>Researchers say 'benevolent bots', otherwise known as software robots, that are designed to improve articles on Wikipedia sometimes have online 'fights' over content that can continue for years.
>bots interacted with one another, whether or not this was by design, and it led to unpredictable consequences
>bots are more like humans than you might expect
>bots behave differently in different cultural environments and their conflicts are also very different to the ones between human editors
>bots are designed by humans from different countries so when they encounter one another, this can lead to online clashes
>the number of reverts is smaller for bots than for humans, but the bots' behaviour is more varied and conflicts involving bots last longer and are triggered later
https://www.sciencedaily.com/releases/2017/02/170223142117.htm
My sides reached the orbit of Uranus and therefore I welcome the memesis of AI future with open arms.
how long until niggerbots edit the wikipedia entries about ancient egypt?
>>59578288
>Ayooo
>*smacks ports licks protocol
>so you be sayin
>WE
>>59578251
Just what we need more autists on wikipedia. This time they don't even need sleep or food.
Does anyone knows a gmail relay SMTP server? IP for telner please...
I am unironically fapping to this pic
>>59578223
Two separate people, conjoined twins, gimp, or a mirror?
Coming from a person who has been using ways to keep my info safe before the new bill has been passed. Here are some ways to stay safe:
1. Use TOR browser
2. Use the duckduckgo search engine.
3. Use TAILS OS
>>59578012
Except Tor's been compromised before and Tails OS is an amnesiac OS which doesn't affect internet traffic.
Disconnect from the internet. Literally the only way.
I thought duckduckgo had been outed as doing the opposite of what they publicly claimed?
>networkd ndisc: Bug can be used for a denial-of-service attack
issue ist Open
Assignees No one assigned
Labels lol jews red hat poettering gay
@ commented 10 hours ago • edited
Submission type
Bug report
NOTE: SYSTEMJEW BTFO
systemd version the issue has been seen with:
current master
Only one specific Router Advertisement message is needed to basically kill the network connections of all systems in a network running systemd-networkd with ipv6.
It is pretty much the attack stated in RFC862 section 5.5.3.e
>lol system-sjw BTFO once again
>>59577708
Is it a bug?
>>59577782
Is it a plane? NO IT'S SUPERMAN
There was a major court case in canada this week against Kodi Pirate TV box sellers. What does /g/ think? Are dark days ahead?
Here is the article: http://www.cbc.ca/news/business/free-tv-android-box-court-roger-bell-videotron-1.4029874
>a fucking leaf
Sounds like the case is ongoing.
What seems to be getting very little attention is the fact that the boxes don't actually contain any of this copyrighted material. They just have software that makes it easy to download stuff. Not very different from a computer that comes with a BitTorrent client and a web browser installed.
(Meanwhile, I wouldn't be surprised if they are violating the copyright of Linux and maybe Kodi, by not providing source code.)
Bought a Laptop this week but the seller sent me a Laptop with better specs.
Should I return it or keep it?
Give it back, Jamal.
>>59577517
This
>>59577517
>>59577543
These.
What was that site that had a list of free dial-up services in your area you can connect to? Most of them were run by universities and schools. Can't find the website anymore. I remember it was mentioned somewhere on Lifehacker (before they went to shit like 5 years ago) and I never saved it. I still have my modem and a PC capable of using dial-up.
Yes, this is important to know if they ever try to cut off access to the internet but forget the phone lines, which usually work well after the power goes out too.
https://web.archive.org/web/20170309103112/http://lifehacker.com/5746046/how-to-foil-a-nationwide-internet-shutdown
All I got was this. The website they list is gone, but the number list is still available: https://web.archive.org/web/20101124051726/http://budgetdialup.com/html/usa_canada.txt
>>59577254
>cut off access to the internet but forget the phone lines
kek, this would never happen in my country
first they cut all phone lines and recycle them as copper getting sheckels and then put some fiber optics with POS chink terminal powered off your local powerline
can you describe a scenario where "they" cut off access to the internet but leave ISPs active for you to call, and how that would work
>>59577959
Well, sometimes the phone lines are above ground, while the internet lines are below ground. If an earthquake strikes, the phone lines may still work.
AT&T in my area still utilizes the phone lines but is trying to get everyone to use their VOIP box.
/God I (fucking)? (love|hate) [a-z]+fags./i
OP is, as usual, a massive faggot
>>59577079
^.*$
>>59577272
Obligatory
Why do you hate Go?
>>59577008
botnet language
Lack of parametric polymorphism. Awful error checking.
It has all the drawbacks of C with none of the benefits of C.
Name one flaw with Rust that isn't actually a feature.
> tfw can't
usability
>>59576529
>it's not a bug, it's a feature!
Social Justice
Is it too much to ask a portable device with a Linux based operating system that can play video and has a qwerty keyboard under $100?
I know about the PocketCHIP, and It's almost perfect except that it looks so ungodly nerd. Know about something that I can actually take out-doors?
>>59576459
One of those Chinese folding tablets with a keyboard?
buy used netbook, install gentoo. next.
Pinetop, or Pinebook, don't remember, is rumoured to be available in the coming weeks/months.
This thread is about the appreciation of watches, as well as the micro-engineering and materials engineering that are required to produce a fine watch.
>Required Viewing For Newbies:
https://youtu.be/_2J5phyd9J4
>Strap Guide:
http://pastebin.com/SwRysprE
Previous thread:
>>59555322
>1100USD for nuSeiko divers
I'm still pissed
How common is the 7S26 movement from seiko?
>>59576405
Get a Mako USA II
Hello /g/. Over time I have learnt a lot from this hacking board, so I feel it's time to give something back to the community. Now I feel I have to give something back. So for your enjoyment and education, here is a starting guide to becoming a Hacker.
*DISCLAIMER* THE FOLLOWING IS FOR EDUCATIONAL PURPOSES ONLY. I DO NOT ENDORSE ILLEGAL HACKING OF ANY FORM
/DISCLAIMER
First, let's talk about the hacker mentality. It's mature and complex. You need to understand that hacking is not something just any kid can learn in one day. To be a proper hacker takes months, sometimes even up to a year. Complete mastery of the Command Prompt and Notepad++ (explained below) is very complex.
Now you're prepared for the road ahead, I'll walk you through modifying your OS so it is suitable for hacking purposes. You have only one choice of OS when it comes to being a hacker - Windows. Windows is the oldest and most stable OS, and it also has a nice UI (which stands for User Interface by the way, as all true hackers know). Windows can also be obtained for free, but that's a very complicated procedure and should only be attempted by veteran hackers.
Here are some programs you can use to make your desktop more Elite:
Rainmeter - can be used to install and hack system information like RAM (speed) and Hard Drive (amount of memory).
Deviantart - has lots of cool hacker desktop backgrounds.
Internet Explorer - this allows you to connect to the web, which is a vital meeting place for hackers worlwide. You can find fellow hackers in the Deep Web. The main meeting ground for experienced hackers is 4chan's very own >>>/b/.
Ok, now for the important parts. Hacking tools. First of all, you are going to want notepad++. This is what hackers use to write malicious code.
Now that you can program correctly, I'll teach you how to Ping a website to uncover it's IP (Internet Persona) address. Open the Command Prompt. Type ping.[site] - for example ping.4chan.org - and you will bruteforce the system into handing over its IP.
These are the two main tools for advanced hacking.
Now for another important part of hacking which is often overlooked - security. Although the seasoned hacker is always one step ahead of his government, it's important to employ constant vigilance. To remain anonymous while you hack the internet, always connect through a proxy service, such as unbl0cked .org and hidemya55. com. These sites will make you untraceable. Another encryption method you should always be using is Windows' Hidden folder utility. To hide a folder, right click on it and click properties. Check the 'hidden' box. The folder will now remain undetectable unless you make hidden folders visible. It is highly unlikely that anyone with no prior hacking/Modding experience will have the skills to do this.
/XxX_-_XxX Complete Guide To Become A Dangerous Hacker XxX_-_XxX
~Legion
How to subscribe?
Are there any programming languages that /g/ doesn't hate?
Haskell
C
>>59575002
Everybody hates Java though
Why is ryzen so good?
AMDead cpu-z pajeet shills are back. CPU-z is broken. It measures cache rather than actual single and multithreaded performance. Ryzen is good, but it's not better than the 6950x or even the 6900k and every other benchmark proves it.
because JK shipwrecker
>>59574900
>WAH WAH WAH