Which thermal compound does /g/ prefer? Which other cooling methods does /g/ utilize?
>>58132750
this is like asking someone what kind of windex they prefer
>the blue kind
The stuff that's already on the cooler when it comes out of the CPU box.
When reapplying? Mayonnaise.
Why didn't you get a QHD display laptop anon?
>>58132734
scaling media turns out like shit
>>58132734
If I wanted QHD on a laptop, I would buy a monitor and attach it to the laptop. 1080p is enough for a laptop.
>>58132792
but everything is so smooth on my 276ppi 13.3 inch display
Getting the girl edition
Previous thread >>58128865
>Not sure what private trackers are all about?
The mission of /ptg/ is to promote the highest possible standards of tracker service by providing members with opportunities for professional development, by recognizing technical competence through examinations and by advancing the interests of its members.
>Have a question?
FAQ http://pastebin.com/LQxkS1mU
WIKI https://wiki.installgentoo.com/index.php/Private_trackers
MORE https://gitla.in/ptgGuide/ptgGuide/tree/master
Use >>>/g/ptg as a link to find the /ptg/ thread.
Remember the following:
>Staff occasionally read these generals and have posted here before.
>This is a thread for educational purposes only don't offer or ask for invites.
>Staff may pretend to be normal users asking for invites and when you invite them, they ban you for inviting strangers.
DEMONOTAKU DESTROYED YOUR HOLY TEMPLE
what.cd fags still BTFO
>>58132726
By the girl you mean MaidenSlayer?
Whats the most important advance in technology to come out of 2016?
Meme warfare
Using cartoon images of a frog to select a person with no experience to the most powerful position in the world
iphone 7
>>58132667
This. But also with anime
>wendel and I have settled our differences..we bought him out
what did he mean by this?
Everything feels weird now. It's not the same with Wendell gone. Both of their channels suck now. Wendell can't front-man a show and Logan doesn't has nearly the amount of depth of knowledge.
>we're looking to create a new inclusive community
>if you dont like this new direction then you can leave
>>58132602
>Logan
the guy has a personality of a wet paper bag. his "jokes" and mannerisms are cringy as fuck. I could never finish watching any of his videos.
>gfe 3.0
I love nvidia but this shit is god awful
Jesus christ what the fuck
>gfe
>girlfriend experience
>tfw no gf
>>58132421
Fucking gaymers ruin everything
>>58132421
>GFE
I uninstalled it when I realized it had a webserver running. Not sure exactly which port it was, but it was one of the common "alt HTTP ports" like 8080/8443.
I was trying to work from home and couldn't start the web server, when I realized NVidia was listening on that port I nuked it from orbit and reinstalled the minimum drivers.
Frankly NVidia is a fucking joke, in November their driver update broke GIFs & WebMs. (They started black and macroblocks faded in until the GIF looped once and then they played normally.)
Perhaps my expectations are set too high, but frankly it is ridiculous that a $600 GPU that's pulling 300W from my wall can't play the "Keyboard Cat" video from 2007... yet NVidia thinks it's important to run a little NodeJS "microservice" in the background without my consent.
public class Program{
public static void main(String[] args){
Scanner input= new Scanner(System.in);
System.out.println("do you like me Y/N?");
String answer=input.nextLine();
if (answer=="yes";answer="Y";answer="y"){
System.out.println("thanks friend");
}else{
System.out.println("ouch my feelings");
}
}
}
>>58132404
>if (answer=="yes";answer="Y";answer="y")
Use .equals() for String comparison and use the "|" operator instead of semicolon
>answer=="yes";answer="Y";answer="y")
this line is incorrect
Not doing your homework pajeet
>he majored in Computer Science
>he's just another code monkey
>Pajeet and Rajesh will cuck him for his job
Gee anon... I really hope you didn't pick a meme degree.
quality thread
>not going for CE or EE
>>58132467
t. CS major faggot
>Guy fucks me over in a real life deal for a few thousand dollars
>I devise a plan to tarnish his reputation forever
>Start regularly posting on beastiality, incest and fraud forums
>Act like a fucking asshole to everyone and says lots of fucked up shit
>Slowly but surely leave little crumbs of evidence without being blatantly obvious - knowing they'll try to dox "me"
>They do, but it's not me :^]
>Eventually start posting animal porn I saved from 4*2chan on every other board with his real name
>In some cases create new accounts on forums talking about how this guy is a weirdo pedophile and scammer and how I got his dox by stringing together his "internet activity"
>MFW you Google his name and it shows him as a monster
>MFW someone is probably going to kill him one day
And that's how you take out a bad business rival
Dumb frog poster
>>58132211
It's a lobster not a frog
but you still don't have your money
Any users of PuTTY/KiTTY/etc. have advice for working with crappy WiFi?
When mine goes out the connection is just screwed, even with the reconnection feature of KiTTY.
use screen/tmux on server
>>58132183
For slow connections I recommend Mosh, but every IT guy should know that already. Godspeed OP
>>58132212
I just to it for a hobby. Thanks much, I'll check out out.
1. Software. The phones run complex, low-assurance software in unsafe language and inherently-insecure architecture. A stream of attacks and leaks came out of these. The model for high-assurance was either physical separation with trusted chip mediating or separation kernels + user-mode virtualization of Android, etc so security-critical stuff ran outside that. There was strong mediation of inter-partition communications.
2. Firmware of any chip in the system, esp boot firmware. These were privileged, often thrown together even more, and might survive reinstall of other components.
3. Baseband standards. Security engineer Clive Robinson detailed many times of Schneier's blog the long history between intelligence services (mainly British) and carriers, with the former wielding influence on standards. Some aspects of cellular stacks were straight designed to facilitate their activities. On top of that, the baseband would have to be certified against such requirements and this allowed extra leverage given lost sales if no certification.
4. Baseband software. This is the one you hear about most. They hack baseband software, then hack your phone with it.
5. Baseband hardware. One can disguise a flaw here as debugging stuff left over or whatever. Additionally, baseband has RF capabilities that we predicted could be used in TEMPEST-style attacks on other chips. Not sure if that has happened yet.
6. Main SOC is complex without much security. It might be subverted or attacked. With subversion, it might just be a low-quality counterfeit. Additionally, MMU or IOMMU might fail due to errata. Old MULTICS evaluation showed sometimes one can just keep accessing stuff all day waiting for a logic or timing-related failure to allow access. They got in. More complex stuff might have similar weaknesses. I know Intel does and fights efforts to get specifics.
7. Mixed-signal design ends up in a lot of modern stuff, including mobile SOC's. Another hardware guru that taught me ASIC issues said he'd split his security functions (or trade secrets) between digital and analog so the analog effects were critical for operation. Slowed reverse engineering because their digital customers didn't even see the analog circuits with digital tools nor could understand them. He regularly encountered malicious or at least deceptive behavior in 3rd party I.P. that similarly used mixed-signal tricks. I've speculated before on putting a backdoor in the analog circuits modulating the power that enhances power analysis attacks. Lots of potential for mixed-signal attacks that are little explored.
8. Peripheral hardware is subverted, counterfeit, or has similar problems as above. Look at a smartphone breakdown sometime to be amazed at how many chips are in it. Analog circuitry and RF schemes as well.
9. EMSEC. The phone itself is often an antenna from my understanding. There's passive and active EMSEC attacks that can extract keys, etc. Now, you might say "Might as well record audio if they're that close." Nah, they get the master secret and they have everything in many designs. EMSEC issues here were serious in the past: old STU-III's were considered compromised (master leaked) if certain cellphones got within like 20 ft of them because cell signals forced secrets to leak. Can't know how much of this problem has gotten better or worse with modern designs.
10. Remote update. If your stack supports it, then this is an obvious attack vector if carrier is malicious or compelled to be.
11. Apps themselves if store review, permission model, and/or architecture is weak. Debatable how so except for architecture: definitely weak. Again, better designs in niche markets used separation kernels with apps split between untrusted stuff (incl GUI) in OS and security part outside OS. Would require extra infrastructure and tooling for mainstream stuff, though, plus adoption by providers. I'm not really seeing either in mainstream providers. ;)
That's just off the top of my head from prior work trying to secure mobile or in hardware. My mobile solution, developed quite some time ago, fit in a suitcase due to the physical separation and interface requirements. My last attempt to put it in a phone still needed a trusted keyboard & enough chips that I designed (not implemented) it based on Nokia 9000 Communicator. Something w/ modern functions, form-factor, and deals with above? Good luck...
All smartphones are insecure. Even the secure ones. I've seen good ideas and proposals but no secure[ish] design is implemented outside maybe Type 1 stuff like Sectera Edge. Even it cheats that I can tell with physical separation and robust firmware. It's also huge thanks to EMSEC & milspec. A secure phone will look more like that or the Nokia. You see a slim little Blackphone, iPhone, or whatever offered to you? Point at a random stranger and suggest they might be the sucker the sales rep was looking for.
Don't trust any of them. Ditch your mobile or make sure battery is removable. Don't have anything mobile-enabled in your PC. Just avoid wireless in general unless its infrared. Even then it needs to be off by default.
>>58132149
I mostly agree about the baseband but iPhone is pretty fucking close in all other categories. They've tightened the fuck out of it to the point that hacking companies are offering millions for an RCE exploit.
I went to BlackHat 2016. This was one of the best talks.
https://www.youtube.com/watch?v=BLGFriOKz6U
so why did you go into computer science instead of computer engineering?
no one needs a code monkey, what we need are more efficient chips
>he thinks anyone gives a fuck about processing power in 2016
you understand why intel is focusing on graphics and io now, right?
>>58132001
you realize all sorts of computer components are chips, right
like a motherboard is just a big fat chip
>>58131985
>no one needs a code monkey, what we need are more efficient chips
this is why our hardware is obsolete on a yearly basis. idiots can't code for shit
Why are people so against cloning? What are your thoughts?
Same reason dumb people are against anything else
>>58131995
Cause it goes against all morality?
>>58132021
Why?
Have old monitor, 18.5" 1366x768. How will Overwatch run on it, will it be too squished together?
>>58131970
fuck off /v/irgin
sage
>>58132023
lol at /g/ calling anyone a virgin.
I'll bump this cringe-y thread just to spite you for being such an edgelord.
>>58131970
should be fine OP tons of people play this game fine on their smaller laptop screens
>Mom left her iPhone in a changing room at the mall
>Realized it was missing, called it
>Straight to voicemail
>clearly the fucker isn't retarded because FIND MY IPHONE
>Set up lost mode but is useless until its turned on
So /g/, whats your experience with stolen phones? What exactly do prawns do to sell stolen phones? DO any of you have experience with this or any recovery stories?
I steal androids
Ama
>>58131964
Basically, if you have the IMEI (or a device serial) which you should and if not you can easily retrieve it from your carrier; you can prove you own the phone.
In which case, you show them the documentation they are legally required to return it to you and then report the person who sold it to the police.
Most if not all pawn shops are required by law in non-shit countries to have a licence or other identifying document as well as a contact number, name and birth-date provided at the point of purchasing the device.
There are very few ways to get away with this sort of thing these days. We refuse to buy mobiles without any indication that they're the original owner, if a device is locked and there isn't a reasonable explanation as to why or it is otherwise suspicious, we contact police immediately regardless.
t. I work for CashConverters.
>>58131994
how do you sell them for profit?