in there. For tech support, software recommendations, and other questions that don't warrant their own thread, please use the '/tech/ Questions and Support' sticky. For consumer advice, please use the consumer advice sticky located below. For tech support/issues with computers: https://startpage.com/ or https://ixquick.com (i.e., fucking Google it) https://stackexchange.com/

Message too long. Click here to view full text.

Edited last time by codexx on 12/10/2022 (Sat) 10:42:16.

(2.82 KB 200x200 questionmark.png)

/t/ech Questions and Support Anonymous 04/25/2020 (Sat) 07:16:43 No. 3 [Reply] [Last]
Bring all your hardware, software and other troubles here.
2639 posts and 574 images omitted.
>>16752 Define good, self-hosting respects your metadata better but would throw your emails straight into the spam folder of main email services. Unless you're an imageboard admin or mark you can probably just use protonmail with pop3 to remove your emails from the server for free.
For the past week, WireGuard has had the problem that it randomly drops my VPN connection to Mullvad every five minutes and have no idea what's causing it. I used to be able to fix it buy just logging out and logging back into my PC's account, but now even that isn't solving it. I tried reinstalling WireGuard, but that only fixed it for a day.

(4.65 KB 200x200 dollarsign.png)

Consumer Advice Anonymous 04/25/2020 (Sat) 07:18:24 No. 4 [Reply] [Last]
Looking to buy something but aren't sure what to get? Ask here.
813 posts and 224 images omitted.
>>16730 that makes it much more feasible thank you anon
>>11850 >the official stated limits are usually false, for example I had a 128GB MicroSD in a phone with a supposed limit of 32GB. The manufacturer just didnt feel like validating and guaranteeing anything larger. True for smartphones and many other devices. NOT true for many security/dash cameras, too large of a card will actually result in corrupt/lost video.

(4.11 KB 300x100 simplebanner.png)

Hydrus Network General #10 Anonymous Board volunteer 07/24/2024 (Wed) 20:55:28 No. 15721 [Reply] [Last]
This is a thread for releases, bug reports, and other discussion for the hydrus network software. The hydrus network client is an application written for Anon and other internet-fluent media nerds who have large image/swf/webm collections. It browses with tags instead of folders, a little like a booru on your desktop. Users can choose to download and share tags through a Public Tag Repository that now has more than 2 billion tag mappings, and advanced users may set up their own repositories just for themselves and friends. Everything is free and privacy is the first concern. Releases are available for Windows, Linux, and macOS, and it is now easy to run the program straight from source. I am the hydrus developer. I am continually working on the software and try to put out a new release every Wednesday by 8pm EST. Past hydrus imageboard discussion, and these generals as they hit the post limit, are being archived at >>>/hydrus/ . Hydrus is a powerful and complicated program, and it is not for everyone. If you would like to learn more, please check out the extensive help and getting started guide here: https://hydrusnetwork.github.io/hydrus/ Previous thread >>>/hydrus/21127
Edited last time by hydrus_dev on 08/27/2024 (Tue) 02:53:42.
797 posts and 160 images omitted.
Anyone here know how to set it so my pixel art isn't blurry? I am certain the image itself is fine. No idea what I should change in settings -> media playback -> image
>>16805 Honestly, I'm not sure how NEW I am. I tried using the software at maximum 2 years back, when I built an AMD Ryzen 9 5900x and Nvidia RTX 3070 Ti PC. Not really sure what I considered difficult back then. Honestly, I was pretty content trying to figure things by myself and using a search engine for more information when needed. I think the biggest unknown was what download page to use. Was pretty confused at the time! While I did read somewhere I should stay away from using the subscriptions when starting from scratch on an author or some other tag I might want, I still do use it just for that. I think the currently most confusing part of Hydrus for me might be the bandwidth rules. Checked out the about page on a booru I import from and learned that there is a hard limit of 1000 posts per request. No idea how to put that into practice so my subscription doesn't stop entirely, because it hit a bandwidth rule. Thank you for all your hard work ^^
>>16817 you change the >100% (interpolation) quality to Nearest Neighbor

(1.23 MB 3120x4160 zaghhmm7hbi21.jpg)

lightwieght linux for old processor Anonymous 06/06/2021 (Sun) 04:55:17 No. 4355 [Reply] [Last]
Really glad to see this board taking off. I want a linux distro that I can rice for my x41 tablet thinkpad. It's a pentium m, 2 gigs of ram, 1024x768 screen. I've heard some suggestions >void linux >puppy linux >debian I'm a linux noob so I don't know what I'm doing, but I'd like to learn. as far as usage I want to shitpost and maybe doodle some. I've heard some say that my browser is more important than distro as far as snappiness goes. What browser would you suggest that still has 32 bit support.
51 posts and 21 images omitted.
>>16781 well fuck you too buddy
>As the M line was originally designed in Israel, the first Pentium M was identified by the codename Banias, named after an ancient site in the Golan Heights
(28.16 KB 500x500 16620.gif)

>>16812 >As the M line was originally designed in Occupied Palestine Nothing good comes from there.

.bat file Anonymous 11/17/2024 (Sun) 22:00:43 No. 16568 [Reply]
anyone knows how to create a .bat file that kills computers? its just to prank my friend 😎🎶🤦‍♀️🤦‍♂️🤷‍♀️💖😢🎂🐱‍👤😃
I've got a bat right there that can destroy any computer, 100% guaranteed
(70.29 KB 336x310 kekd.jpg)

>>16568 >anyone knows how to create a .bat file that kills computers? Something like this?: @echo off :uji start goto uji exit What this code basically does is to open a "Command Prompt" window, hide the text output (or at least I think that's what the @echo off was for), open another console window and jump to the second line creating an infinite loop. I can confirm that it works on Windows XP, but I don't know if it still works on newer versions of Windows.

Gatekeeping Anonymous 08/21/2023 (Mon) 17:58:51 No. 12859 [Reply]
ITT we brainstorm about how to prevent unwanted influxes of newcomers that change the culture of imageboards. Preferably ones that can be implemented in a P2P way. For example: they could require a quorum of existing users to approve new users. This would probably require some sort of identity based on i.e. asymmetric crypto. But users could stay anonymous using ring signatures.
23 posts and 4 images omitted.
>>16716 I think both of you make pretty good points, newfags are fine, the problem is when it is artificial, none of us can legitimately look back at halfchan and say that what happened was organic, when it reaches the point of say, 2016 or 2012 /pol/ and /b/, the bannings are necessary, whereas if you look at all the bitching and moaning by oldfags before then, they were just annoyed that not everyone cared about desu dolls or duckrolling Also a good litmus test for whether any chan is good is whether it allows raids, any chan that does not allow raids is fake and gay by virtue of the fact and should be ignored completely
If you want to filter newfags just host it on i2p and ban any clearnet proxies.
A site/board culture hostile to tourists/non-integrators. I recall people being told to "lurk more" on /b/ even as recent as 2012 when I started visititg 4chan. Due to that I spent years just lurking threads and absorbing the culture.

(140.72 KB 1666x934 micrositios_019.png)

(49.38 KB 917x637 micrositios_011.png)

(98.85 KB 692x628 micrositios_009.png)

(238.66 KB 1513x877 micrositios_006.png)

(187.44 KB 1638x877 micrositios_005.png)

Colombia .gov.co websites source code Anonymous 06/27/2023 (Tue) 16:31:44 No. 12449 [Reply]
Hello, this is Alpha OP, the cyber security group. If you are a member of a large corporation or a government you have most likely heard our name before, and you know for sure that we don't joke around, but Colombian gov didn't think so. After trying to help them out and offering detailed vulnerabilities report to micrositios.net the developer of most if not all Colombian governmental websites they have simply refused to respond to our emails, we have then contacted every Colombian minster warning them about the risk of using such vulnerable websites and they as well ignored all the emails. So here we are doing our responsibility - to fulfill our ultimate goal of building a more secure internet - publicly disclosing all the source code we have collected, which if analyzed is very very vulnerable. Don't blame US Colombia, we had no bad intentions, we tried to help, but you refused to listen. Link to download: https://anonfiles.com/n3L8Oby9z2/Colombia_Micrositios_Source_zip You can download the file, the directory listing is not encrypted but the files are password protected, we have spent 4 months collecting this and we need compensation for our efforts, if you are interested contact us. HEAD OF ALPHA OP TEAM
5 posts omitted.
>>12945 what would you advise? onionshare? >>13041 no u
>>12449 I'm not OP but a few months ago I downloaded the archive shortly before Anonfiles closed, so I took the opportunity to reupload it at https://big.fileditchstuff.me/b26/TzdHRVXSuBkyWatctuzR.zip (if someone can re-upload it in other places so it doesn't get lost, I'd appreciate it). Unfortunately I have not been able to obtain the password since the programs I was trying do not work with it because the archive was created with a special compression method used by Windows Explorer (or some shit like that).
>>12449 >Attacking corporate faggots for doing corporate faggot shit at our expense with the willingness of the government Based >Soapboxing chuuni shit about how you don't fuck around Cringe You have reached equilibrium with your post, you're a faggot but you did something cool, thank you

(121.26 KB 1280x720 defeating-microwave-weapons.jpg)

Defeating Microwave Weapons Anonymous 06/03/2022 (Fri) 11:08:08 No. 8634 [Reply]
Ptychographic X-ray laminography: No trade secret or hardware trojan can hide https://spectrum.ieee.org/chip-x-ray Every cell transmitter, phone and computer must be inspected. Silicon Trojans must perish. Freedom for all is encroached when a few cyber terrorists can freely CONSPIRE to use microwave weapons and silicon trojans. While you are distracted with THEORY, they spread the PRACTICE: surveillance, theft, sabotage and murder. Havana Syndrome is the result of hacked cell transmitters being used as a microwave weapon. Civilians are victimized daily, children included. “Havana Syndrome: Are You Next? Electromagnetic Terrorism and Cognitive Warfare” at "https://areyounext.help". The future of privacy/security is clothing made of metallized fabric to block microwave imaging (enables theft of inner speech by observing minuscule throat/face muscle movements) and block directed energy attacks. #BadBIOS #Havana Syndrome #Conspiracy Practice #Freedom #Faraday Cage #Firmware Vulnerability #Electromagnetic Surveillance >Eric Schmidt: Our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. China has had over 30 years to plan to try to catch up. It’s really difficult.

Message too long. Click here to view full text.

15 posts and 2 images omitted.
Do you guys know anything about moldy thing that lives in nose-throat-ear, goes into your inner ear and makes them able to speak to you through some kind of device? Is it old, who uses it, and how widespread it is?
>>16662 > goes into your inner ear and makes them able to speak to you through some kind of device It also seems to make them able to listen from your ears too.
>>16499 I think the worst part would be the bodies reaction to it, electromagnetic waves are already known to cause depression, but what makes sense is the body responding to this with brain inflammation in an attempt to heal from the "injury"

(2.07 MB 2500x2500 1728929692644166.png)

Hi I need help with something weird Anonymous 10/22/2024 (Tue) 17:35:18 No. 16378 [Reply]
so my grandmother who is really sweet is currently spending 200 a month on cable tv, she cant use internet tv and shes too old to learn how basically i want to broadcast internet tv via analogue signals so she can flick through channels using a computer to bounce the signal to an old tv,how do I do this, and how do i do this as legally as possible? and to hiroyuki for adding a 15 minute countdown for not submitting to the botnet; KILL YOURSELF KILL YOURSELF KILL YOURSELF KILL YOURSELF KILL YOURSELF KILL YOURSELF KILL YOURSELF KILL YOURSELF KILL YOURSELF KILL YOURSELF KILL YOURSELF --- I posted this to halfchan and it was deleted and me banned for "not being tech related", my appeal is that the janny should kill himself, I hope I can get some help here and that janny dies painfully
16 posts and 3 images omitted.
>>16737 You might have to declare every hour manually yeah, like ads at :53 and :23, and episodes at :00 and :30, if the episodes are 23 minutes long. The top gear playlist should probably say time = 20 for 8:00p/20:00 though? I do wish I knew more to help but I don't have the time.
Also + 30 for the 7:30 programme, I'm assuming -- are comments in lua and don't run code after it. Also commas after each { } except the last in the list, like { {}, {}, {} }
>>16738 >>16739 It's unreasonable to expect you to give me a crash course in not being retarded, thanks for all the help you do give, you've answered the question and I can go from there - I can probably make something with that however pajeeted or yanderedev'd it may be I'll see if I can have ai check my code once I have a basic prototype built

war Anonymous 12/06/2024 (Fri) 07:15:03 No. 16725 [Reply]
Spread and save this content before it gets removed or I die. Here you'll find some essential knowledge about modern warfare. All content is legal and purely informative. https://archive.org/details/the-death-angel-manuals-v4 https://mega.nz/file/CMEHkABL#cyoKywJkmz-rGunOfsue5PHGe9a9xJtOCxJM4OAxBRE https://www.mediafire.com/file/jefppfptcu3zcjz/The+Death+Angel+Manuals+v4.zip/file
>>16725 Here I thought you got some cool new information about weird government shit but you're just trying to do a terrorism, hullo journalists who will inevitably end up posting here Whatever you are trying to do, doing a terrorism is not currently the solution to any problems we have, how about you take a breath and watch/wait for a while

(169.38 KB 800x1067 teacup headphones.jpeg)

Anonymous 09/24/2024 (Tue) 20:50:12 No. 16218 [Reply]
I would really like a website where I can explore ideas and ask questions without fear of censorship from governments, admins, or what I say following me in real life. Image and text boards come close, but they don't take things very seriously sometimes.
1 post omitted.
>>16230 >Glownigger >>16218 If you want change; create it I'm sure there are plenty of forums on i2p that have what you seek, if it does not exist then build it; they will come
>>16218 Do you want a website where you specifically can explore whatever idea you want to, or also other visitors can do the same? And if the latter, what if a visitor wants to explore the idea of spamming that site 24/7 with hardcore gay cee pee porn to the point of making the whole site completely, utterly unusable to everyone else? Or do you want to restrict others' (and maybe even your own!) freedom to do so without the fear of censorship by the site admin? >>16690 >I'm sure there are plenty of forums on i2p that have what you seek There are, the problem is i2p has too few people and maybe too much paranoia (which might be justified, eh).
>>16704 Be the change you wish to see, and get used to slow boards, your attention span may not like it but it's good for you

(93.97 KB 1920x1080 wp8514622.jpg)

How to create TOR websites Anonymous 12/04/2024 (Wed) 02:13:09 No. 16698 [Reply]
I've always been curious as to know how do people get to setup their websites on TOR and assign the .onion domain. The questions are: 1- How do people assign specific name in their supposedly random name in their website name (Check duckduckgo onion website address or protonmail or even Facebook and you'll always see their names as the first thing in their address, followed by some random characters instead of the usual one like 8chan.moe on .onion) 2- Do you necessary have to have a website on the clearnet, before assigning it to the dark web? If so, then how do people upload CP on a dark web website without any of the materials gets tracked to its original clear net IP address servers? 3- What's with the hate about Javascript and how dangerous can it exactly be to someone who uses TOR? I know that these type of questions you'd expect from a newfag, but I just decided to ask, instead of just blindly following whatever is being told. It is allowed to paste copypasta or any external materials to answer this thread here.
>>16698 1)Brute force. The .onion address must be random, because generating it is a part of the mechanism ensuring that no outsider can interfere in the site's workings. It is however possible, at the work of significant computational work, to generate a lot of such addresses until you get a few symbols at where you want them. A large organization can do that, especially since it's only done once and the address is then kept indefinitely (domain changes do happen, of course). Meanwhile picking the entire address string is not possible, or at least assumed to be so: being able to do that is in the same category as being able to break encryption of any other things, like banking systems. 2)No. You can create an .onion domain with no mirror in the clearnet. The next problem then is informing others of the address without that message being tied to you. This is why Tor has multiple sites that list .onion domains, and then sites that list those sites (since individual onions often do not enjoy 100% uptime). 3)The danger is real, the extent of it incredibly unspecified. There are specific research cases on using it to extract some information about individual users, but also similar research exists that uses pure HTML5 and so on. The danger is always the danger of being identified, but how dangerous JS specifically is, is a matter of debate with little in the way of clear answers. With that in mind, do consider what identification is: from the viewpoint of whoever tries to identify you, it is a matter of reducing the list of possibilities and concentrating their estimated probability on a single one. Information is measured in bits (as seen on any anonymity testing website): when working with binary possibilities (that is, either possible or not possible) cutting the list of possibilities in half means adding one bit of identifying information. When possibilities are assigned probabilities, the formula is more convoluted, and I'm not here to write a primer on information theory. Now, JS (and, say, HTML5) can be used to give more identifying information. Tor hides your IP, which often identifies you down to a single person or single PC, and Tor also hides some other pretty specific information, but many facts could be guessed about you from other data. For example, imagine that your browser has its time zone set to UTC+26:00, a time zone used exclusively by one Pacific island state because they do not want to have a full day of time difference between theit islands. There are probably very few browsers on the whole web with this time zone. A JS instruction sending your time zone to whichever data collecting group can be pretty identifying in this case, narrowing the question of who you are down to a very short list (the term is "anonymity set"). A browser has a lot of adjustable parameters, and a combination of enough of them can easily go all the way down to singling out exactly one person. Unless, of course, the browser is specifically designed to be used with almost entirely the same set of parameters (like Tor Browser is), and you do not change them. And that's still not all. A big thing in the "use JS to identify users" research is tracking your keyboard and mouse usage. Statistics on your pauses between keypresses seems to be quite damningly identifying if collected is large enough quantities. Same with mousestrokes. I do not know enough about research on these to give you an account, but it worries people whose opinion I do value, and so on and so forth. One additional notion to mention is pseudonimity. This is when a group collecting visitor data over many different sites (what both Google and Cloudflare do) can can be reasonably sure in stating that several visits, on maybe different sites and at maybe different times, are all done by the same person, by comparing browser data, other identifying data, and even browsing habits, without being able to out a name and a face to the visitor, besides "unknown user #1488". Tor can hide your identity, but your data, behavior, and writing style can still make you pseudo-identifiable to people, to data collection algorithms, and now to still-experimental setups using AI to analyze users. God know imageboards have enough "anons" easily recognizable by other board or thread regulars.

Vintage/retro/old computing and retro computer emulation and gaming Anonymous 07/01/2024 (Mon) 17:06:03 No. 15472 [Reply]
I mostly wanted to make this ask if there is a good internet database for old computer hardware. But also to genuinely know if you anons would ne intrested in this thread added on emulation too because that's one of the few experiences with older computers Do you also anons have any old or even retro to vintage computers?
6 posts and 5 images omitted.
Were Polygons a mistake?
(420.44 KB 960x698 Desktop.jpg)

(609.65 KB 872x960 Laptop.jpg)

(434.41 KB 960x698 Phone.jpg)

(413.78 KB 960x698 Portrait Desktop.jpg)

(310.11 KB 960x698 pre-iMac.jpg)

>>16283 Not as good as these (never released).

(87.93 KB 1700x1062 vpn_safety-610629869.jpg)

What VPN allows to post on 4chan? Anonymous 09/19/2024 (Thu) 22:11:44 No. 16174 [Reply]
Free or paid. Does 4chan blocks anything that's not a regular IP? Can you choose your location in /pol/, evade ban and rangeban? Create threads without the timeout etc.
5 posts omitted.
Bump 3
>>16314 Most ukrainian IP ranges are banned on 4chan. Some years ago I had to buy passcode just to post from ukrainian IP. Last years I've been buying it to post from VPN. Works for any IP. 4chan isn't worth buying passcode nowadays though. I just foung this place because I got too sick of 4chan again.
>>16174 > Can you choose your location in /pol/, evade ban and rangeban? I'm able to choose location in pol with passcode, it can't be used to to evade bans though, any moderation actions become tied to your passcode instead of IP.

(17.16 KB 474x253 th-2382814816.jpeg)

Connect to Tor Anonymous 05/10/2022 (Tue) 14:22:14 No. 8395 [Reply] [Last]
What is the safest way to connect to the Tor-Network? Is this the safest possible way: Tails (VM) -> VPN -> Bridge -> Tor-Network
48 posts and 1 image omitted.
>>16479 That's all fun and games until you realize it is 100% a fed exit node. Only government is allowed to do stuff in Antarctica. No one goes there without a government permission
>>16498 "Only government is allowed to do stuff in Antarctica. No one goes there without a government permission" Well, yes and no. I worked there for a year as a contractor. The private company I worked for had a contract with the federal government to perform specific work and they hired private citizens to complete that work on a contract basis. I was not a direct government employee. There are many companies based there and each have their own networking infrastructure though I never learned if we all share the same satellite connections or if each company had their own. That said, I could so a lot on our network. I don't think I could have gotten away with having a tor exit but did used tor when I was there. Most things we could do here we could do there.
>>16600 >No one goes there without a government permission <Wrong, I went there as a private citizen with government permission!

[ 1234567891011121314151617181920 ]
Forms
Delete
Report