420chan now has a web-based IRC client available, right here
Leave these fields empty (spam trap):
You can leave this blank to post anonymously, or you can create a Tripcode by using the float Name#Password
A subject is required when posting a new thread
[*]Italic Text[/*]
[**]Bold Text[/**]
[~]Taimapedia Article[/~]
[%]Spoiler Text[/%]
>Highlight/Quote Text
[pre]Preformatted & Monospace text[/pre]
1. Numbered lists become ordered lists
* Bulleted lists become unordered lists


Community Updates

420chan now supports HTTPS! If you find any issues, you may report them in this thread
How do I dark net? thank you plz by hodo - Thu, 23 Feb 2017 09:01:16 EST ID:08DuF1gj No.120649 Ignore Report Reply Quick Reply
File: 1487858476786.jpg -(736149B / 718.90KB, 1920x1080) Thumbnail displayed, click image for full size. 736149
I want drugs and drug accesories for my uh glaucoma
3 posts and 2 images omitted. Click Reply to view.
JarvisBardfoot.ffo - Sun, 26 Feb 2017 14:06:07 EST ID:WbP0sAtB No.120674 Ignore Report Quick Reply
Most of the info in this thread is outdated...
I'd suggest using the Tails operating system, Windows is closed source, so you could hypothetically be spied on.

Once you've got Tails up and running from a flash drive, you're free to do pretty much whatever you want without fear of being spied on.
I would however recommend using the easy-to-use Tor button on the browser's toolbar and set the security to maximum. You will have to do this every time that you boot tails unless you configure persistence, which is not recommended. You can also play around in NoScripts settings, and increase your security by setting things like only allowing scripts to be served over HTTPs, etc...
SophieDuckstone.pif - Wed, 01 Mar 2017 23:29:53 EST ID:PJ1PGSlD No.120687 Ignore Report Quick Reply

MarthaHugglewill.ace - Thu, 02 Mar 2017 15:41:25 EST ID:TFkw85AE No.120696 Ignore Report Quick Reply
1488487285464.png -(4731B / 4.62KB, 441x184) Thumbnail displayed, click image for full size.
Get torbrowser bundle install. Run, check setting on the onion on the top left corner, under security setting set to high. In firefox with tor in the url do about:config. Click any setting and click j or ja, this will bring you to javascript settings, toggle to false.

Onion sites need tor to work, that is all there is to it.

These security settings will block your IP for being forwarded. You can test this with a regular browser, google dnsleak test, it will show your IP that your Internet provider assigns you. Then do the same with tor browser bundle, you should see an unfamiliar IP address.

To get started I guess the default is to search thehiddenwiki. Then go from there.

Note that with tor updates it may default the settings for tor to be minimal in out-of the-box -security
as when it was first installed. Do not install javascript, flash, just keep it as is except the few security
changes you make.

From there there are many sites other than hidden wiki, from hideniki there are links as well.

As for bitcoins, I have now clue how to purchase online stuff with these.
MarthaHugglewill.ace - Thu, 02 Mar 2017 16:00:34 EST ID:TFkw85AE No.120697 Ignore Report Quick Reply
1488488434464.png -(50527B / 49.34KB, 668x402) Thumbnail displayed, click image for full size.
To expand, you can encrypt your DNS resolver, with dnscrypt. It's easy to work with.
This is without tor. With tor likely even better. Keeping uour dns logs from your isp, even if nothing is going on, why let them keep every query for what 3 years?
As well the dns resolving with these is actually faster to broswse, load web pages, prevents snoopin in the middle and from your isp knowing what you are visiting and and a few exploits that were pretty hazardous at a time, they still exist.
KLEZ.fml !!cEQLOiCj - Wed, 08 Mar 2017 01:55:34 EST ID:DMlKCodu No.120731 Ignore Report Quick Reply
Alright, so you do your dns resolutions through an encrypted tunnel and ???
The ISP will still know the IP addresses you communicate with unless you're using a VPN tunnel... and in that case, shouldn't your DNS resolution be done through the VPN as well? What is the use case for this?

Best coinbase replacement by MollyDicklefoot.drv - Sun, 05 Feb 2017 23:58:04 EST ID:DuOmYTnE No.120545 Ignore Report Reply Quick Reply
File: 1486357084402.jpg -(1406133B / 1.34MB, 2304x4096) Thumbnail displayed, click image for full size. 1406133
So it took me a month to set up my verification and payment methods with coinbase and it was working great for 4 months or so. I used jt to Buy 200-400$$ worth of legal domestic rcs from a private vendor. I used pgp to communicate and all that shit. Then all of a sudden they cancel my account and tell me to remove my remaining coins intk another wallet. Customer service didnt help and wouldnt tell me why they shut me down. Any alternatives to coinbase that are easy and can take debit cards or even checking accounts that arnt a pain in the ass or charge rediculous markups? Ive looke d around and cant find anything good that operates in newyork. Im trying cex.io but i cant seem to tell if i can send funds to other wallets/addresses.

>Tldr best bitcoin buying service in the u.s that is simple and takes basic forms of payment? Preferably Android compatable and doesnt have long wait times or high fees? Thanks please halp
MollyDicklefoot.drv - Mon, 06 Feb 2017 00:01:17 EST ID:DuOmYTnE No.120546 Ignore Report Quick Reply
Ive googled around and it seems there are dozens of other users that got their accounts canceled without reason or warning. It seems lije bitcoins harser and harder to aquire.
breakabond - Tue, 07 Feb 2017 15:51:29 EST ID:fVWGPSRj No.120552 Ignore Report Quick Reply
Try and tell me if they're any good.
breakabond - Sun, 12 Feb 2017 07:41:02 EST ID:fVWGPSRj No.120589 Ignore Report Quick Reply
Did you try it?
SophieDuckstone.pif - Wed, 01 Mar 2017 23:35:33 EST ID:PJ1PGSlD No.120688 Ignore Report Quick Reply
yeah, coinbase monitors the blockchain and shuts you down for suspicious business.
rinse yr coins, tumble that shit, at least pay the satoshis to send from a different wallet

What actually is hacking by LillianShakefield.inf - Thu, 16 Feb 2017 14:07:21 EST ID:GZFZaHwx No.120594 Ignore Report Reply Quick Reply
File: 1487272041088.jpg -(9181B / 8.97KB, 181x242) Thumbnail displayed, click image for full size. 9181
Hello, im getting into computers more and more and im learning to code. Im hoping to go on i2p and see what its all about; i am a curious person and i think i could one day be victim to hacking. So i want to be redpilled on hacking, i want to know how it works so i can protect myself and know what to look out for (also i kind of want to be a master hacker!)
2 posts omitted. Click Reply to view.
FuckingCrillerlodge.gid - Fri, 17 Feb 2017 09:34:44 EST ID:TLfejrZY No.120598 Ignore Report Quick Reply
How is that naive? Because I didn't give a sufficiently convoluted example of what getting ahold of a password would allow you to do?
GrahamDankinshaw.pub - Fri, 17 Feb 2017 09:58:35 EST ID:Pz4wNt2s No.120599 Ignore Report Quick Reply
I didn't mean it as an insult, just that it presents a view of 'being hacked' that isn't very realistic in my opinion.
Someone shoulder surfing and viewing your password isn't particularly common as I understand it, neither is the inside attacker example of the IRS employee that common.

The post didn't outline some of the increasingly common ways of being exploited for money that one might be exposed to.

The advice about using uBlock and NoScript is great though, and the more people who understand this the better.
Keep your shit up to date, don't browse sketchy sites and use a javascript/flash blocker for sites you don't trust.
CedricClillytad.pm6 - Wed, 22 Feb 2017 01:57:21 EST ID:bZov54Qk No.120618 Ignore Report Quick Reply
I'd be far more concerned with the fact that you work a job for likely a massive corporation. That is where you'll have your case of Identity Theft start. Some fatass nerd isn't getting your data from your desktop unless you are 60 and install everything that says "Install" on the internet. They hit databases which you have no access to so if you work or anything like that, ur fukt m8
KLEZ.fml !!cEQLOiCj - Tue, 28 Feb 2017 18:37:11 EST ID:DMlKCodu No.120681 Ignore Report Quick Reply
Who says you need a password? With Yahoo mail you can just forge the web authentication tokens and you're already logged in.
ShitNodgesud.fnt - Tue, 21 Mar 2017 15:39:16 EST ID:DVon6JAN No.120786 Ignore Report Quick Reply
Great to hear your learning to code. Code is the win and the starting point of all hackers!

You almost definitely a victim of hacking.
Bet you've been pwned.

Defending against hacking is an ethereal goal. Who are you defending against? Nation states, script kiddies or just generally want good security...?

Start by updating all the things all the time including your routers, phone and printers. Don't use any internet of shit. From there the tinfoil intensifies...

Hacking is just making do things that they are not supposed to do. It's a way of thinking more than anything else. Do not get trapped by the preconceptions forced upon you; think of your goals and think about all and anyway to get there. The original hackers were just modding the fuck out of there systems to make them do crazy things. GNU/Linux was conceived out of hacking culture. Speaking of which learn unix especially GNU/Linux based systems.

Phantom Malware? by ShitDrullermat.grp - Wed, 22 Feb 2017 03:10:43 EST ID:QvQUdiEY No.120620 Ignore Report Reply Quick Reply
File: 1487751043990.png -(9748B / 9.52KB, 368x366) Thumbnail displayed, click image for full size. 9748
Hey /Tech/ I really need some help to figure out if I've got a real problem on my hands here

I was doing some research earlier and while looking at a fcuking website about the chinese calendar I got this warning. Thought nothing of it at the time, avast flasg everything catches nothing

But then it start to pop up again, and again. And Now I'm worried. I figured this would just be some basic malware but I can't find any trace of it in my program files or with a search. Googling did reveal a few people talking about how it can spread to USB drives, so that's got me afraid.

So I've got three questions and I'm really, really hoping one of you can help alleviate my paranoia. I've got a D&D campaign to run on line tomorrow and I really don't need this shit fucking up my computer.

So I've got three questions that I haven't been able to get a clear/recent answer for:

  1. What is this, and how worried should I be?
  2. How Do I find it and kill it on my system? Do I need to do a system restore or download a specific removal tool?
  3. How fucked are my External hard drives? I've got over 2 terabytes of stuff I literally can't replace, I'm freaking out

Thanks in advance
I unplugged my External hard drives, but I'm afraid I wasn't quick en
4 posts omitted. Click Reply to view.
SimonChadgeshaw.eps - Sat, 25 Feb 2017 22:37:39 EST ID:be0iES5W No.120672 Ignore Report Quick Reply
Run a virus scan on your external drives, your whole computer. I assume nothing was altered. Even if so to spread to external drives is not the initial mission of windows viruses in general, it is to infect the host system and often to propagate to other computers by means of other computers and their users vulnerabilities, e-mail, sharing files online. Say a chain e-mail was called, funnycat.jpg.msi funnycat.jpg.exe, instant virus. But most email services would catch this when scanning it, by a person if they downloaded say pornography from an unknown site, which what isn't, and called hotvid.mpg.exe, or.msi, and especially if vid is say 120kb, instant virus. I think you just visited a site where it tried to infect your computer but your anti-virus picked it up without any issue. VBS:Malware.gen isn't uncommon of a name that an anti-virus will call it by it's action to infect, often it is simply a false positive.

I see these enough and basically it may be trying to alter something but in your case likely nothing was altered
at all. You will see these in browser, email caches often enough if you look. Opera sounds like the browser and benign so I don't see what is going on ig you use Opera, but using a limited account, always, not an administrator
account to browse, email, there should be no issues. Except if one downloads a virus and executes it.

Like a movie that is movie.mpg.msi movie.avi.exe, and is like merely 120kb, where it should be more like
750MB, instant virus. In all nothing was altered, just blocked from trying to do whatever it was trying to
accomplish. External drives aren't much targeted, just the host computer and to propagate to others
computers through email, social media, etc.

Like if a social media or site wants one to download 'their' 'downloader' or 'media player' be leery.
CorneliusFuckingwill.fla - Sun, 26 Feb 2017 01:19:02 EST ID:vsAOdj9g No.120673 Ignore Report Quick Reply
Where are you from and why do you type like that?
JarvisBardfoot.ffo - Sun, 26 Feb 2017 14:14:53 EST ID:WbP0sAtB No.120675 Ignore Report Quick Reply
1488136493972.gif -(719045B / 702.19KB, 448x252) Thumbnail displayed, click image for full size.
That's a connection for the Opera web browser... It's a false positive. I really wouldn't recommend Avast, just use uBlock Origin with anti-malware filterlists. the only reason I could see for using an antivirus nowadays is if you install software regularly, e.g, cracked games. But you won't even get malware from those most of the time if you get them from decent sources like private trackers.

What are you on about?
>Millions of other folks!!!
Do millions of people even use Opera anymore?
KLEZ.fml !!cEQLOiCj - Sun, 26 Feb 2017 15:14:11 EST ID:DMlKCodu No.120676 Ignore Report Quick Reply
1488140051508.jpg -(39748B / 38.82KB, 555x448) Thumbnail displayed, click image for full size.
Word salad.
PhyllisCranningstone.mp3 - Mon, 27 Feb 2017 20:50:16 EST ID:nNEdDLkb No.120677 Ignore Report Quick Reply
1488246616448.jpg -(44157B / 43.12KB, 480x451) Thumbnail displayed, click image for full size.
install gentoo

MITM service Cloudflare leaked all your data by EstherNosslewure.pm5 - Thu, 23 Feb 2017 19:44:29 EST ID:Pz4wNt2s No.120662 Ignore Report Reply Quick Reply
File: 1487897069481.jpg -(215375B / 210.33KB, 700x530) Thumbnail displayed, click image for full size. 215375
Not only is it leaking uninitialised memory, reminiscent of heartbleed, but they're doing it in HTML replies, meaning that your shit is probably cached all over the place. Good job CIA!

1 posts and 1 images omitted. Click Reply to view.
EstherNosslewure.pm5 - Thu, 23 Feb 2017 19:58:37 EST ID:Pz4wNt2s No.120664 Ignore Report Quick Reply
1487897917481.png -(56298B / 54.98KB, 802x324) Thumbnail displayed, click image for full size.
Here's Cloudflares report, but it very much downplays the impact. Basically if you visit any of cloudflares customers that you consider important, or if you recycle passwords, you should probably change them. To give you an idea, i've attached an image of sites which proudly claim to use cloudflare. I didn't want to make an account to expand the list (the site uses clodflare...)

HamiltonBlashbet.grp - Thu, 23 Feb 2017 22:56:16 EST ID:3ndE/89I No.120665 Ignore Report Quick Reply
You're not secure, all that shit you put online or have taken and put online by others has never been secure. How is this even thread worthy?

Hell, after a certain group of data breaches, my entirety of information including SSN was leaked because of my employer. Then again, when 100k people have their information dumped, only a handful get identity fraud/theft. Who even cares anymore. If people steal your shit, there isn't debtors prison and credit is a scam anyways.

I don't give a fuck, neither should you. Stop worrying.
ElizaSeffingford.chm - Fri, 24 Feb 2017 02:15:06 EST ID:qaJ3iinO No.120666 Ignore Report Quick Reply
If the first thing you think about is your government identity, you are way behind. Personal information is increasingly weaponized and it only takes a handful of Bulgarians to initiate a blackmail campaign a la Ashley Madison. I'm glad you don't have anything to hide though.
LydiaChunnerwater.pif - Fri, 24 Feb 2017 10:49:04 EST ID:FtUa1Cfw No.120667 Ignore Report Quick Reply
Even employers run a credit check on applicants. Credit cards are a scam, your credit rating is actually something to care about these days.
CarolinePickspear.cfml - Sat, 25 Feb 2017 15:21:22 EST ID:be0iES5W No.120671 Ignore Report Quick Reply
>Then again, when 100k people have their information dumped, only a handful
>get identity fraud/theft.

Because? Security measures. Info is sold by the tend hundreds, thousands.
For mere dollars for each CC info. If out of say a hundred one buys if they can
get each for a dollar and can get a few thousand out of 3, 5, scam methods they
are doing pretty well in a criminal aspect. Those who sell the info do far better.

An associate got all his cards blocked everywhere he went on day, turns oput his banking system blocked the cards, they were being used, (trying to be) here and there, Mexico was the ultimate and initial flag. Who cares right?

Best Firefox Add-on to Kill Trackers and Cookies? by DavidBengerwitch.ffl - Mon, 19 Dec 2016 22:57:06 EST ID:l1O402xc No.120286 Ignore Report Reply Quick Reply
File: 1482206226524.jpg -(198128B / 193.48KB, 1437x1410) Thumbnail displayed, click image for full size. 198128
6 posts omitted. Click Reply to view.
CharlesNapperfot.pif - Fri, 23 Dec 2016 11:21:39 EST ID:4ZfFDuo3 No.120304 Ignore Report Quick Reply
Is there anything that watches javascript calls to see if any given site is pulling a bunch of information that may be used for fingerprinting? And if it crosses a certain threshold it sends up a warning.

So maybe if they're just checking for mobile and my resolution, that's ok. But then if it wants to know if I'm mobile, my resolution, my hardware, my battery, my plugins, my gyroscope, etc... I get a warning.

Is that even feasible, or am I not understanding how fingerprinting works?
JarvisDenkinfield.pdr - Tue, 27 Dec 2016 14:35:05 EST ID:E8lJOGQX No.120332 Ignore Report Quick Reply
Unless some specialized heuristics could be developed for it, it would just be a cat and mouse game for every type of JS info gathering.
For now we just block all JS.
HughBigglefield.lsp - Thu, 05 Jan 2017 23:14:24 EST ID:oTMtAlbe No.120399 Ignore Report Quick Reply
RequestPolicy shows every off-site request that a website makes. Won't show you exactly what information, if any, the scripts are collecting but it's useful to prevent shady/unnecessary things from running.
MarthaBlevinglock.inf - Sat, 07 Jan 2017 20:12:00 EST ID:zICvPMz4 No.120413 Ignore Report Quick Reply

I already have 3rd party scripts blocked with uMatrix. Would that do the same thing? I've left 1st party script running globally, to avoid having dealing with tweaking every single site, but maybe I should just be more selective. I figured blocking 3rd party scripts by default would at least slow down the biggest data collectors.

In other news, Firefox is integrating an anti-fingerprinting technique from torbrowser, to stop people from fingerprinting by checking for fonts: http://news.thewindowsclub.com/firefox-52-font-fingerprinting-protection-87818/
OliverDamblefuck.gif - Thu, 23 Feb 2017 11:13:32 EST ID:UvAnsQZS No.120651 Ignore Report Quick Reply
I just found out there's a firefox extension that helps block canvas fingerprinting: https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/

Also, PaleMoon (firefox derivative) has a setting in about:config called canvas.poisondata, which does the same thing.

As an aside, if you've been using Stylish, it's been bought out and is now leaking data. You may want to switch to a clone.

Hypothetical rigs by CharlotteDezzlebanks.psp - Sat, 11 Feb 2017 13:48:00 EST ID:e8z4WX1S No.120579 Ignore Report Reply Quick Reply
File: 1486838880264.jpg -(1858221B / 1.77MB, 3264x2448) Thumbnail displayed, click image for full size. 1858221
I r knot good wit compootar hardcoreware, therefore, I was wondering if you glorious PC gaming master race fellas could help a brother out.

Simple question really, is PC parts picker reliable as far as wattages and compatibility goes? or, if you wanna look at it from an another angle, would all this shit fit in the case and not fry due to the heat?


Yes, I am well aware that you can build something better with a beefier CPU and possibly a RX 470 or a 1060, but I'm a poorfag on a budget and I'm picking parts that I can get cheap and nearby.
BeatriceSmallwell.deb - Sun, 12 Feb 2017 03:54:37 EST ID:Yx3h83S3 No.120583 Ignore Report Quick Reply
I wouldn't get an Apple II, I don't think you'd even be able to watch YouTube on it OP.
CorneliusBimblebone.ace - Mon, 13 Feb 2017 13:27:57 EST ID:PUbnWT1r No.120591 Ignore Report Quick Reply
choose the i3 6100 instead, buy Kingston rams
IsabellaFuckingdale.pct - Mon, 13 Feb 2017 20:39:42 EST ID:Mw0E3xZ0 No.120592 Ignore Report Quick Reply
Don't buy that shitty Thermalfake PSU. Get an EVGA or a Corsair. I don't care what kind of deal you're getting on that PSU, DO NOT cheap out on the PSU.

Other than that, everything is fine. the GPU and CPU both sip power so you really don't need to worry about wattage and cooling capacity.
HamiltonWorthingfuck.xsl - Sat, 18 Feb 2017 03:21:52 EST ID:mf8RJ3vb No.120603 Ignore Report Quick Reply
I wouldn't rank Thermaltake below EVGA and Corsair. I don't think any of them actually make any of their PSUs. If you want to be a PSU snob, Seasonic is the typical go-to.
CedricClillytad.pm6 - Wed, 22 Feb 2017 01:58:50 EST ID:bZov54Qk No.120619 Ignore Report Quick Reply
If it is anything like the Newegg PSU calculator it is grossly overcompensating for scenarios that probably have happened to 1% of the entire extreme PC population. Let alone the rest of computer users.

Lifes gud by CorneliusClayhall.eps - Sun, 19 Feb 2017 05:14:32 EST ID:GZFZaHwx No.120606 Ignore Report Reply Quick Reply
File: 1487499272775.jpg -(5923B / 5.78KB, 205x246) Thumbnail displayed, click image for full size. 5923
So i have been saving up and im getting a raspberry pi, im gonna put puppy linux on it. Im hoping to use it for learning code so i can become a master hacker aswell as acing my ict technical. Will this set up be capable of running i2p because im hoping to have a look on there also.
CharlesPabberman.fla - Sun, 19 Feb 2017 08:30:46 EST ID:mf8RJ3vb No.120608 Ignore Report Quick Reply
I wonder if there's a way for you to find out if you an run i2p without wasting someone else's time.
WesleyShittingcocke.xif - Sun, 19 Feb 2017 18:53:39 EST ID:/m9bpAQh No.120609 Ignore Report Quick Reply
Even if it was possible I think OP is making a valuable contribution to this board by blogging about it.

Good luck OP!
ElizaGesslewater.sys - Mon, 20 Feb 2017 08:18:38 EST ID:Pz4wNt2s No.120612 Ignore Report Quick Reply
>im getting a raspberry pi
What number revision?
You can visit i2p and tor on your phone if you don't want to get caught looking at young people
WesleyCeblingdale.pak - Mon, 20 Feb 2017 10:42:34 EST ID:GZFZaHwx No.120614 Ignore Report Quick Reply
>>120612 im getting the 64 bit pi 3 b. Im not into kiddie porn, i want to get involved with hacking furthermore Im a curious person and want to see what the darknet has to offer.

Android tablet audio out problems + 2 other small ?'s while I'm here by JennySenkinchire.mov - Sat, 04 Feb 2017 20:32:13 EST ID:/FoMKqsY No.120530 Ignore Report Reply Quick Reply
File: 1486258333019.gif -(1076694B / 1.03MB, 224x400) Thumbnail displayed, click image for full size. 1076694
I've tried turning it off and on again but that didn't help ¯\_(ツ)_/¯
For some reason when I woke up this afternoon, my tablet's out sound is kinda pretty fucked. One side/channel is messed up; when I go watch some Texan bassin' or science news short video, the main/vocal channel(/s?) Is pretty corrupted/corroded and at half volume but the transition & sound effects' side of things is just fine. I tested VLC too and it seems to be a tablet-wide issue where one side/channel is super fucky, but the little back speaker is just fine as far as little tablet back speakers go. I'm on a Nextbook NX785QC8G running 4.4.2.

small question #1: anyone know what extension Android Chrome bookmarks are so I can search for em, copy and send them to my protonmail for backup & universal access?

small question #2: can I get some recommendations for some good & hassle-free online storage/backup? Lookin' for 20-30GB range.

Thanks for any tips and advice!
7 posts and 2 images omitted. Click Reply to view.
BasilBrazzlefuck.xcf - Sun, 05 Feb 2017 23:20:54 EST ID:5LA+HatB No.120543 Ignore Report Quick Reply
This is where your bookmarks are on Android. This result was from a 5 second google search.
Bookmark Import Tool is also an app for Android that you can use to import bookmarks.
You can't even use google and call other people clueless.
BasilBrazzlefuck.xcf - Sun, 05 Feb 2017 23:31:08 EST ID:5LA+HatB No.120544 Ignore Report Quick Reply
But the thing is, Chrome is based on your Google acc everywhere. Your bookmarks should be synced to your google account. So anywhere you want to use your bookmarks, you just have to install Chrome on any device and you have them. I don't understand why do you want to back it up. It's stored on your google account. Anywhere you have internet access and a way to install chrome on any device, you will have your bookmarks. These are your means to back them up anyway though.
SophieBazzlefuck.jpg - Sun, 19 Feb 2017 20:38:17 EST ID:/FoMKqsY No.120610 Ignore Report Quick Reply
1487554697479.gif -(1398676B / 1.33MB, 256x196) Thumbnail displayed, click image for full size.
omfg... if it really was that fucking simple to just find it through file explorer, then I wouldn't have ever had to know that such a shitsnot like you even existed. I. NEED. TO. KNOW. THE. EXTENSION. TO. SEARCH. FOR. IT! How is simple english so hard to understand.

And what's so wrong with preferring a secure email service and digging the reason & story of it's creation. Maybe I like a clean & ad-free layout that isn't forcedly/secretly linked to some stupid social media bullshit ad/data corp. What's so wrong with wanting a email address from a new service so that I can use my own damn name without having to purposely mispell it with a bunch of silly numbers in it to be valid or have it look like stupid emo middle school sped drama crap with three x's in it like yours does.

How fucking dense you are to not plainly see that I just DON'T want to have to use Google everywhere, or have to force friends and family to install Chrome just so I can look up a bookmark. If you just don't know the extension, then go back to your soap operas, simple as that.
BetsySullylet.sh - Sun, 19 Feb 2017 22:36:31 EST ID:mf8RJ3vb No.120611 Ignore Report Quick Reply
>And what's so wrong with preferring a secure email service and digging the reason & story of it's creation.

I wouldn't call Protonmail secure, but if you're having trouble with bookmarks I don't think you'd be able to keep up with that conversation.
ElizaTrotbanks.lit - Mon, 20 Feb 2017 10:32:04 EST ID:PUbnWT1r No.120613 Ignore Report Quick Reply
it's .bak you fucking illiterate retard, what are you gonna do with that??? you can fucking EXPORT IT FROM THE BROWSER WITH A BUILT IN MENU SO YOU CAN SAVE IT or whatever you want you fucking retard

Liability for data breaches by NigelModgeback.grp - Fri, 17 Feb 2017 11:38:07 EST ID:ZW4S8o4m No.120600 Ignore Report Reply Quick Reply
File: 1487349487365.webm [mp4] -(130462B / 127.40KB, 1280x720) Thumbnail displayed, click image for full size. 130462
How much liability do you think companies should face when they get hacked and lose millions of people's data? And a related question: if a software vendor sold software that had flaws that allowed the breach to happen, do you think they should share that liability?

Today when a company loses all your information, they get a slap on the wrist. I think the idea is that you don't want to punish companies for disclosure/transparency, so you keep the penalties low. But the low penalties seem to encourage companies to skimp on security. What do you think is the right balance?

I work at a company that had a massive breach, they were really open with disclosure, but really haven't tightened up IT and security in the wake of the attack. Something seems off to me.
MartinDartshaw.ini - Fri, 17 Feb 2017 14:40:16 EST ID:i0PXKiOD No.120601 Ignore Report Quick Reply
tangent question here

how responsible/liable are the IT security people after a breach? (my family wants me to get into IT security, but I don't want to for the reasons below)

because I figure a sophisticated enough and skilled enough hacker can always get through. I mean look at google and major banks (which probably spend hundreds of millions on security every year). your mom and pop's shop or mcbusiness isn't going to keep out determined elite black hats.
FannyGoodfuck.pcl - Sun, 19 Feb 2017 05:34:16 EST ID:7F/QA+Tm No.120607 Ignore Report Quick Reply
Came here for the zero-g anime boobs.

Onto your questions, nobody skimps on security on purpose it's just that the more complex a system gets the more vulnerabilities there will be.
And web sites are pretty much the same level of complexity overall, it's just that your mom&pop will rely on third party code to archive that complexity while the fortune 500 will do may things from scratch.
In the end it's up to the developers to make sure security requirements are met, and a IT security guy is just a developer that checks code of lesser skilled developers because his labor is more expensive.

Samsung and Linux by CharlotteClayforth.xsl - Tue, 07 Feb 2017 20:23:28 EST ID:mb2Ul3ij No.120554 Ignore Report Reply Quick Reply
File: 1486517008351.jpg -(3273965B / 3.12MB, 3583x3450) Thumbnail displayed, click image for full size. 3273965
I want to put Linux on a samsung phone and still receive telephone and sms calls.
Is it possible?
2 posts and 1 images omitted. Click Reply to view.
NathanielFurringstit.dll - Tue, 07 Feb 2017 23:36:16 EST ID:PUbnWT1r No.120559 Ignore Report Quick Reply
Tbh I don't think it's worth it. Even if it's possible. I've installed Linux on my Lenovo tablet once. It worked but wasn't worth the effort. And that was a tablet with no SIM slot.
If you use the internet google is pretty much already up in your ass, so you're not gonna avoid shit. what are your reasons?
IanChenningwater.qif - Wed, 08 Feb 2017 13:44:03 EST ID:bSDpvMmi No.120562 Ignore Report Quick Reply
I have an LG tablet I want to try it on.
See how it works.
GeorgeDrindertet.bfc - Fri, 17 Feb 2017 15:23:02 EST ID:0L5Zz6N7 No.120602 Ignore Report Quick Reply
Any answers?
BasilGibblechot.raw - Sat, 18 Feb 2017 04:42:52 EST ID:sJXntp5k No.120604 Ignore Report Quick Reply
you should be looking into android modding forums there's a whole community for this shit. It's been years since I've kept up to date though. idk what the scene is like or which sites know what.
JamesGreenshit.ffo - Sat, 18 Feb 2017 16:38:22 EST ID:7F/QA+Tm No.120605 Ignore Report Quick Reply
My cheeky response would be: It already runs Linux (no srsly it has a linux kernel)

That said just install this:

I've even used this with a bluetooth keyboard and a tablet as a makeshift laptop replacement for programming.

wp-admin by AugustusDuckbury.ico - Mon, 13 Feb 2017 07:37:31 EST ID:TaiFR2gU No.120590 Ignore Report Reply Quick Reply
File: 1486989451396.jpg -(67925B / 66.33KB, 500x332) Thumbnail displayed, click image for full size. 67925
Sup ya'll, I'm not sure how many of you are website designers or have ever dealt with wordpress.. I'm having trouble understanding /wp-admin and why the URL can't be changed easily. Seems like a security flaw to me! Anyone successfully changed it/protected it/whatever?

tld;dr wordpress admin login is bait.

picture unrelated
AugustusBlottingchedge.dot - Tue, 14 Feb 2017 17:42:38 EST ID:BhKn+qO0 No.120593 Ignore Report Quick Reply
I don't know WP, but sticking HTTP authentication on it should be sufficient.
AlbertChommlemere.gif - Thu, 16 Feb 2017 18:38:03 EST ID:QpAXEJ+W No.120595 Ignore Report Quick Reply
Install iThemes Security. It gives you the option to change the login slug and prevent access to the default ones (wp-admin and wp-login.php), plus a ton of other useful features.

You can also do this yourself by hooking template_redirect (or some higher-priority action, but this one usually works) and overriding WordPress's default behavior for those URLs.

>Seems like a security flaw to me!
Yep. WordPress isn't hard to secure, but out of the box it's weak as hell.

<<Last Pages Next>>
0 1 2 3 4 5 6 7 8 9 10 11 12 13
Report Post
Please be descriptive with report notes,
this helps staff resolve issues quicker.