[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Archived threads in /g/ - Technology - 5301. page

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

File: Compound.jpg (85KB, 900x600px) Image search: [Google]
Compound.jpg
85KB, 900x600px
Which thermal compound does /g/ prefer? Which other cooling methods does /g/ utilize?
49 posts and 7 images submitted.
>>
File: 1482440796847.jpg (39KB, 351x490px) Image search: [Google]
1482440796847.jpg
39KB, 351x490px
>>
>>58132750
this is like asking someone what kind of windex they prefer
>the blue kind
>>
The stuff that's already on the cooler when it comes out of the CPU box.

When reapplying? Mayonnaise.

File: 3200*1800.png (2MB, 3200x1800px) Image search: [Google]
3200*1800.png
2MB, 3200x1800px
Why didn't you get a QHD display laptop anon?
20 posts and 3 images submitted.
>>
>>58132734
scaling media turns out like shit
>>
>>58132734
If I wanted QHD on a laptop, I would buy a monitor and attach it to the laptop. 1080p is enough for a laptop.
>>
>>58132792
but everything is so smooth on my 276ppi 13.3 inch display

File: Show Her Your Trackers.png (14KB, 979x286px) Image search: [Google]
Show Her Your Trackers.png
14KB, 979x286px
Getting the girl edition

Previous thread >>58128865

>Not sure what private trackers are all about?
The mission of /ptg/ is to promote the highest possible standards of tracker service by providing members with opportunities for professional development, by recognizing technical competence through examinations and by advancing the interests of its members.

>Have a question?
FAQ http://pastebin.com/LQxkS1mU
WIKI https://wiki.installgentoo.com/index.php/Private_trackers
MORE https://gitla.in/ptgGuide/ptgGuide/tree/master

Use >>>/g/ptg as a link to find the /ptg/ thread.

Remember the following:
>Staff occasionally read these generals and have posted here before.
>This is a thread for educational purposes only don't offer or ask for invites.
>Staff may pretend to be normal users asking for invites and when you invite them, they ban you for inviting strangers.
349 posts and 47 images submitted.
>>
DEMONOTAKU DESTROYED YOUR HOLY TEMPLE
>>
what.cd fags still BTFO
>>
>>58132726
By the girl you mean MaidenSlayer?

File: 1482359740414.jpg (47KB, 500x341px) Image search: [Google]
1482359740414.jpg
47KB, 500x341px
Whats the most important advance in technology to come out of 2016?
8 posts and 2 images submitted.
>>
Meme warfare

Using cartoon images of a frog to select a person with no experience to the most powerful position in the world
>>
iphone 7
>>
>>58132667
This. But also with anime

File: shit tv.jpg (79KB, 975x791px)
shit tv.jpg
79KB, 975x791px
>wendel and I have settled our differences..we bought him out

what did he mean by this?
30 posts and 4 images submitted.
>>
Everything feels weird now. It's not the same with Wendell gone. Both of their channels suck now. Wendell can't front-man a show and Logan doesn't has nearly the amount of depth of knowledge.
>>
>we're looking to create a new inclusive community

>if you dont like this new direction then you can leave
>>
>>58132602
>Logan
the guy has a personality of a wet paper bag. his "jokes" and mannerisms are cringy as fuck. I could never finish watching any of his videos.

File: geforce_experience_logo_1.jpg (110KB, 840x420px) Image search: [Google]
geforce_experience_logo_1.jpg
110KB, 840x420px
>gfe 3.0

I love nvidia but this shit is god awful

Jesus christ what the fuck
6 posts and 2 images submitted.
>>
File: PepePlant.png (71KB, 500x441px) Image search: [Google]
PepePlant.png
71KB, 500x441px
>gfe
>girlfriend experience
>tfw no gf
>>
>>58132421
Fucking gaymers ruin everything
>>
>>58132421
>GFE

I uninstalled it when I realized it had a webserver running. Not sure exactly which port it was, but it was one of the common "alt HTTP ports" like 8080/8443.

I was trying to work from home and couldn't start the web server, when I realized NVidia was listening on that port I nuked it from orbit and reinstalled the minimum drivers.

Frankly NVidia is a fucking joke, in November their driver update broke GIFs & WebMs. (They started black and macroblocks faded in until the GIF looped once and then they played normally.)

Perhaps my expectations are set too high, but frankly it is ridiculous that a $600 GPU that's pulling 300W from my wall can't play the "Keyboard Cat" video from 2007... yet NVidia thinks it's important to run a little NodeJS "microservice" in the background without my consent.

File: 1482461044429.png (160KB, 261x271px) Image search: [Google]
1482461044429.png
160KB, 261x271px
public class Program{


public static void main(String[] args){
Scanner input= new Scanner(System.in);
System.out.println("do you like me Y/N?");
String answer=input.nextLine();
if (answer=="yes";answer="Y";answer="y"){
System.out.println("thanks friend");

}else{
System.out.println("ouch my feelings");
}

}


}
13 posts and 3 images submitted.
>>
>>58132404
>
if (answer=="yes";answer="Y";answer="y")


Use .equals() for String comparison and use the "|" operator instead of semicolon
>>
>answer=="yes";answer="Y";answer="y")

this line is incorrect
>>
Not doing your homework pajeet

File: Girls.jpg (77KB, 600x536px) Image search: [Google]
Girls.jpg
77KB, 600x536px
>he majored in Computer Science
>he's just another code monkey
>Pajeet and Rajesh will cuck him for his job
Gee anon... I really hope you didn't pick a meme degree.
8 posts and 2 images submitted.
>>
quality thread
>>
>not going for CE or EE
>>
>>58132467
t. CS major faggot

File: downloadfile.jpg (13KB, 320x320px) Image search: [Google]
downloadfile.jpg
13KB, 320x320px
>Guy fucks me over in a real life deal for a few thousand dollars
>I devise a plan to tarnish his reputation forever
>Start regularly posting on beastiality, incest and fraud forums
>Act like a fucking asshole to everyone and says lots of fucked up shit
>Slowly but surely leave little crumbs of evidence without being blatantly obvious - knowing they'll try to dox "me"
>They do, but it's not me :^]

>Eventually start posting animal porn I saved from 4*2chan on every other board with his real name
>In some cases create new accounts on forums talking about how this guy is a weirdo pedophile and scammer and how I got his dox by stringing together his "internet activity"

>MFW you Google his name and it shows him as a monster
>MFW someone is probably going to kill him one day

And that's how you take out a bad business rival
7 posts and 1 images submitted.
>>
Dumb frog poster
>>
>>58132211
It's a lobster not a frog
>>
but you still don't have your money

File: putty-05-535x535.jpg (68KB, 535x535px) Image search: [Google]
putty-05-535x535.jpg
68KB, 535x535px
Any users of PuTTY/KiTTY/etc. have advice for working with crappy WiFi?

When mine goes out the connection is just screwed, even with the reconnection feature of KiTTY.
6 posts and 1 images submitted.
>>
use screen/tmux on server
>>
>>58132183
For slow connections I recommend Mosh, but every IT guy should know that already. Godspeed OP
>>
>>58132212
I just to it for a hobby. Thanks much, I'll check out out.

File: 1432086982262.jpg (341KB, 900x900px) Image search: [Google]
1432086982262.jpg
341KB, 900x900px
1. Software. The phones run complex, low-assurance software in unsafe language and inherently-insecure architecture. A stream of attacks and leaks came out of these. The model for high-assurance was either physical separation with trusted chip mediating or separation kernels + user-mode virtualization of Android, etc so security-critical stuff ran outside that. There was strong mediation of inter-partition communications.

2. Firmware of any chip in the system, esp boot firmware. These were privileged, often thrown together even more, and might survive reinstall of other components.

3. Baseband standards. Security engineer Clive Robinson detailed many times of Schneier's blog the long history between intelligence services (mainly British) and carriers, with the former wielding influence on standards. Some aspects of cellular stacks were straight designed to facilitate their activities. On top of that, the baseband would have to be certified against such requirements and this allowed extra leverage given lost sales if no certification.

4. Baseband software. This is the one you hear about most. They hack baseband software, then hack your phone with it.

5. Baseband hardware. One can disguise a flaw here as debugging stuff left over or whatever. Additionally, baseband has RF capabilities that we predicted could be used in TEMPEST-style attacks on other chips. Not sure if that has happened yet.

6. Main SOC is complex without much security. It might be subverted or attacked. With subversion, it might just be a low-quality counterfeit. Additionally, MMU or IOMMU might fail due to errata. Old MULTICS evaluation showed sometimes one can just keep accessing stuff all day waiting for a logic or timing-related failure to allow access. They got in. More complex stuff might have similar weaknesses. I know Intel does and fights efforts to get specifics.
9 posts and 3 images submitted.
>>
7. Mixed-signal design ends up in a lot of modern stuff, including mobile SOC's. Another hardware guru that taught me ASIC issues said he'd split his security functions (or trade secrets) between digital and analog so the analog effects were critical for operation. Slowed reverse engineering because their digital customers didn't even see the analog circuits with digital tools nor could understand them. He regularly encountered malicious or at least deceptive behavior in 3rd party I.P. that similarly used mixed-signal tricks. I've speculated before on putting a backdoor in the analog circuits modulating the power that enhances power analysis attacks. Lots of potential for mixed-signal attacks that are little explored.

8. Peripheral hardware is subverted, counterfeit, or has similar problems as above. Look at a smartphone breakdown sometime to be amazed at how many chips are in it. Analog circuitry and RF schemes as well.

9. EMSEC. The phone itself is often an antenna from my understanding. There's passive and active EMSEC attacks that can extract keys, etc. Now, you might say "Might as well record audio if they're that close." Nah, they get the master secret and they have everything in many designs. EMSEC issues here were serious in the past: old STU-III's were considered compromised (master leaked) if certain cellphones got within like 20 ft of them because cell signals forced secrets to leak. Can't know how much of this problem has gotten better or worse with modern designs.

10. Remote update. If your stack supports it, then this is an obvious attack vector if carrier is malicious or compelled to be.
>>
File: 1431425267433.jpg (296KB, 1000x1502px) Image search: [Google]
1431425267433.jpg
296KB, 1000x1502px
11. Apps themselves if store review, permission model, and/or architecture is weak. Debatable how so except for architecture: definitely weak. Again, better designs in niche markets used separation kernels with apps split between untrusted stuff (incl GUI) in OS and security part outside OS. Would require extra infrastructure and tooling for mainstream stuff, though, plus adoption by providers. I'm not really seeing either in mainstream providers. ;)

That's just off the top of my head from prior work trying to secure mobile or in hardware. My mobile solution, developed quite some time ago, fit in a suitcase due to the physical separation and interface requirements. My last attempt to put it in a phone still needed a trusted keyboard & enough chips that I designed (not implemented) it based on Nokia 9000 Communicator. Something w/ modern functions, form-factor, and deals with above? Good luck...

All smartphones are insecure. Even the secure ones. I've seen good ideas and proposals but no secure[ish] design is implemented outside maybe Type 1 stuff like Sectera Edge. Even it cheats that I can tell with physical separation and robust firmware. It's also huge thanks to EMSEC & milspec. A secure phone will look more like that or the Nokia. You see a slim little Blackphone, iPhone, or whatever offered to you? Point at a random stranger and suggest they might be the sucker the sales rep was looking for.

Don't trust any of them. Ditch your mobile or make sure battery is removable. Don't have anything mobile-enabled in your PC. Just avoid wireless in general unless its infrared. Even then it needs to be off by default.
>>
File: 1465146048116.png (34KB, 906x686px)
1465146048116.png
34KB, 906x686px
>>58132149
I mostly agree about the baseband but iPhone is pretty fucking close in all other categories. They've tightened the fuck out of it to the point that hacking companies are offering millions for an RCE exploit.

I went to BlackHat 2016. This was one of the best talks.

https://www.youtube.com/watch?v=BLGFriOKz6U

File: bestcomputer.jpg (39KB, 485x323px) Image search: [Google]
bestcomputer.jpg
39KB, 485x323px
so why did you go into computer science instead of computer engineering?

no one needs a code monkey, what we need are more efficient chips
9 posts and 1 images submitted.
>>
>he thinks anyone gives a fuck about processing power in 2016

you understand why intel is focusing on graphics and io now, right?
>>
>>58132001

you realize all sorts of computer components are chips, right

like a motherboard is just a big fat chip
>>
>>58131985
>no one needs a code monkey, what we need are more efficient chips
this is why our hardware is obsolete on a yearly basis. idiots can't code for shit

File: clone-930x644.jpg (233KB, 930x644px) Image search: [Google]
clone-930x644.jpg
233KB, 930x644px
Why are people so against cloning? What are your thoughts?
100 posts and 16 images submitted.
>>
Same reason dumb people are against anything else
>>
>>58131995
Cause it goes against all morality?
>>
>>58132021
Why?

File: download.jpg (5KB, 310x163px) Image search: [Google]
download.jpg
5KB, 310x163px
Have old monitor, 18.5" 1366x768. How will Overwatch run on it, will it be too squished together?
12 posts and 2 images submitted.
>>
>>58131970
fuck off /v/irgin

sage
>>
>>58132023
lol at /g/ calling anyone a virgin.
I'll bump this cringe-y thread just to spite you for being such an edgelord.
>>
>>58131970

should be fine OP tons of people play this game fine on their smaller laptop screens

>Mom left her iPhone in a changing room at the mall
>Realized it was missing, called it
>Straight to voicemail
>clearly the fucker isn't retarded because FIND MY IPHONE
>Set up lost mode but is useless until its turned on

So /g/, whats your experience with stolen phones? What exactly do prawns do to sell stolen phones? DO any of you have experience with this or any recovery stories?
35 posts and 1 images submitted.
>>
I steal androids
Ama
>>
>>58131964

Basically, if you have the IMEI (or a device serial) which you should and if not you can easily retrieve it from your carrier; you can prove you own the phone.

In which case, you show them the documentation they are legally required to return it to you and then report the person who sold it to the police.

Most if not all pawn shops are required by law in non-shit countries to have a licence or other identifying document as well as a contact number, name and birth-date provided at the point of purchasing the device.

There are very few ways to get away with this sort of thing these days. We refuse to buy mobiles without any indication that they're the original owner, if a device is locked and there isn't a reasonable explanation as to why or it is otherwise suspicious, we contact police immediately regardless.

t. I work for CashConverters.
>>
>>58131994
how do you sell them for profit?

Pages: [First page] [Previous page] [5291] [5292] [5293] [5294] [5295] [5296] [5297] [5298] [5299] [5300] [5301] [5302] [5303] [5304] [5305] [5306] [5307] [5308] [5309] [5310] [5311] [Next page] [Last page]

[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.