I recently bought a cheap eReader with e-ink. I like it, but the resolution and screen size are too small and e-ink monitors are ridiculously overpriced. I'd still love to have a 32 inch e-ink secondary monitor for reading if they weren't so damn expensive. It would not be for gaming or videos because the 15 hertz refresh rate and ghosting is silly, bit because when you're reading it can look so sharp and be easy on the eyes.
>>15286 I got a few Kindle 4s a few years back because e-ink e-reader that gets a bout a month of charge and when I'm not feeling like anon here >>15288 I have enjoyed reading on them for the first half of 3001 space odyssey.
Meanwhile I read a shit ton of cartoons and manga online daily on the desktop so yeah e-readers are great for reading but I'm fucked in the head too.
>>15286 Did you get the pocketbook? I like the look of it. Bit pricey though. >>15294 Laptops have screens which emit light. E-ink reflects like. Its much better for your eyes long term
I have a Kindle Paperwhite. I also got a cover for it that has a handstrap and kickstand. Altogether, it's super nice for reading on planes and stuff. The battery lasts forever too
I got my wife a Kindle Scribe and she loves it. The stylus functions are just like using a pencil
I like my paperwhite I just wish I have jailbroken it early because fuck amazon, now I'm stuck on firmware that doesn't have a jailbreak. >>15294 i like using it when I'm outside, the paperwhite is really nice to carry around. >>15332 an ereader is multiple books.
I generally don't trust antivirus software packages but I think they may be useful in cases where you download files from the internet and open or view them. Place useful tips about virus cleaning and antivirus software tips in this thread.
It comes packaged with Debian and other GNU/Linux distributions, and I've used it on OpenBSD. On windows I use the Windows defender suite but this also works on windows through an admin CMD command line. You download the package from the above link and install it. Then you need to edit two config files in the directory "C:\Program Files\ClamAV\conf_examples\". Copy these files to the main directory
If you just want to scan your home directories, you can just run this on /home/ or a specific directory cd'ing into the directory. Also --remove will do the deletion for you if you'd rather the program handle the process of bad flagged file removal. For a silent non verbose run remove -a and -v. Example:
$ su
# cd /home/
# freshclam
# clamscan -i -o -r -z --remove
Run it on the root directory / to get everything, however removal might break programs so its best to run verbose to a log file and move the bad files to a quarantine location before deletion. Post any tips about anti-virus if you have any.
Edited last time by Endwall on 02/22/2024 (Thu) 03:09.
>>15317 My mostly uninformed take is that gecko is pretty solid but blink is both mostly ahead (minus some possible greater performance for, say if you have dozens of tabs opened) and suffers from Google Chrome's near domination of web meaning many website owners just don't care optimizing stuff for Firefox (with the webkit browsers being closer and easier but still sometimes having some funkiness).
Endware is a suite of programs geared towards internet privacy, security, and anonymity.
Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.
Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.
Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.
Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.
iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.
spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.
alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.
mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.
I just ported endstream to macOS using a MacMini 2014 model with MacOS 12.5 Monterey. Using the Homebrew package manager you can install youtube-dl, curl, openssl, and mpv, and then the program will run. I've tested this port as working, and have placed it onto the github repository and onto the hidden service.
Now endstream is tested working on the following operating systems : { GNU/Linux, OpenBSD, Windows NT, MacOS }. I'm planning on going back and making winstream.bat into a powershell script so that it is fully compatible and can access all of the streams. Right now winstream.bat just uses fixed links and m3u8 playlists and can't access the Youtube live streams or other dynamic playlists. I'll have to learn more about Powershell first which might take a month or two. Its a side project.
My next task with endstream is to fix up the channels on the OpenBSD port and test it, I'll work on that in around two weeks when I have some free time.
Summary: I made a cross platform killer app, and gave it away for free on the internet...
Edited last time by Endwall on 09/18/2022 (Sun) 03:51.
I have completed and tested as working, a translation of endwall_wifi for PF. Tested working on a Toshiba Tecra with OpenBSD 7.1. I have also bug fixed the previous versions of the pf model, and added some new models for different use cases. The pf_wifi model is for locking to your internal LAN wifi. The pf_wifi_roam model is for allowing the wifi to connect to any network without re-running the firewall. The pf_roam model allows all interfaces to connect to any private LAN network for ethernet or wifi, basically you can plug in to anywhere or connect to any public wifi without re-running the firewall.
Obviously the more restricted the better,however these models might be useful for some applications, like using wifi at coffee shops etc. I have also made a roam version for nft which allows for the laptop to plug in anywhere. These are all available in the usual places:
I have to make a nft model for static wireless + static wired connections for nft_wifi, and then rename the current nft_wifi model to nft_wifi_roam.
The use cases are as follows:
1) Wired only desktop computer connection with 1 interface for wired ethernet in your home connected to your LAN, which supplies DHCP with a static ipv4 address. -> (endwall.sh, endwall_nft.sh endwall_pf.sh)
2) You have a wired LAN router and a wireless LAN router both supplying static ipv4 DHCP addresses to your internal network. -> (endwall_wifi.sh, endwall_nft_wifi.sh, endwall_pf_wifi.sh).
3) You have a Laptop you use in your internal network, wired, and or wireless, but you sometimes take it with you to school, or to a coffee shop and require the wireless connection to allow roaming connections to randomly assigned DHCP addresses. Also useful for investigating the networks of neighborhood wifi networks in your vicinity . -> (endwall_nft_wifi_roam.sh, endwall_pf_wifi_roam.sh)
4) You have a laptop and you want to plug it in to ethernet anywhere you can get a DHCP address (school, the library, your friend's house), and also use wifi on any wireless network (school, library, coffee shop, friend's house) and both get a randomly assigned DHCP ipv4 address, without re-running the firewall. -> (endwall_nft_roam.sh, endwall_pf_roam.sh).
The security decreases as you go from 1)->2)->3)->4). Best practice is 1) no wifi, only wired connections on desktop computers, no wireless interfaces, and connections in your own LAN network using static ip assignment from the router with mac address binding. Next best is 2) only use your own wifi, in you internal network as well as wired on your own LAN with static IP. 3) You have static ethernet and WIFI LAN at home, but sometimes you bring the laptop to school and need to connect to a randomly assigned ipv4 address on their WIFI without re-running the firewall rules, or you are at home and want to connect to or investigate local neighborhood wifi networks without re-running the firewall. 4) You want to be able to plug in to any ethernet jack anywhere (school,library, friend's house), and use any coffee shop WIFI but only for allowed/selected ports.
I'll work on creating the nft_wifi_roam and nft_wifi models sometime next week. School is starting in 2 weeks, so I have to wrap these projects up before the session starts. I'll be too busy to do anything consistent once the semester starts up, other than some maintenance and bug fixes as I find them. I'll do what I can, on Fridays and Saturdays during school, but I'm going to be busy with school assignments and studying.
Let me know if these are working for you. Post bug reports, comments or requests below. Thanks.
I can report that endstream.sh launches and plays with no GUI in GNU/Linux. Tested in tmux in the shell with no desktop or GUI, on Debian 11. I wasn't aware that this was possible until recently. Sound and full motion video work. Good news for people who don't use desktops, xorg or wayland or any GUI. mpv can play videos in the command line with no GUI, interesting development.
I did some updates to endstream_bsd.sh, endstream.sh and winstream.bat, including adding some streams from cozy.tv. Available in the usual places:
>>1825 I just tested endstream_bsd.sh in the shell on OpenBSD 7.1 (no GUI no Xenocara). And it also works. It goes to full screen, with full motion video and sound working on a Toshiba Tecra Laptop. You can use mpv from text mode in OpenBSD 7.1.
Contains these 4 videos on how to use the GnuPG - Cleopatra encryption tool to encrypt files.
How To Use GPG To Encrypt And Decrypt Messages.mp4 How To Use PGP Encryption - gpg4win Kleopatra Tutorial.mp4 Using GPG (GnuPG) To Encrypt and Decrypt A File.mp4 How to use GPG to encrypt and decrypt messages - Kleopatra Tutorial Encrypting and Decrypting Files.mp4
>>15293 Bad for fans maybe, not gonn ahurt much else provided its cooling properly. I have a 18 year old thinkpad I bought used about 6 years ago and I run it 24/7. Fan has shit the bed but only cost like 7 bucks to replace. The only things I would be worried about are cheap stuff and things with terrible thermals. but if it's cooling properly should be no issue running it all the time.
Hey anons. Anyone here know of a good e-mail hosting service on TOR that isn't a honeypot or a shittily-hosted mess? Looking to make an inbox that won't get deleted off the face of the earth or get me arrested. (I'm not looking to commit crimes, but can't take any chances)
DISCUSSION THREAD II Want to say something off topic about anything?
Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?
Want to chat with your fellow invisible 7 proxy friends?
Want to tell Lt. Gen Michael Hayden, Lt. Gen James Clapper,GEN Keith Alexander, ADM Michael Rogers, GEN Paul Nakasone, GOOGLE, AMAZON, FACEBOOK, Microsoft, Apple, etc. how you feel?
The pci_disable_device function is defined in the source file of the kernel pci module. Let the pci_disable_device function be a working parameter of the kernel pci module...
Antivirus and security software should use a second video card modulated for them.Anonymous09/04/2022 (Sun) 00:32[Preview]No.1813del
A strange thing happened last week. My router got bricked, for no apparent reason while I was at school. I replaced it when I came home, and after 5 hours of work I had the core of my network back up and running. It might have been an electrical failure, but I don't know... If it was a cyber-attack, it was professional.
Anyhow after that happened, I restored all of my services, however I can't seem to restart my tor hidden services anymore from my server. Tor works but the hidden services won't start. I have to comment them out in the torrc file to get tor to start. Anyways, they're down until I have some more free time to troubleshoot what the issue is. I'm backlogged with school work and assignments, so it might be down for a while. All very strange...I'll take another look next weekend and see if its fixable.
>>1828 The hidden service is back up. I'm now using the stock tor daemon from the package manager to run it. I needed to change some directory permissions to get it running. I have to build a new modded version of tor from the latest source code, but it will have to wait until I have some free time.