[ / / / / / / / / / / / / / ] [ dir / b2 / cyber / dempart / freeb / sonyeon / sploder / vg / vichan ]

/tech/ - Technology

Catalog   Archive

Winner of the 83rd Attention-Hungry Games
/strek/ - Remove Hasperat

May 2019 - 8chan Transparency Report
Comment *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Show oekaki applet
(replaces files and can be used instead)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 3 per post.

File: 8091ec3167eeadd⋯.jpg (102.43 KB, 1600x900, 16:9, skynews-facebook-study_469….jpg)


Facebook is launching a new app called Study which will pay users for their data following a series of scandals about the way the company acquires and handles users' data.

The company was criticised earlier this year when it was revealed to have paid children as young as 13 to install software on their phones which allowed it to collect data on how they used its competitors' apps.

Facebook disputed that the app "spied" on users as they had consented to its terms which allowed it access to every bit of activity on a phone - and participants were paid.

It added that parental consent had been received for the children who installed it.

The controversial programme was shut down following outcry over the app, which was only available on Android phones.

Apple had previously banned Facebook's market research app Onavo, which the social media company acquired for $120m (£91m) in 2014.

It has been reported that it was Onavo which allowed Facebook to spot the enormous growth in WhatsApp before acquiring it for $19bn (£14.5bn) just months later.

7 posts and 1 image reply omitted. Click reply to view.


>users as they had consented to its terms which allowed it access to every bit of activity on a phone - and participants were paid

Boo fucking hoo then. If you eat at McDonalds its not their fault you are a fat piece of shit.



> ifunny.co



It's not the same. Brave ads don't track you. This is, instead, the biggest fucking tracker you could install.



Fuck off with your

>muh terms of service


There's a reason you don't let a heroin seller into a school. Not all people have the intelligence to resist harmful temptations. The person who falls for that could be your mom, your wife, your brother. Plus the lack of privacy becoming normalized makes life harder for the rest of us too.



>Brave ads don't track you.



File: 66e133090532f4d⋯.png (69 KB, 188x266, 94:133, product-box-KISMD.png)


hi /tech/ , im looking for a anti virus software because im autistic and only had Malwarebytes Premium the whole time thinking its an anti virus program as well as anti malware. recommend any? 2 computer engineers i know suggested using the free version of Malwarebytes and to pay for Kaspersky

13 posts and 2 image replies omitted. Click reply to view.



Even once BSD is installed you will NEVER have a gui.

If you can somehow start X you will become frustrated with the inability to have a working mouse cursor and forget having a functional window manager



Install Guix System and clamav on it.


>im on windows 10

So you're using malware as your OS, but you want to have anti virus?



Linux is just a kernel, whereas GNU/Linux is the system.


Antivirus is unnecessary. It can't protect you against driveby exploits and executables that you don't run can't attack you and you can just upload them to virustotal.com


File: 8f60bc612a0bb13⋯.webm (10.48 MB, 480x270, 16:9, typical wangblows antivir….webm)



By installing Gentoo

File: 71ef447c626d33b⋯.jpg (71.85 KB, 687x416, 687:416, keyboard-uninstall.jpg)


I'm tired of the usual:

apt-get remove --purge packagename

And every OS but Linux seems to have a thousand third-party uninstallers.

Before you ask me if I live under a rock, I mean is there something that's like GDebi, but with the opposite functions?

Should we make one?

10 posts and 1 image reply omitted. Click reply to view.



ffmpeg is for transcoding, not editing. it does not replace davinci/vegas/premiere/avid.

imagemagick does not replace gimp/photoshop/krita.



Synaptic Package Manager is what you want




> Reddit




>why would you want to have a GUI uninstaller?

Synaptic makes it easy to see which packages are no longer needed, after uninstalling something. For example, when you uninstall a game, Synaptic will tell you if you can now safely remove SDL, OpenAL, a bunch of gay fonts, a dozen libs etc



Would be funny to see the anti-GUI fags draw using the command line, haha. Also, GUI game engines are pretty irreplaceable for game devs.


Full of cringe and fallacious arguments.


>The DEF CON staff and I have mutually agreed that the DEF CON conference will be canceled this year and we will not be hosting future conferences. DEF CON has been an incredible experience for myself and many others and it is very difficult to make this announcement. But, it is time for us to move on to bigger and better things. Over twenty years ago, I organized a party for a small group of friends. That simple get-together spawned what is now the largest and most well known hacker convention. As I said, that was over twenty years ago. Myself, the staff and all the others that have contributed to making DEF CON what is have done a lot of growing, made careers, built businesses, started families. We're not teenagers with enough time on our hands to organize parties for our friends, let alone 10,000 of them.

>I'm sure you've noticed that some of our key staff have retired. It is very difficult to find replacements. The amount of time, frustration, sweat and tears involved makes it a job few will take on. I've considered passing the conference to a younger generation, one that has the time and energy to run it. But, it is just too large and complex for a green crew. I think that it is more fitting that we retire DEF CON now, while it is at its best, than let it collapse under its own weight.

>I've created this site to be the official announcement page. The existing DEF CON site, while it may still have activity, will be archived and retired. Discussion boards will be closed. It is important that we preserve what DEF CON was and its influence on the security community.

>I would like to take a few paragraphs to discuss how we should move forward in a post-DEF CON world and I think it is important for hackers to understand how the security landscape, and the Internet as a whole, has changed over the past few years.

>As I mentioned, all of us have grown since DEF CON started. As you grow, you to start to see the world in a more complex and maturePost too long. Click here to view the full text.

11 posts omitted. Click reply to view.



This year will be the first time I am actually able to go to it, and the first convention I will actually attend. I hope it isn't really like this.



I've been rused


File: 34db8e4e0f2e1e2⋯.jpg (93.05 KB, 962x773, 962:773, thumbs_up.jpg)

This is a good example of people reading the headline and replying.

Also why I prefer smarter smaller communities like iswc.pw

Go look at the source code


Congratulations you found the secret message! You're so smart.

Get over it, this is a parody/joke. This is *satire* not to be confused

with my actual beliefs in any way

Apologies that I ripped the art from the actual Defcon page.

Cancellation of Defcon is a loooong running joke. Read the Defcon FAQ.

DT is a really nice guy and he would never say these sorts of things. Or would he?

Nah, I'm sure he wouldn't.

This is not part of a contest - Yawn. Coffee Wars was the only good contest.

This site has been up for many years and I haven't changed the "letter". Yet, I think the

satire still rings true, sadly.

If you thought this was mildly funny you can buy me, Gurney Halleck, a beer.

If you didn't, sorry no refunds.

Have a good time at Defcon.

Go rock out to https://youtu.be/Ny1nM8H6Is4





>that message




File: 116247876cd1272⋯.png (90.83 KB, 734x452, 367:226, passwordcracker.png)


I decided password recovery / cracking would be a good subject for starting people on security related topics. For you complete /newfags/ a hash is pretty much a one way cryptographic function that in most cases is not reversible. In any modern authentication a password hash is stored rather than a plaintext password.

When you punch in your password on a web application to login the application takes your plaintext and feeds it to a cryptographic function then checks to see if it is equal to the stored value if it matches then access is granted. This way the application can function without every knowing your password.

Purpose of cracking a password hash. Recover a plaintext password user who forgot his password. There are a ton of application that can do this and I will discuss some of that later. Right now I just want to drop the basic concepts.

I'm going to do a dictionary attack against an MD5 hash for demonstration purposes. I'll go over the steps. It's actually pretty simple.

Legal disclaimer. Don't break into other people's computer systems or networks unless you have permission. You put on your own pants in the morning and you know the difference between right and wrong. If you don't know the laws where you are at look them up or consult an attorney before penetrating computers or networks that you do not own.

Alright let's have some fun.

import sys
import hashlib

myhash = sys.argv[1]
thehash = myhash.strip()
dictionary = sys.argv[2]

with open(thedic, 'r') as fa:
for pwd in fa:
newhash = hashlib.md5(pwd.encode("utf-8")).hexdigest()
print 'Trying password ' + pwd.strip() +' ------> '+ newhash.strip()
if newhash == thehash:
print '\n\n\n\nPassword Found! '+pwd.strip()

27 posts and 2 image replies omitted. Click reply to view.


Can we "crack" hashes by sending FOIA requests to a certain place in Utah?



Makes sense, even though the post is kinda old.



>basic dictionary or brute force attacks

You're the reason programmers are mocked.

<why u say that :(

It's God awful monkey code that's been done a million times. Create something novel.



>I'm going to do a dictionary attack against an MD5 hash for demonstration purposes. I'll go over the steps. It's actually pretty simple.


Point in case. There are known better methods to get md5 hash.



Anyone can do a fucking dictionary attack. It's simple, but slow to execute. There's better ways to crack weaker algorithms like md5 or SHA1.

File: c27c1c7b9691ecd⋯.png (375.96 KB, 800x1066, 400:533, dust.png)


Post some of the worst PC's on the interwebs... Like properly rage inducing shit.

6 posts and 1 image reply omitted. Click reply to view.



<Didn't I already have this before?

Completely different meaning.



there is no "we" , just me and you, faggot. You're not apart of something because you typed in "8ch.net/tech/" into your address bar. There's no such thing as "community", just a strong individual leading a flock of weak individuals. Do yourself a favor and get rid of the reddit-tier herd mentality now before it's too late. Or >>>/goback/ to /g/.



>just me and you

You mean us? We?



Nigga this isn't someone trying to get a raid. i'm asking a question. Calm your tits.

Also I've been here long enough to see newfags constantly making new "rules" about how people have to speak to be a "real 8channer" and I just don't care at this point.


>There's no such thing as "community"

And people wonder why this place is fucking dying jesus christ.




File: 612f535f646d3d4⋯.jpg (52.11 KB, 650x433, 650:433, 000000066789.jpg)


French faguette here

Our national cybersecurity agency just released a open hardware USB hard drive disk. It also automatically encrypts itself.


Open hardware is rather hard to make, do you think that it will come from our governments ? Will it be trustable if another vendor sells it ? As it's open harware, they could easily modify it to spy on you.

So, is it a good thing or not in your opinion ?

9 posts and 1 image reply omitted. Click reply to view.



TPM would be absolutely fine if we had control over it by default via some kind of hardware key bundled with every mobo, we could flash it, its firmware was completely open source. Imagine being able to boot Windoze, but completely cucking its access to LAN, drives, other partitions, or even certain ranges of memory addresses.



It's not a flash drive, it's a hard drive disk with USB. It should be safe imo



>It also automatically encrypts itself

Too bad it's illegal in France to encrypt anything at all (you have to give up the password, or you'll simply end up in prison until you give it out).

Now, an open source HDD that auto-encrypt, sounds too good to be true.


This fucking pic kek


>Will it be trustable if another vendor sells it ? As it's open harware, they could easily modify it to spy on you.

The openness of hardware is orthogonal to trust. This will always be true so long as you can't verify the hardware without destroying it.



>French faguette here

>Our national cybersecurity agency

Go back to making baguette.

File: 45a6b0ef6bff1af⋯.png (1.36 MB, 1918x1079, 1918:1079, asdf.png)


Tonight I decided to quit gaming and install Solus.

Am I a giant faggot?

Should I have just installed gentoo or BSD?

18 posts omitted. Click reply to view.


Just get a different taste in games. You don't need a gaymen computer to play good games, you could pick up a PS2 for cheap or like a super famicom.



Or emulate the ps2

anon@gentoo ~ $ emerge --search pcsx2

[ Results for search key : pcsx2 ]

* games-emulation/pcsx2
Latest version available: 9999
Latest version installed: 9999
Size of files: 0 KiB
Homepage: https://www.pcsx2.net
Description: A PlayStation 2 emulator
License: GPL-3

* games-emulation/pcsxr
Latest version available: 1.9.94-r2
Latest version installed: [ Not Installed ]
Size of files: 2,570 KiB
Homepage: http://pcsxr.codeplex.com
Description: PCSX-Reloaded: a fork of PCSX, the discontinued Playstation emulator
License: GPL-2 public-domain

[ Applications found : 2 ]


This sub is filled with video game playing manchildren.


File: 0033b48b3297a5b⋯.png (12.6 MB, 15000x8640, 125:72, 2019-06-12-233323_15360x86….png)

Get Retroarch, Wine, Dolphin and PCSX2, problem solved.



Solus is a nice distro. I see nothing wrong with this.


>Adobe is warning some owners of its Creative Cloud software applications that they’re no longer allowed to use older versions of the software. It’s yet another example of how in the modern era, you increasingly don’t actually own the things you’ve spent your hard-earned money on.

> Adobe this week began sending some users of its Lightroom Classic, Photoshop, Premiere, Animate, and Media Director programs a letter warning them that they were no longer legally authorized to use the software they may have thought they owned.

>“We have recently discontinued certain older versions of Creative Cloud applications and and a result, under the terms of our agreement, you are no longer licensed to use them,” Adobe said in the email. “Please be aware that should you continue to use the discontinued version(s), you may be at risk of potential claims of infringement by third parties.”








https://www.youtube.com/watch?v=xhS_zGPost too long. Click here to view the full text.

157 posts and 20 image replies omitted. Click reply to view.




Personally, I recommend combining both of them (GIMP and Krita).



>doesn't already have FFmpeg installed

What the fuck do I need that for? Just because it's decent software doesn't mean I have it installed on every computer in my life.


It doesn't fix anything and actually adds not one but two new problems into the ever expanding list of half assed shit in Krita; since it now creates a new temporary layer every time you create a selection, the layer list keeps shifting up and down and messing up your perception of where a specific layer is. And since they don't know how to optimize anything (pixel rendering vectorization added by some intern-tier guy so it doesn't count), it's so fucking bloated that there's now like half a second delay before you can do anything after making a selection which keeps interrupting me constantly and requires me to adjust my muscle memory to compensate for that lag.



If it's that serious, just go to this site to file your problems and complaints:

https://ask.krita.org/ (it's down for some reason today of all days)

They take it a lot more seriously than you think, but it's not going to go anywhere if you keep your yap shut.



Last time I wanted to tell them about the things they're fucking up I was told to make an account or something and enable jewgle captcha.

In other words;




The problem is just you.

File: 6c96d6792812717⋯.gif (2.71 KB, 300x300, 1:1, 3C61C22B-AB5E-414D-8049-AF….gif)



>To give processes access to their entire 4 gigabyte or 18 exabyte address space, OS X uses the hard disk to hold data that is not currently in use. As memory gets full, sections of memory that are not being used are written to disk to make room for data that is needed now. The portion of the disk that stores the unused data is known as the backing store because it provides the backup storage for main memory.

>Although OS X supports a backing store, iOS does not. In iPhone applications, read-only data that is already on the disk (such as code pages) is simply removed from memory and reloaded from disk as needed. Writable data is never removed from memory by the operating system. Instead, if the amount of free memory drops below a certain threshold, the system asks the running applications to free up memory voluntarily to make room for new data. Applications that fail to free up enough memory are terminated.

>Unlike most UNIX-based operating systems, OS X does not use a preallocated disk partition for the backing store. Instead, it uses all of the available space on the machine’s boot partition.

I found this approach to memory management intriguing because of how much it differed from standard Linux/Windows use of swap and virtual memory

The tl;dr is this;

>OSX does not use swap per se but rather treats the entire main storage as a giant backing store

>In iOS Inactive data is never sent to the backing store since iOS doesn’t use one, instead, even if RAM is getting full, the OS asks applications to free up data (how this happens seems to be up to developers) and if the application cannot it is terminated as if there is an out of memory condition, read only application data is never loaded into memory, thus keeping RAM free for dynamically loaded assets at all times

Post too long. Click here to view the full text.
52 posts and 1 image reply omitted. Click reply to view.



Oh right, I forgot:

>the latter was designed for HLLCAs

This is factually wrong, CL forwent several features specifically because they would be hard to support outside of Lisp machines. I really wonder what compulses retards to form strong opinions on things they have no idea about.



>equating latency longer than sending a packet around the world to a boring paintjob

>stop larping


>Are you just throwing random shit at the wall to see what sticks?

Nope. You might want to work on your reading comprehension.


CL forwent several features specifically because they would be hard to support outside of Lisp machines.

And that's called a concession.


File: efb632e0665915f⋯.jpg (90.94 KB, 403x403, 1:1, seriously nigger.jpg)


>if it's in there, it's a shit language because nothing supports it, if it's not in there, it's a shit language because it lacks that feature


File: 45373c9664ba8d6⋯.png (11.71 KB, 96x201, 32:67, smugbird.png)


I can't even call that a good strawman, it's just trash.



Shitty replies for shitty posts.

File: b05f4201edcf903⋯.png (36.96 KB, 400x249, 400:249, zfs-linux.png)


What's more, they tried to hold a fake discussion about it to show how everyone likes the idea, after the thread goes south, they lock the thread and push the commit anyways, because your opinion doesn't mean shit, I have a blue hair cat lady I need to score good boy points with.


27 posts and 5 image replies omitted. Click reply to view.



>complains about backdoors

<uses OpenBSD



File: 1c08ffeb88523bc⋯.jpg (109.86 KB, 960x778, 480:389, 8b16e04872a410b8bc6b408702….jpg)


I'm not that anon but I use LVM + XFS and it just fucking works.

I'm waiting on redhat's VDO to be packaged on my distro and then I get compression and dedupe, which unlike the ZFS implementation of the same features, are already known to take next to nothing in resources under VDO, and can be used with any filesystem or volume manager you want or fill your needs, ensuring good software development pratices and allowing market competition.

I'm also currently trialing ZFS. No issues so far, but I haven't really shat on it to see how it reacts. I like the way datasets work, it feels weird to not have block devices, but you don't really need them, though that means simple operations like cat'ing a block device becomes a slightly more complicated undertaking which involves using some zfs-only commands that are more "featureful" but just different ways of doing the same thing. Do note that block devices technically exist under zfs' volume manager, but you're not supposed to use them for zfs filesystems, they're so you can stick a foreign filesystem such as swap in zfs' volume manager (but you require the full ZFS suite to use just the volume manager, and the filesystem itself is stuck to their volume manager and can't be separated from it).

Whenever you spot a ZFS user in the wild though, make sure you point them out the flaws of ZFS. They'll start fuming at their mouths and spouting buzzwords they heard on hackernews. Something like:

>I don't see why they lock you to their implementations of certain features which are easily modularized and may be better implemented elsewhere




Post too long. Click here to view the full text.


And another thing. I'm not saying companies are the pinnacle of competence, but consider that ZFS has an adoption rate of next to nothing, yet it presents these data integrity features no other filesystem is capable of, and even still, many large scale companies manage to have a perfect track record with their data without touching ZFS and sticking to "standard" tools.

It seems ZFS has all these fun things, but does not bring end results you cannot get elsewhere, and elsewhere involves using higher quality standardized and simplistic tools which work for all sorts of different purposes while performing better.


I don't doubt that there are backdoors present in either of NetBSD and OpenBSD, but I don't have a confirmation that the developers of either are juden and they have shown good behavior before, so I think that they will be fixed once found.

OpenBSD's lead even went public with it the moment a cianigger said he backdoored the OS.

FreeBSD however, glows very much. Stay away from it.


I used to use "fun" filesystems, then some day I realized it's a waste of my time and often causes more problems than it fixes. I now just use ext4 for mechanical drives and f2fs for flash, and I'm not even sure that makes any measurable difference. I don't even look at the options. I have simple backup scripts employing standard tools like rsync - The ready-made solutions always suck because you'll have to wrap your mind around what some rando soyboy thinks is a good backup scheme. No problems. Everything just works.



the one unique feature's the data deduplication

which basically means it's smart enough to not write the same thing twice. which saves you assbags with certain data sets in datacenter type situations. But if you're doing that just by the hp or dell appliances they have there own fs's that do this.

File: a59c9d193b5e7ab⋯.png (1.32 MB, 1440x1080, 4:3, pro2.png)

File: 82f221e080e3822⋯.png (1.44 MB, 1440x1080, 4:3, pro3.png)

File: 0e848508936eb5c⋯.png (853.44 KB, 1440x1080, 4:3, pro4.png)


Hi, I would like to identify some programs used to create Anime. I saw behind the scenes how the 5 episodes of 6HP (6 Hearts Princess) were made and I was left wondering which programs they used. I understand that many animation studios use Retas Pro HD, but the programs used in the documentaries I could only identify Photoshop.

If someone can identify these programs, it would be very helpful for all those who like animation and want to be clear about the "Work flow" of the process.

9 posts and 10 image replies omitted. Click reply to view.



There's a million tutorials online, thank me later...



>pure propaganda


This. It's used by Studio Ghibli.



Watch the Shirobako anime, it explains the whole process.



image 'pro17.png' shows 3DSMax, I can recognize that dinosaur from a mile away

the first image shows the modeller taking measurements of the scene and the third is Maya's 'hypershade' module for, you guessed it, shaders and effects.

As far as I'm aware when it comes to 2D, western studios use TVPaint, Koreans and Nips use CACANi and Celsys packages.



OP here ,Thanks that was a instadownload. trying it right now


I have downloaded and it rest in one my external hard drives. Going to watch it later.


Many thanks, that was very informative. Going to work in learning those programs

File: 70630d3f66e21de⋯.png (4.25 KB, 225x225, 1:1, index.png)

File: e92e5cf6f597f35⋯.jpg (60.21 KB, 600x450, 4:3, clean_ceiling.jpg)

File: 42381f585d896bf⋯.jpg (70.21 KB, 1024x768, 4:3, FKO685KHVGXNSMW.LARGE.jpg)


I got a dumbass ingenious idea, hear me out.

Seeing how you can't trust a VPN to save your soul and how I have a couple of old routers just lying around I got a gnarly idea of making my own VPN and then hiding it in the ceiling tiles of my old local supermarket bathroom whilst hooking it up to the lighting 220 volts.

Basically one afternoon of fucking around on OpenWRT, making clamps (well insulated for me) to clamp onto the light in the ceiling tiles and basically have my own "free" VPN that I connect to through Tor.

Might as well buy a new router, hand in cash to local selling app fucker just to make the serial number that less traceable to me.

Whatchu think?

That or the library.

(btw all pics are for reference, I aint putting any info on here)

9 posts omitted. Click reply to view.



cool story bro



Actually, you need to go Tor -> VPN -> Tor -> Other VPN -> Internet



Park outside the supermarket.

Why is this so hard?


This sounds a lot easier than just hacking one of the dozens or hundreds of wifi APs in the area.



Already stole passwds from my neighbors and hacked a few more, I just want more lee-way

File: 9b5be737aea26fb⋯.png (1.18 MB, 1280x720, 16:9, ClipboardImage.png)


Why is there such an increase in shitty "day in the life of a female software engineer" videos?

Literally NONE of these videos show anything related to software engineering or programming.


10 posts and 1 image reply omitted. Click reply to view.



>implying that's in any way out of the ordinary in burgerstan



Because they're no good at actually writing code. Rather than firing them (and suffering the woke backlash), their role devolves to meta issues and personal blogging about "my life as a developer" instead.


File: 5d8a90a289e883f⋯.png (81.09 KB, 243x277, 243:277, bewbs.png)



I see vegene as well :D



>Why is there such an increase in shitty "day in the life of a female software engineer" videos?

>Literally NONE of these videos show anything related to software engineering or programming.

Because tits.

File: 474ba0555c1140c⋯.png (198.04 KB, 1272x863, 1272:863, Screen Shot 2019-06-08 at ….png)


There is a profile on twitter spamming coded messages every couple minutes. People over at 4chan were seeing if terms like milkshake had any coded pedo-meanings and found this account that way. They think it has something to do with pizza gate. /pol/ told me to come here for help.

Any good autists here?

16 posts and 3 image replies omitted. Click reply to view.



> coded messages



Well it could possibly be one of them Arduino-bots tweeting sensor data from a pot operation. https://www.instructables.com/id/Twitter-controlled-Arduino-Outputs-no-PCLCD-Disp/




stfu ahahahahahahahaha



>coded messages

>pedo codes

No you retarded boomer. It's most likely a c&c account for some botnet using uuids to identify compromised computers, the random phrases before the uuid are most likely just random phrases to avoid the bot from being filtered.

Or you could just look at the client being used and realise it's actually just an internal Twitter bot that's used to test search, depends how >>>/x/ you are.



I knew it.

Delete Post [ ]
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18]
| Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / b2 / cyber / dempart / freeb / sonyeon / sploder / vg / vichan ]