[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Archived threads in /g/ - Technology - 1642. page

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

File: Surveillance.jpg (45KB, 730x270px) Image search: [Google]
Surveillance.jpg
45KB, 730x270px
CH1: Intro

have you ever thought they call certain people 'terrorists' as an excuse to examine every detail about that person without needing to get an actual warrant or ever nee to prove to an impartial judge that there is indeed a need for said warrant?


Lets suppose that there is a government's quasi-secret intelligence contractor; one that has known access to the PRISM system which collects information on everyone in America; we'll call this fictional entity Cyveillance Inc., a subsidiary of the also fictional LookingGlass Cyber Solutions, from the fictional country of Arlington, Virginia.


Lets suppose this totally fictional entity is following a somewhat poor lead, but investigating it like they do any other, assuming its real.


Lets suppose that this intelligence contractor already has a bit of a bad reputation and a known history of abusing their powers and hacking into peoples personal pc's, devices, etc...


Lets now suppose that they happen to hack into a totally fictional person's social media accounts, dropbox, etc... looking for information. This person begins to notice something is amiss, but doesn't know who to blame.


Lets now suppose that this totally fictional person decides to set a trap for whatever totally fictional entity that has been hacking into his personal accounts.


This totally fictional person gets an idea: a link directing anyone who clicks on it to a blank website who's only purpose is to log's IP and device information of those who visit it... a totally secluded website freshly created only hours before and only accessible by means of a direct link..

He names this website "www.ijustfiguredoutwhoyouare.info"... but since that is a little too obvious the story's protagonist runs it through a link shortener to change is to something like short.lnk/AF0D3C4A
15 posts and 2 images submitted.
>>
>>61316284
So suppose the employees of this fictional contractor happen to click on it using their personal cellular devices, and while viewing a blank webpage they notive something is amiss themselves and forward the link to their headquarters in the totally fictional county of Arlington, Virginia, where the employees there use the work PCs to access the website to better investigate what is going on.


If this were to happen this totally fictional person would gain not only the employee's personal cellular MEIDs, makes, and models belonging to the phones used to access said hyperlink, but also several IP addresses which happened to be owned by the aforementioned contractor, Cyveillance Inc....


Now suppose that this person calls this contractor and puts them on the spot. At first they deny. After some explanation of what has just occurred this totally fictional person is told "We cant discuss this with someone who is not our client" and abruptly is hung up on.
>>
>>61316285
CH2: Shit Gets Good:


Within about 2 days of this person confronting this contractor, a neighbor is paid to install a WiFi repeater in their home which is then used by said Intelligence contractor to hack into this person's home Internet. It serves as an access point which is close enough to the protagonist's home internet that it can connect. They not only access the protagonist's home WiFi internet but begin to run exploits on every windows machine in the house, gaining remote administrative rights.


This fictional person notices that there are active VPN tunnels on his machine, and begins running a Network Monitor tool, which logs all internet traffic to a file. After beginning to log all network traffic this person begins doing the best he can to fight off whoever the currently unknown hacker is.


After about two days of booting devices off of the network, closing attacker's VPN tunnels, etc... is has become painfully obvious to Cyveillance Inc that this currently inexperienced network security professional, and this story's protagonist, is fully aware of an intruder's presence on the network and is actively fighting them off to the best of his novice abilities.


Then, he sees something quite astounding: thousands upon thousands of IP addresses connect to his computer simultaneously, making it nearly impossible to discern who is doing what on the machine.


A literal bot-net has connected with the protagonist's home PC. IP's from all over the world. Malaysia, Sweden, UK, Austalia, Germany... All the data on the computer starts getting sent somewhere else. The disk audibly drive spins up at 100% usage, the network activity is maxed out. Worse yet, somehow, the command line terminal stops working; windows commands the protagonist had just been using like 'netstat' begin to return 'unknown command'. Anything this person tries to save locally is instead saved to a network location somewhere else.
>>
>>61316292
Not knowing what to do, this person unplugs the ethernet cable from his computer. In the last few minutes alone over 700MB of information had been taken from the computer and sent somewhere. But where? He can only tell that it was sent to the other side of a VPN tunnel.


This person decides to burn every network log he had captured over the previous two days onto a DVD. In fact, he burns several copies of it. The protagonist then distributes them everywhere he can so that should anything suddenly happen to the person he could be assured there will be at least one surviving copy to tell what had really happened. People this person had not talked to in years unknowingly received copies. Even the local newspaper received one.


So this totally fictional person contacts lawyers and tries to build a case,but there's a problem: The IP addresses and cellular information is intriguing, but the real damning evidence, the network logs may as well be in a different language.. indeed, they are in a different language: binary.


These network logs are not at all user friendly or easily understandable as they are a capture of all of the raw network data which has been transmitted. Literally a collection of binary packets. Even with the assistance of modern software analysis tools they require a literal computer scientist to make sense of, which the protagonist at the time was definitely not, and didn't personally know any.


In the end this fictional person couldn't quite make a damning case for something this radically unheard of, the suing of a nearly-secret government contractor with hard network evidence that may as well be written in Sumerian due to the difficulty of understanding it.


So instead this fictional person begins to spread word about the aforementioned contractor (Cyveillance Inc) all over social media and begins to air their dirty laundry the best this person knows how.

Hi /g/, GUI pro user here. Don't scoff, you need people like me. We're the ones that would sell your mom that Ubuntu laptop someday. And your mom needs to buy it for your dream to come true.

Speaking of that. Here's the problem with Linux on the desktop. See this screenshot? It's beautiful! Comfy, whatever. But it's a screenshot.

You try using this for an extended amount of time. It's not polished, and it eats away at you. The problem is not having shiny icons and pretty colors. The problem is those little bits of UI subtlety that are developed over decades on other operating systems. This never happened on Linux as every DE reinvents itself every few years.

It's always the little things.

Take workspaces for example. You want to drag a window or a file to a different workspace. How do you do that? On a Mac (and Openbox for that matter) I can hold the item with my mouse while switching to another workspace. Intuitive. Doesn't work in GNOME! Why?

Next, how about just downloading something? Download file. Click on file. What happens? I'm still looking at my browser. If I'm lucky, I get a "XYZ is ready" notification. Cause and effect - click on file, see file.

Or imagine navigating a tree without a mouse. What key do you press to expand a tree? Right arrow. Doesn't work in any GNOME app I tried! Why?

It's especially bothersome with me because with Openbox I can at least partially wrestle the GUI into submission through sheer willpower and a lot of shell scripting, but with GNOME it's essentially "take this shit or get out." Same with Elementary.

Are sane defaults really that hard? GNOME and EOS devs are trying to be Apple, but they do not know what made Apple great. All that spiel about "thinking different" and "magical experiences" and "just working" Is not just a joke. It's rooted in fucking understanding that good design is not just pretty icons, but also good experience while using the thing.
14 posts and 2 images submitted.
>>
>>61316229
>not your personal tech support
>>
>>61316264
You won't be able to fix this anyway.
>>
I blame open source software. Proprietary is simply better thanks to the profit motive.

File: adios-hola.jpg (39KB, 1200x327px) Image search: [Google]
adios-hola.jpg
39KB, 1200x327px
what vpn do you guys recommend on using? everything is shit today
9 posts and 1 images submitted.
>>
>>61316227
Private Internet access
>>
Perfect Privacy
>>
Are there any VPNs you can use on 4chan?

Help

The hinge that connected to the casing for my laptop and the laptop itself has broken. the plastic has literally broken in pieces. is there any way to fix this? I can't even close my laptop, and the warranty on it expired months ago.
16 posts and 4 images submitted.
>>
It's portability days are over. Buy an external monitor (~$10 at surplus outlets) and plug it into the video out. Bam you now have a perfectly good desktop.
>>
Your best just to rip the whole screen off and to buy a external monitor like anon said.
Unless you don't mind not being able to close it.
>>
>>61316222
Well, I need a laptop or desktop if i want to pass through college, so that seems like my only option, unless I rip the screen off this one, sell the computer alone, and get a new laptop or desktop (preferably desktop) for college, gaming, drafting, design, etc

Clearly the best mobile OS and mobile device combo on the market.

Any naysayer is just doing it to rustle peoples jimmies.
25 posts and 1 images submitted.
>>
>>61316156
It's great if you want something that is secure and just werks. If you're wanting it to be more customizable, however, you'll feel extremely limited by it. The hoops you have to jump through just to add a new ringtone that you made is pretty shit, for example.
>>
>>61316175
>customizable
>ringtone

Why do 99% of Gaydroids look ugly then?

And ringtones are 2005, go kys.
>>
>>61316175
In my experience, Apple products are further from "just werks" than any other products on the market.
>>61316238
Because taste is something that can differ between real people. Not that a sheep like you would know, since the only taste you have is the one tim cuck tells you to have.

File: dpt 2.png (890KB, 1550x1123px) Image search: [Google]
dpt 2.png
890KB, 1550x1123px
Old thread: >>61312355

What are you working on, /g/?
313 posts and 27 images submitted.
>>
best way to learn OpenMP?
need to learn it
>>
>>61316148
openMP is dead, learn chapel.
>>
>>61314126
Significantly larger, but also 5-10 times faster. Keep in mind C can't just print data structures like python, so comparing the entire code size is kind of unfair.
int cmp(const void *ap, const void *bp) {
int a = *(int*)ap, b = *(int*)bp;
return (a < b) ? -1 : (a > b);
}
void* generate_primes(int end) {
char primes[end];
memset(primes, 0, end*sizeof(char));
void *set = 0;
for(int i=2; i<end; i++) {
if(primes[i]) continue;
int* p = malloc(sizeof(int));
tsearch((*p=i, p), &set, &cmp);
for(int j=2*i; j<end; j+=i) primes[j] = 1;
}
return set;
}
char is_circular(int n, void *set) {
char str[32];
int l;
sprintf(str, "%d%n", n, &l);
for(size_t i=0; i<l-1; i++) {
str[l+i] = str[i];
str[l+i+1] = 0;
int c = atoi(str+i+1);
if(!tfind(&c, &set, &cmp)) return 0;
}
return 1;
}
void show_circ(const void *p, VISIT x, int level) {
static void* set = 0;
if(level == -1 && (set = (void*) p)) return;
if(x==preorder || x==endorder) return;
int n = **(int**)p;
if(is_circular(n, set)) printf("%d\n", n);
}
int main(int argc, char **argv) {
void *set = generate_primes(1000000);
show_circ(set, 0, -1);
twalk(set, &show_circ);
tdestroy(set, &free);
}


>>61316148
I used http://bisqwit.iki.fi/story/howto/openmp/

https://blogs.msdn.microsoft.com/commandline/2017/07/10/ubuntu-now-available-from-the-windows-store/

Windows just keeps getting better and better. Seriously, I look forward to using it every day!
26 posts and 2 images submitted.
>>
what the hell are loonixtards gonna do now that windows has the best of both worlds?
>>
>>61316191
Nothing because they don't care. Just like you don't care that you're still alive.
>>
>>61316205
lol got em

File: buzz.png (10KB, 500x501px) Image search: [Google]
buzz.png
10KB, 500x501px
Is there a way to filter all videos whose title is in upper case and ends with an exclamation mark or question mark on youtube?
8 posts and 3 images submitted.
>>
It could probably be done with a *monkey script but it will take some work.
>>
>>61315985
^[A-Z ]+\?$
>>
>>61316171
I forgot about the exclamation mark but you get the idea

File: serveimage(1).png (5KB, 200x215px) Image search: [Google]
serveimage(1).png
5KB, 200x215px
What OSes are /g/ running?
Qubes here.
16 posts and 2 images submitted.
>>
Also qubes, but the secret freebsd/bhyve/jails version going around word of mouth on certain other chans
>>
I have Windows 10 and Ubuntu on my machine. The w10 is for family who are used to it and ubuntu is for me.
>>
>>61316054
This, but I'm thinking about having Ubuntu fuck off and just using Debian with Openbox or some shit. Budgie is kind of shitty.

File: asian man.jpg (56KB, 1151x647px) Image search: [Google]
asian man.jpg
56KB, 1151x647px
who was in the wrong?
28 posts and 4 images submitted.
>>
The Chinese for expecting nogs to have a work ethic & not steal and slack-off even when they're overpaid.
>>
>>61315684
he seemed too nice
the africans were always giggling at him esp the one that he employed
>>
Reference?

File: maxresdefault.jpg (96KB, 1227x920px) Image search: [Google]
maxresdefault.jpg
96KB, 1227x920px
What penis pumps do /g/entlemen prefer? I have been having trouble finding one that isn't ridiculously strong on the pressure. Purpled out more than once on my current one.

Pic related
30 posts and 2 images submitted.
>>
Snake oils
>>
I mean... I guess penis pumps are technology...
>>
/g/: A wonderful place

Source:
>http://www.independent.co.uk/news/uk/politics/uk-ex-spy-chief-amber-rudd-home-secretary-smartphone-encryption-law-dangerous-terrorism-isis-a7833211.html
Extract:
>The UK’s ex-spy chief has warned the Home Secretary’s plans to force smart phone apps such as WhatsApp to hand over encrypted messages are unworkable and dangerous.
>Robert Hannigan, the former head of GCHQ, ridiculed Amber Rudd’s threat to pass new laws to build “back doors” into secret messages as doomed to fail.
>“Encryption is an overwhelmingly good thing - it keeps us all safe and secure,” Mr Hannigan said.
When will politicians ever learn that banning something only applies to those who follow the law anyway.
If you ban something, criminals with either do it anyway, or just find a way around it.
The same thing back be said for terrorists.
Laws only affect the law-abiding.
36 posts and 4 images submitted.
>>
It's time to hang politicians from lamp posts.
>>
>remove laws
>nothing affects no one
>we have achieved perfect society

this is was lolbertardians actually believe

and did someone say roads?
>>
Not to mention, even IF companies complied, criminals and terrorists (and those who use encryption for legitimate privacy) would just start using PGP.

>>61315338
>Strawman.
Laws don't affect criminals, criminals will still break the law, but if you don't catch them, the law doesn't matter.
However, you should still have laws as a basis for punishment.
But you shouldn't bother to have blanket bans, you should focus on addressing the cause of want to use the thing you're trying to ban, in the way you're trying to ban it.
Of course though, because you're a smarmy statist, you just automatically conflate my meaning.
Also, the MUH ROADS argument is profoundly stupid.

File: 1499609670672.jpg (47KB, 564x704px) Image search: [Google]
1499609670672.jpg
47KB, 564x704px
Harness the lambda anon before you are left in the dust. Salvation through wisdom. Wisdom through salvation.
21 posts and 4 images submitted.
>>
There will never be a purely functional system.
>>
File: 1498896782566.jpg (78KB, 396x385px) Image search: [Google]
1498896782566.jpg
78KB, 396x385px
>>61315298
Forgive him father he does not know what he says.
>>
>>61315311
Your stateless code runs as a stateful process, in a stateful OS, on stateful hardware.

There will never be a purely functional system.

File: literal brain surgery.jpg (2MB, 2356x1325px) Image search: [Google]
literal brain surgery.jpg
2MB, 2356x1325px
If you want help:
>Assemble your parts list
https://pcpartpicker.com/
>State the budget for your build (and country if not the USA)
>List games/software you use often, as well as your monitor resolution + refresh rate
>Clarify your goal for build improvements: lower price or improved specs?
How to assemble a PC, select components & more (kind of outdated)
https://wiki.installgentoo.com/index.php?title=Build_a_PC

CPUs:
No i5 unless discounted
>G4560/G4600 - Budget builds (<$500)
>R5 1400 - Cheapest quad core you can get (Ryzen 3 soon)
>R5 1500x - Good but up to 1600 if you can
>R5 1600 - Best value for higher fps gaming / mixed usage; 1600x if you want higher stock clocks
>i7 7700k - 144hz only
>R7/Used Xeon/Threadripper - Compute/Multitask/VM/mixed use; Not for just gaming

GPUs:
Coin miners have driven price up and stock down, waiting to buy a GPU might be wiser
>Integrated CPU Graphics - Desktop stuff and very light games
>GTX 1050(Ti) - Lower end budget cards, drop settings on newer games, RX560 beaten by both
>RX570 - 1080p@60~hz maxed, running most maxed older games at 100~Hz
>RX580 and GTX1060 6GB - 1080p@80hz maxed, 1440p@60hz at lower settings; RX580 better in newer games
>GTX 1070 - 1080p@130hz /1440p@60hz at high
>GTX 1080 - 1080p@144hz / 1440p@60hz maxed, 4k@60hz in a few games; Probably the highest end card you need for 1080p/1440p
>GTX 1080Ti - 1440p@144hz and 4k@60hz maxed/high in many games

RAM:
>Check your Mobo QVL before buying any RAM
>Ryzen CPUs benefits a lot from high speed RAM

General:
ALWAYS LOOK AT PRODUCT REVIEWS!
Always consider an SSD. Try buying a large SSD for what you'd pay for your SSD+HDD combined, and add a HDD later
NVMe SSDs aren't for a faster OS boot, they're for productivity/scratch disk/VMs. NVMe and M.2 are not the same thing, M.2 is a form factor.
The Ryzen lineup comes with surprisingly good stock coolers. consider using them over any <$30 cooler.
Buying used is perfectly fine for budgets (PSU excluded)

Last: >>61307120
348 posts and 49 images submitted.
>>
Just got a 7700k, I have a dark rock 3 on it. 73C with aida 64 at 4.7ghz, voltage left on auto. Case is a fractal design nano s. I have two 140mm fans on intake at 1k rpm, the dark rock 3 at 1400 or 1500rpm, just with the fan that came on it, and a 120mm fan on rear exhaust at 1200rpm. The top moduvent piece of the case is off but has no fans installed, it's just venting. That's pretty decent in my opinion considering it's still almost silent sitting on my desk. What does /g/ think?

Also 1080ti, which one is best. I have a Strix card right now and love it. Dead silent, overclocked slightly and is only hitting 62C in that tiny ass case.
>>
>>61315133
Basically I have 2 options that are exactly the same in price but have exactly the same issue.
1. MSI B350M Gaming Pro MOBO with Corsair RAM that is on QVL but with different capacity (16gb on QVL vs 8gb I can buy that's not)
2. ASRock B350M-HDV and G.Skill Trident Z RAM, same shit there - 16gb version is on QVL and 8gb is not.

Wat do
>>
File: 1499418536846.jpg (112KB, 973x1000px) Image search: [Google]
1499418536846.jpg
112KB, 973x1000px
>>61315293

File: 1499691894711.jpg (156KB, 1280x720px) Image search: [Google]
1499691894711.jpg
156KB, 1280x720px
Didn't get much help from /wsr/, was told to post it here so that's what I'm gonna do.

I'm trying to get my Xbox 360 Controller to work on my PC so that I can play Initial D Stage 6, but it's not working.

I have both the cable, and the wireless adapter thing. They used to work, but after not using either of them for about a year or so, they aren't working anymore for some reason. The controller won't pair with the wireless adapter, and when connecting the controller to the PC by the cord, the PC nothing happens.

What do?
24 posts and 1 images submitted.
>>
bump?
>>
>>61315155
Sounds like there's either a problem with your computer, or your Xbox controller.
>>
Sounds like Windows Computer (commonly known as WC) problem. Did you try contacting Microsoft® on the problem?

Pages: [First page] [Previous page] [1632] [1633] [1634] [1635] [1636] [1637] [1638] [1639] [1640] [1641] [1642] [1643] [1644] [1645] [1646] [1647] [1648] [1649] [1650] [1651] [1652] [Next page] [Last page]

[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.