/os/ - Online Security

News, techniques and methods for computer network security.

Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.

Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
11 posts omitted.

Anonymous 03/21/2017 (Tue) 02:50:26 [Preview] No. 859 del
Useful to use before proxycheck.sh because it is much faster like seconds for a thousand proxies. But proxycheck.sh is still useful because it weeds out the proxies that give certificate errors in the google or youtube check.

Endwall 05/23/2017 (Tue) 03:33:49 [Preview] No. 925 del

Good catch. OK thats definite masonic lingo there. Not sure about the logo, it looks like the doppler effect. Just because the website has masonic references doesn't mean that the software doesn't work. I haven't tried it personally, but I liked the advertised anti-systemd approach. I think a disclaimer is in order, rather than a removal of the link. What are your thoughts?

Anonymous 06/22/2017 (Thu) 19:04:55 [Preview] No. 944 del
It already is a disclaimer of sorts but I am pleased you added it to the post where it was linked. (completely not neccisary) I actually trust this more because they are more forthcoming to the vidion of the project. You look at CISCO's logo it is not only the golden gate bridge it is the markings like you see on a ruler. Why is CISCO using ruler indentations as its logo? You look at GNU its baal. Heads tells you they are insiders in the first sentence. This could prove to make it not compromised as it could be using the reputation of this proffesional mens club to vet itself. Or it could mean there is a backdoor of some kind. An eye in the iso. I would check it out but not immediatly choose this os as something to use in a time of elites ruthlessly vying for power.

Anonymous 06/22/2017 (Thu) 19:12:15 [Preview] No. 945 del

Welcome to Online Security: Sticky Thread Endwall 07/13/2016 (Wed) 03:11:01 [Preview] No. 181 [Reply]
Hello and Welcome to /os/, Online Security.

This is a board for the discussion of online security / privacy / news in the privacy world.

1.Follow the global rules
2.No Spam
3.No Classified Documents or leaks of Classified Documents or Files (News articles, or commentary about the documents or files is OK)
4.No Child Exploitation Material
5.Images should be safe for work and relevant to the post or thread, commentary can be NSFW
6.No Advertisements of Hacker Services or Solicitations for Hacking Services

Related Boards

Message too long. Click here to view full text.

Edited last time by Endwall on 07/24/2017 (Mon) 11:42:45.

Sticky Bump Endwall 10/23/2016 (Sun) 18:54:40 [Preview] No. 624 del
TENS , https://spi.dod.mil/lipose.htm , US Air Force Live CD <-- online banking for mom and dad.
LibertyBSD http://libertybsd.net/ , https://libreboot.org/docs/bsd/openbsd.html
Edited last time by Endwall on 01/02/2017 (Mon) 11:03:40.

Sticky Bump Endwall 04/30/2017 (Sun) 03:29:12 [Preview] No. 894 del
Heads https://heads.dyne.org/ http://fz474h2o46o2u7xj.onion ; Devuan non-systemd version of Tails (Disclaimer: Website/Project has masonic references)
Devuan https://www.devuan.org/ http://devuanzuwu3xoqwp.onion
Systemd Free http://systemd-free.org/
Edited last time by Endwall on 05/23/2017 (Tue) 03:42:52.

Endwall 06/01/2017 (Thu) 08:14:41 [Preview] No. 933 del
Mozilla Firefox Hardened Profile

Hardware Endwall 09/18/2016 (Sun) 18:31:31 [Preview] No. 580 [Reply]
Discuss hardware and alternative hardware concepts to increase computer and online privacy and security.
Edited last time by Endwall on 09/18/2016 (Sun) 18:50:04.
4 posts and 1 image omitted.

Anonymous 06/25/2017 (Sun) 05:10:11 [Preview] No. 947 del
Malinov Xi-8088

Dr. Scott M. Baker
Building an Xi 8088 PC-XT compatible Computer
https://youtube.com/watch?v=MW5lApN0gWc [Embed]
In this video, I build an Xi 8088, backplane, sound card, floppy controller, compactflash adapter, and VGA. Lots of soldering. For more electronics projects, see http://www.smbaker.com/


Sergey Kiselev


Anonymous 06/25/2017 (Sun) 05:16:19 [Preview] No. 948 del
Zilog Z80 Homebrew

Dr. Scott M. Baker
Building a Zeta 2 Single Board Computer
https://youtube.com/watch?v=wos_AmfgrrU [Embed]
Z80 Retrocomputing 16 - UNIX on RC2014
https://youtube.com/watch?v=1WG8zopGzaA [Embed]

Anonymous 06/25/2017 (Sun) 06:51:03 [Preview] No. 952 del
Monster 6502

Monster6502 Update #1
https://youtube.com/watch?v=HDMkw6lnzmI [Embed]

Monster 6502 Now Powers a Retrocomputer
https://youtube.com/watch?v=tQIwS2GzXLI [Embed]

Endwall 08/12/2017 (Sat) 20:06:08 [Preview] No. 1001 del
Zilog Z80

Parallax Propeller

On August 6, 2014, Parallax Inc., released all of the Propeller 1 P8X32A hardware and tools as open-source hardware and software under the GNU General Public License (GPL) 3.0. This included the Verilog code, top-level hardware description language (HDL) files, Spin interpreter, PropellerIDE and SimpleIDE programming tools, and compilers.[3]
Edited last time by Endwall on 08/12/2017 (Sat) 20:10:01.

Anonymous 08/21/2017 (Mon) 22:34:40 [Preview] No. 1002 del
>Minifree isn't recommend or trusted anymore
>a shop owned by Libreboot main developer is not trusted anymore
Okay, shill. Take your overpriced garbage list and go back to reddit. You really added nothing new to value. instead of pointing to actual hardware with libre support like wireless chipsets with ath9k firmware or marvell-chipset based routers with 802.11ac support or mediatek-based NAS that runs fully free software you posted some Libre© TecnoPenguin™ overpriced jew shit.

>Libre Tea Computer Card
>still not FSF approved after 2 years of screeching
>absolutely harmful hardware lifecycle model
>le 3d printed laptop meme, 1366x768 15" screen
>not knowing about Neo900 and Openmoko

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
441 posts and 3 images omitted.

Endwall 07/12/2017 (Wed) 20:19:05 [Preview] No. 981 del
Hak 5
Nuclear Power Plants Hacked, 1Password Goes Cloud - Threat Wire - Duration: 8 minutes, 53 seconds.
https://youtube.com/watch?v=X91U7M8ryFw [Embed]

Endwall 07/12/2017 (Wed) 20:27:26 [Preview] No. 982 del
Jupiter Broadcasting
Unsecured IO | TechSNAP 327
Posted on: July 11, 2017
GNUPG has just released a fix for a dangerous side-channel attack that could expose your private key, a leak of NASDAQ test data was picked up by real news organizations and caused a bit of a panic & the fascinating story of a security researched who managed to take over all .io domains with a little sleuthing and a few domain registrations.

Anonymous 07/13/2017 (Thu) 09:21:48 [Preview] No. 983 del
I keep forgetti, sorry for spaghetti.

Endwall 07/20/2017 (Thu) 06:01:44 [Preview] No. 986 del
Hak 5
FBI NSL Gag Orders Ruled Constitutional - Threat Wire - Duration: 5 minutes, 55 seconds.
https://youtube.com/watch?v=7WOrV9hDUg0 [Embed]

Endwall 08/12/2017 (Sat) 18:01:09 [Preview] No. 1000 del
Hak 5
WannaCry White Hat Hacker Arrested After DEF CON, The Facts So Far - Threat Wire - Duration: 10 minutes.
https://youtube.com/watch?v=9yROFK9aEUY [Embed]

Compile Thread Anonymous 11/27/2016 (Sun) 20:44:39 [Preview] No. 692 [Reply]
Endwall guy should keep irrelevant compile instructions in this thread by editing the OP or edit the Sticky thread before purging said irrelevant posts in various threads. Just remind them to compile from source and redirect them to this thread.
6 posts omitted.

Install torsocks from source Endwall 12/04/2016 (Sun) 06:01:50 [Preview] No. 710 del
Install Torsocks from source

$ su
# pacman -S git
# apt-get install git
$ mkdir -p ~/git
$ cd ~/git
$ git clone https://git.torproject.org/torsocks.git

or if tor is already running with previous version of torsocks
$ torsocks git clone https://git.torproject.org/torsocks.git

$ mkdir -p ~/tor
$ mv torsocks ~/tor
$ cd ~/tor
$ cd torsocks
$ ./autogen.sh

Message too long. Click here to view full text.

youtube-dl from git Endwall 12/04/2016 (Sun) 06:02:28 [Preview] No. 711 del
Install Youtube-dl from source git

$ cd ~/
$ mkdir -p git
$ cd git
$ torsocks git clone https://github.com/rg3/youtube-dl.git
$ cd youtube-dl
$ su
# torsocks pacman -S zip pandoc
# pacman -Rc youtube-dl
# exit
$ make
$ ls
$ cd ~/bin
$ ln -s ~/git/youtube-dl/youtube-dl youtube-dl
$ cd ~
$ export PATH=$HOME/bin:$PATH

Message too long. Click here to view full text.

Tor from git repo Endwall 12/04/2016 (Sun) 06:03:18 [Preview] No. 712 del
Clone tor from git repo


$ mkdir ~/git
$ cd ~/git
$ torsocks -i git clone http://dccbbv6cooddgcrq.onion/tor.git
$ cd tor
$ cd src
$ cd or
$ nano or.h
$ nano routerparse.c
$ nano circuituse.c
$ cd ..
$ sudo su

Message too long. Click here to view full text.

Anonymous 01/15/2017 (Sun) 22:04:32 [Preview] No. 797 del
is there reason to use torsocks over git's builtin socks5 proxy?

wouldn't it be better if you just register as http.proxy and https.proxy variable by git config?

Not sure what revision of git your distro ships with but using torsocks should be considered depreciated hack for applications with builtin socks5 proxy support.

Reop from source Endwall 08/09/2017 (Wed) 22:53:08 [Preview] No. 999 del
Install REOP from Source
$ mkdir -p ~/src
$ cd ~/src
$ endget --no-check-certificate https://www.tedunangst.com/flak/files/reop-3.0-snapshot.tar.gz
$ tar -xvf reop-3.0-snapshot.tar.gz
$ cd reop
$ ./configure
$ make
$ ./reop --help
$ cd ~/bin
$ ln -s ~/src/reop/reop reop
$ export PATH=$HOME/bin:$PATH
$ reop --help

Generate a key pair
$ cd ~

Message too long. Click here to view full text.

Edited last time by Endwall on 08/09/2017 (Wed) 22:57:34.

Tor Hidden Service Mail Server Endwall 08/08/2017 (Tue) 03:16:04 [Preview] No. 992 [Reply]
############### BEGINNING OF GUIDE ##########################

In this thread I document and revise how to set up a tor hidden service email server, you may substitute the servers that you are most comfortable with.

STEP 0) Collect the relevent files from The Endware Hidden Service
Set up a tor mail server using postfix or OpenSMTPd, with dovecot for imap or pop.

You may contact me anonymously at endwall@tmg3kli67jlbcduh.onion
Use endmail.sh to send mail to this account.

Encrypt with pgp and send messages and files by email on a tor hidden mail service on port 25.

Everyone should do this. Then just share your hidden service address and handle.


Message too long. Click here to view full text.

Edited last time by Endwall on 08/08/2017 (Tue) 08:07:49.
1 post omitted.

Endwall 08/08/2017 (Tue) 03:51:02 [Preview] No. 994 del
STEP 13) Air Gapping It

To add an extra layer of security we will be using A:\ drive floppy disks to shuttle the encrypted.asc messages to and from a dedicated airgapped encryption station preferably running openBSD on a non-intel architechture, SPARC, PowerPC, Alpha, etc. Do not use USB as a substitute for this step (STUXNET).

0. Your decryption station will have full disk encryption and be powered off when not in use
1. Generate your keys on the air gap
2. Export your public key,change the file permisions to read only and save it onto a floppy disk A:\
3. Take the floppy disk and sneaker net it to your transmision computer which has the hidden service and postfix on it.
4. Publish your anonymous user name and public key as well as the hidden service onion name using tor and icecat, links, or endcurl or however on your tor hidden service website or on a message board forum like endchan.xyz.
5. Recieve the hidden service onion name and public key of your correspondent ( by reading a published name,address and public key on a forum or other communication method or by recieving it in your inbox by postfix after publishing yours)
6. Save the public key of your correspondent onto a floppy disk A:\ change permisions to read only write a sha256sum checksum for the file and shuttle it to the decryption/encryption station.
7. check the file againts the checksum, and then gpg import the public key to your key ring
8. Type a message for your recipient in plain text on the air gapped encryption station and encrypt it to encrypted.asc. Delete the plain text file if unnecessary to archive especially if it is incriminating.
9. Write the encrypted message encrypted.asc to the floppy disk and change permisions to read only also write the sha256 sum of the file to the floppy if you have space.
10. Shuttle the message by floppy disk A:\ to the transmission computer and send to your recipient using endmail
11. You can also write the sha256 sum of the file or sha512sum of the file onto the disk before sneaker netting it.
12. You can include this sha256 checksum as another attachment to transmit to the recipient or as a second followup email

Message too long. Click here to view full text.

Edited last time by Endwall on 08/08/2017 (Tue) 04:21:15.

Endwall 08/08/2017 (Tue) 04:29:09 [Preview] No. 995 del
This protocol is now named:

Super Mega Maximum Communication Security Protocol (SMMCSP)

Maximum Security Electronic Mail Communications Protocol (MSEMCP)

Brought to you by the Endware Development Team (c) 2017.

Game On NSA.
Edited last time by Endwall on 08/09/2017 (Wed) 02:11:46.

Endwall 08/09/2017 (Wed) 02:08:23 [Preview] No. 996 del

This name is juvenile

I'm renaming it to:

Maximum Security Electronic Mail Communications Protocol (MSEMCP)

That's more descriptive of what it is. Its a standard now. Email me with endmail.sh if you set up a server after you test it.

The great thing about this system is that it is opensource, distributed, anonymous, transport layer encrypted, and the message is RSA 4096 encrypted by gpg. Currently you do not have to have a working server to submit mail to a server. So if you were part of a 10 man spy ring with a central node the field agents only need to learn how to use gpg to encrypt and to install swaks, tor, torsocks and use a variant of endmail.sh to report back to central command. Of course it can be used for server to server anonymous communications as well. Since it uses gpg several recipients can be addressed to one anon@hiddenserver.onion and then central command can distribute the messages to their intended recipients after the first decryption. So you could encrypt with a general wrapper that contains the meta data (to: field ) that central command uses to distribute the message to the person it is intended for, and then put the from: and subject: in the targeted encryption for that person that central command/dispatch can't read. So you'd have two gpg keys one public key for central command and then a public key for the intended recipient. The field agent would perform 2 encryptions the first for the recipient with the subject: and from: field in the plain text, and then the second encryption with the to: field in the plain text of of the encrypted file.

Anyways I'm now calling it the:

Maximum Security Electronic Mail Communications Protocol (MSEMCP)
Edited last time by Endwall on 08/09/2017 (Wed) 02:17:45.

Endwall 08/09/2017 (Wed) 22:02:09 [Preview] No. 997 del
Maximum Security Electronic Mail Communications Protocol (MSEMCP)


Maximum Security Encrypted Message Communication Protocol(MSEMCP)
Edited last time by Endwall on 08/09/2017 (Wed) 22:20:51.

Endwall 08/09/2017 (Wed) 22:17:11 [Preview] No. 998 del
Maximum Security Encrypted Message Communication Protocol (MSEMCP)

Author: Endwall from the Endware Development Team
Creation Date: August 8, 2017
Copyright: The Endware Development Team (c) 2017
License: You are Free to Study, Reproduce, Copy, Modify, Implement, Test, and Use this protocol as described below, in the spirit of the Endware End User License Version 1.15.


This protocol MSEMCP provides:
1. Message security through physical isolation of the encryption station by a read only Floppy Disk Message Sneaker Net (FDMSN)
2. Strong Public Key Cryptography using RSA 4096 bit.
3. Transmission and reception anonymity through Tor with 12 hops.
4. Trust and Verification through TLS 1.2 with RSA 4096 bit, and Self Signed Server Certificates to compare repeated server connections.

All of which can be implimented with 4 tools:
1) A Base install of a *nix BSD or GNU operating system in text mode.

Message too long. Click here to view full text.

Edited last time by Endwall on 08/09/2017 (Wed) 22:39:39.

Secure OSes Anonymous 05/09/2016 (Mon) 18:21:17 [Preview] No. 37 [Reply]
What is the best OS option for a secure setup?
How do OpenBSD and Linux with patches compare in terms of the security they offer?
58 posts and 2 images omitted.

Anonymous 04/09/2017 (Sun) 07:45:36 [Preview] No. 877 del
you can't have full disk encryption if you do that.

Anonymous 07/14/2017 (Fri) 11:39:42 [Preview] No. 984 del

It's not ready still, the damn download link doesn't work. I suspect that it's still half baked. That being said, one day it could be a slightly more viable solution than parabola.

Anonymous 07/16/2017 (Sun) 11:13:38 [Preview] No. 985 del

Anonymous 07/27/2017 (Thu) 21:55:14 [Preview] No. 991 del
you forgot DNSCrypt luser

(120.89 KB 640x793 Lain.jpg)
System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.

a@a 07/05/2017 (Wed) 09:53:03 [Preview] No. 966 del
I can't help you with the memory usages of those OSes, but I would say that at one point, I got down to 60 mb on an x86 Debian GNU/Linux (before Ian died) with X and running openbox and urxvt. x64 is at least double that with a similar barebones setup (very little background resources) for some dumbfuck reason that I have no idea why. I'd blame the hardware first, kernel second, OS third, yourself fourth, and some crackers fifth. They really just don't make things the way they used to anymore

Anonymous 07/05/2017 (Wed) 11:25:38 [Preview] No. 967 del
more rack-space. More machines.

Anonymous 07/05/2017 (Wed) 17:18:22 [Preview] No. 971 del
64bit, less asm, more library bloat, more security and less on disk/swap.

Endwall 07/11/2017 (Tue) 22:19:31 [Preview] No. 977 del
Macintosh OS 7.0 (1991) runs in 2MB of memory with GUI
Macintosh OS 9.22 (2001) runs in 68.2MB of memory with GUI+TCP on G4 800 MHz
Edited last time by Endwall on 07/19/2017 (Wed) 01:34:56.

Anonymous 07/26/2017 (Wed) 06:05:21 [Preview] No. 990 del
Inferno runs on stock Nintendo DS Lite with 4 MB RAM, but it can run on even smaller hardware.

There's a cut-down version of Linux that runs on the RC2014 Z80 SBC, which IIRC has only 512 KB of RAM. Demonstration here:
Watch his other videos too, they're pretty nice. I'm just not that crazy about Linux anymore though, and run OpenBSD on my laptop, but I'm not even too crazy about OpenBSD. It's gotten quite bloated as well. It used to run fine on Motorola 68030 systems (like Amiga, Atari ST, old Macs, etc.), but they abandonned those machines years ago. Anyway for the RC2014 I think CP/M makes the most sense, and you could probably code a TCP/IP stack for that. After all, they managed to do it with a Commodore 64 that has much less memory:

Here's another guy with some interesting videos about making custom computers with old processors and not much memory.

BTW CP/M itself will run fine on an 8080 or Z80 computer with just 64 KB RAM. The RC2014 is really souped-up compared to the stuff from the 80's.

A stock Amiga 1000 has only 256 KB RAM but still runs a full multitasking OS with GUI. Ditto with the original Atari ST. I consider them to be the last of the interesting machines. There was much more impressive stuff that came after (SGI Indigo, etc.) but nothing as tightly designed and affordable.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

177 posts and 3 images omitted.

renum Endwall 07/05/2017 (Wed) 03:09:17 [Preview] No. 964 del
>>962 >>963

Yes this should go past 100,000 but there wont be any leading zeros.

Yes this can be parallel processor enabled using && and splitting the lists up into segments.

Random character string renaming should also be simple to do. I'll use my random string engine and apply it to renum with a switch/flag.

I'm on Hiatus until October. School starts in September, I'm running out of days, and I have IRL stuf to do. My room looks like Lain Iwakura's room. Wires, Computers, Computer Programming books in stacks everywhere. I have two fans running and its like a sauna in here. All my computers except for my servers must be turned off. Winter is for being with computers.

I'm on it. Eventually. Thanks for the ideas.
Edited last time by Endwall on 07/05/2017 (Wed) 03:19:12.

Anonymous 07/05/2017 (Wed) 11:46:30 [Preview] No. 968 del
Oh also, try to have renum.sh work in spite of whatever punctuations characters people download in but don't know or want to know which specific file name out of thousands is causing the filenaming to fail https://en.wikipedia.org/wiki/Punctuation

Endwall 07/05/2017 (Wed) 11:51:22 [Preview] No. 969 del
I have added the functionality that was requested. The random string function seems to have some issues and might be eating files, but I think I've fixed this by adding index numbers onto either end of the string. Save the backup.tar.gz file and test it out.

$ renum --help

$ renum --rand --ranstr # use a random string padded by the index number
$ renum --rand --md5str # use the md5 of the file as filename
$ renum --rand
$ renum

my implimentation sometimes prints out 1 and 2 character strings, but the index number padding should prevent overwriting. I have also made some optimizations in how many hashes are preformed. This should run slightly faster. I'll work on a parallel processing implementation later maybe in november or if I get interested enough to try it.

Anonymous 07/05/2017 (Wed) 12:03:42 [Preview] No. 970 del
Thanks m8, not even pyRenamer can do what your program does.

Endwall 07/06/2017 (Thu) 01:03:11 [Preview] No. 972 del
Thanks. Good to know that I made something useful.

I made a bug fix to the --ranstr function of renum to remove spaces using tr -s " ". This should work well now. If you want to take the index number off go into the code and remove it.

I have it printng as filename="$index$filename$index" you can comment this line out if you want it to just have random text and numbers without the index number appended. I just did this to prevent clobber problems if the string came out short or empty.
I don't think that this is required now with the latest fix but I'm leaving it on for now.

Thanks for the suggestions. If you have any suggestions for products, features, comments or bug reports place these in the comments below.

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
60 posts and 3 images omitted.

Anonymous 06/14/2017 (Wed) 18:27:58 [Preview] No. 943 del
>You typed an extra w in new.
That is for if you are already in tmux.

Anonymous 06/29/2017 (Thu) 21:15:02 [Preview] No. 958 del
Router questions: Should I enable NAT? How about UPnP?

Anonymous 06/30/2017 (Fri) 00:45:42 [Preview] No. 959 del
BTW, I don't play any consoles and only have a few wireless devices.

Anonymous 06/30/2017 (Fri) 03:46:01 [Preview] No. 960 del
yes and yes.

Endwall 06/30/2017 (Fri) 03:55:38 [Preview] No. 961 del
Universal Plug and Play UPnP is a bad idea. If you get malware they can own your network. Open the ports that you want open and only those ports and protocols, block everything else. The first line in your firewall chain on you router should be:
What ever way that is set up according to your router.
Then slowly open things up, starting with DNS, then HTTP, HTTPS, then whatever other ports and protocols you need. This will take more time but it will give you more control.

NAT Network Address Translation. This should be OK to turn on.


Those are my thoughts on it. I'm not an expert. Open only what you need and don't let your software on your OS control your router at will, set it up yourself.