/os/ - Online Security

News, techniques and methods for computer network security.

Boards | Catalog | Bottom

Check to confirm you're not a robot
Drawing x size canvas

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.

Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply] [Last 50 Posts]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
17 posts and 6 images omitted.

Anonymous 09/04/2017 (Mon) 19:58:42 [Preview] No. 1013 del
fellow traveler is absolutely a masonic phrase. People will say traveler. They will ask "are you a traveler?" or "are you a fellow traveler?" or "are you a traveling man?"
>The logo is a tunnel.
that alone is fine but with the rabbit signaling it looks like a maglev tunnel.

May be coincidential. I think otherwise because there is a disproportionate amount of this kind of symbolism in tech.

Anonymous 09/08/2017 (Fri) 11:50:44 [Preview] No. 1018 del
"fellow traveler" is hippie lingo ca 70s, masons absolutely don't have a claim on that.

Anonymous 09/27/2017 (Wed) 03:03:12 [Preview] No. 1036 del
Are you going to remove the idiotic claim in >>894 that the heads website contains "Masonic references"?

Endwall 09/27/2017 (Wed) 05:50:33 [Preview] No. 1037 del


The term fellow traveller (also fellow traveler) identifies a person who is intellectually sympathetic to the ideology of a political organization, and who co-operates in the organization's politics, without being a formal member of that organization.[1] In the early history of the Soviet Union (1922–91), the Bolshevik revolutionary Trotsky coined the term poputchik ('one who travels the same path') to identify the vacillating intellectual supporters of the Bolshevik régime. Likewise for the political characterisation of the Russian intelligentsiya (writers, academics, and artists) who were philosophically sympathetic to the political, social, and economic goals of the Russian Revolution of 1917, but who chose to not join the Communist Party of the Soviet Union (CPSU). Moreover, during the Stalinist régime, the usage of the term poputchik (fellow traveller) disappeared from political discourse in the Soviet Union, but the Western world adopted the term fellow traveller to identify people who sympathised with the Soviets and with Communism.[2] In U.S. politics, during the 1940s and the 1950s, the term fellow traveler (U.S. spelling) was a pejorative term for a person who was philosophically sympathetic to Communism, yet was not a formal, "card-carrying member" of the American Communist Party. In political discourse, the term fellow traveler was applied to intellectuals, academics, and politicians who lent their names and prestige to Communist front organizations. In European politics, the equivalent terms for fellow traveller are: Compagnon de route, sympathisant, and progressiste in France; Weggenosse and Sympathisant in Germany; and compagno di viaggio in Italy.


Meaning Someone sympathetic toward a certain point of view without being a fully paid-up member of the club. Origin In its literal meaning 'fellow traveller' just means someone who travels with you. It was first applied to non-communists who were inclined toward the views of the Communist Party by Leon Trotsky. He used the Russian word popútchik to indicate that. The term fellow traveller in this sense came rather later, in the New York publication Nation, 1936: "The new phenomenon is the fellow-traveler. The term has a Russian background and means someone who does not accept all your aims but has enough in common with you to accompany you in a comradely fashion part of the way. In this campaign both Mr. Landon and Mr. Roosevelt have acquired fellow-travelers."


"It was during that period that I became interested in freemasonry. ... In the eighteenth century freemasonry became expressive of a militant policy of enlightenment, as in the case of the Illuminati, who were the forerunners of the revolution; on its left it culminated in the Carbonari. Freemasons counted among their members both Louis XVI and the Dr. Guillotin who invented the guillotine. In southern Germany freemasonry assumed an openly revolutionary character, whereas at the court of Catherine the Great it was a masquerade reflecting the aristocratic and bureaucratic hierarchy. A freemason Novikov was exiled to Siberia by a freemason Empress. I discontinued my work on freemasonry to take up the study of Marxian economics. The work on freemasonry acted as a sort of test for these hypotheses. I think this influenced the whole course of my intellectual development." The founder of the Red Army, Freemason Leon Trotsky. Leon Trotsky My Life: The Rise and Fall of a Dictator .

Message too long. Click here to view full text.

Welcome to Online Security: Sticky Thread Endwall 07/13/2016 (Wed) 03:11:01 [Preview] No. 181 [Reply] [Last 50 Posts]
Hello and Welcome to /os/, Online Security. This is a board for the discussion of online security, privacy, anonymity, and news from cybersecurity and privacy world.
1.Follow the global rules
2.No Spam
3.No Classified Documents or leaks of Classified Documents or Files (News articles, or commentary about the documents or files is OK)
4.No Child Exploitation Material
5.Images should be safe for work and relevant to the post or thread, commentary can be NSFW
6.No Advertisements of Hacker Services or Solicitations for Hacking Services
Related Boards
tech >>>/tech/ Hacker >>>/h4x0r/ Security Concepts>>>/sec/ EndSoft >>>/endsoft/
Privacy Guides
Software Recomendations

Message too long. Click here to view full text.

Edited last time by Endwall on 09/18/2017 (Mon) 00:18:13.

Sticky Bump Endwall 10/23/2016 (Sun) 18:54:40 [Preview] No. 624 del
TENS , https://spi.dod.mil/lipose.htm , US Air Force Live CD <-- online banking for mom and dad.
LibertyBSD http://libertybsd.net/ , https://libreboot.org/docs/bsd/openbsd.html
Edited last time by Endwall on 01/02/2017 (Mon) 11:03:40.

Sticky Bump Endwall 04/30/2017 (Sun) 03:29:12 [Preview] No. 894 del
Heads https://heads.dyne.org/ http://fz474h2o46o2u7xj.onion ; Devuan non-systemd version of Tails (Disclaimer: Website/Project uses occult language with communist signals)
Devuan https://www.devuan.org/ http://devuanzuwu3xoqwp.onion
Systemd Free http://systemd-free.org/
Edited last time by Endwall on 10/07/2017 (Sat) 03:03:59.

Endwall 06/01/2017 (Thu) 08:14:41 [Preview] No. 933 del
Mozilla Firefox Hardened Profile

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
456 posts and 3 images omitted.

Endwall 09/29/2017 (Fri) 04:47:39 [Preview] No. 1040 del
Hak 5
Equifax and CCleaner Updates, Hacking Air 10:04
https://youtube.com/watch?v=UXEqh7WyKh4 [Embed]
Linux Terminal 201: Using the Find Command Pt 2 10:28
https://youtube.com/watch?v=WuZYqiais54 [Embed]
Bash Bunny Extensions! - Hak5 2303 28:33
https://youtube.com/watch?v=GHZCqCESxTw [Embed]

Endwall 10/07/2017 (Sat) 03:24:12 [Preview] No. 1044 del
Hak 5
Linux Terminal 201: Monitoring System Resources Pt 1 - HakTip 164
https://youtube.com/watch?v=xcR_FjAy1HI [Embed]
Published on Sep 29, 2017
Today we're monitoring system resources with ps, aux, grep, kill, killall, and lsof.
Monitoring System Resources Pt 2: Linux Terminal 201 - HakTip 165
Published on Oct 6, 2017
https://youtube.com/watch?v=fwMTD9ghC3c [Embed]
Monitoring system resources via the Linux terminal!
What is White Hat Hacking
https://youtube.com/watch?v=cbrPAwqlIgc [Embed]
Hacking as a Way of Thinking
https://youtube.com/watch?v=BzEYP345Rm4 [Embed]

Endwall 10/07/2017 (Sat) 03:30:39 [Preview] No. 1045 del
Jupiter Broadcasting
Laying Internet Pipe | TechSNAP 339
Posted on: October 5, 2017
We cover the problematic implications of SESTA, the latest internet regulations proposed in the US, plus some PR troubles for CBS’s Showtime after cryptocoin mining software was found embedded in their webpage & Dan gets excited as we discuss why tape-powered backups are still important for many large organizations. And of course your feedback, a fantastic round-up & so much more on this week’s episode of TechSNAP!

The history of man, kind | BSD Now 214
Posted on: October 5, 2017
The costs of open sourcing a project are explored, we discover why PS4 downloads are so slow, delve into the history of UNIX man pages & more!

Endwall 10/18/2017 (Wed) 00:16:54 [Preview] No. 1053 del
Hak 5

3 Billion Yahoo Accounts Hacked; Disqus Hacked! - Threat Wire 9:37
https://youtube.com/watch?v=dVnWz6xFj9s [Embed]

WPA2 Wi-Fi Vulnerable to KRACK Hack; RSA Keys 12:43
https://youtube.com/watch?v=caRlWlKkw34 [Embed]

Endwall 10/18/2017 (Wed) 00:24:29 [Preview] No. 1054 del
Jupiter Broadcasting

Spy Tapes | TechSNAP 340
Posted on: October 12, 2017
We try our hand at spycraft with a set of espionage themed stories covering everything from the latest troubles at Kaspersky to the strategic implications of responsible disclosure at the NSA. Plus, a few more reasons to be careful with what you post on social media & a fascinating discussion of the ethics of running a data breach search service.

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

181 posts and 3 images omitted.

Endwall 07/06/2017 (Thu) 01:03:11 [Preview] No. 972 del
Thanks. Good to know that I made something useful.

I made a bug fix to the --ranstr function of renum to remove spaces using tr -s " ". This should work well now. If you want to take the index number off go into the code and remove it.

I have it printng as filename="$index$filename$index" you can comment this line out if you want it to just have random text and numbers without the index number appended. I just did this to prevent clobber problems if the string came out short or empty.
I don't think that this is required now with the latest fix but I'm leaving it on for now.

Thanks for the suggestions. If you have any suggestions for products, features, comments or bug reports place these in the comments below.

Anonymous 10/07/2017 (Sat) 09:02:53 [Preview] No. 1046 del
Is there a way to use pdfclean to clean a folder of pdfs or every pdf in a folder? It can be done with a command too right? Like "for every $pdf run pdflean.sh". (That is not an actual command but what I am trying to do)

Anonymous 10/07/2017 (Sat) 10:39:54 [Preview] No. 1047 del
You mean you want to use a * wildcard in the name like *.pdf or you want a recursive function like -r to enter sub folders etc?

Anonymous 10/07/2017 (Sat) 12:38:55 [Preview] No. 1048 del
Yes the wildcard would be great. Sick of changing filenames.

Endwall 10/18/2017 (Wed) 00:11:54 [Preview] No. 1052 del

Yeah this is a good idea. Its on the to do list. This should be simple to add I'll add * as the flag and ls .pdf into a file and then do each filename in the list similar to renum. This should take 1 hour to code and test, but I'll work on it on friday or saturday.

I'm really bogged down with homework but I'll try to get this done. Great suggestion, keep them coming.

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
64 posts and 3 images omitted.

Endwall 06/30/2017 (Fri) 03:55:38 [Preview] No. 961 del
Universal Plug and Play UPnP is a bad idea. If you get malware they can own your network. Open the ports that you want open and only those ports and protocols, block everything else. The first line in your firewall chain on you router should be:
What ever way that is set up according to your router.
Then slowly open things up, starting with DNS, then HTTP, HTTPS, then whatever other ports and protocols you need. This will take more time but it will give you more control.

NAT Network Address Translation. This should be OK to turn on.


Those are my thoughts on it. I'm not an expert. Open only what you need and don't let your software on your OS control your router at will, set it up yourself.

Anonymous 09/15/2017 (Fri) 14:47:07 [Preview] No. 1020 del
With i2p isn't there an ip you can plug in like with tor (socks5 I think port 4444?? If so then you can add i2p to the mix. I think it called an out-proxy. You can also use this to run i2pd with proxychains i2pd.I have found this proxychains setup useful because running i2pd with torsocks doesn't work.

Anonymous 10/02/2017 (Mon) 20:41:27 [Preview] No. 1041 del

Been foolin around with this.

Anonymous 10/13/2017 (Fri) 11:23:28 [Preview] No. 1050 del
others are correct on UPnP

wifi is insecure, use cables as much as possible

NAT should be enabled, but it isn't as important as making sure your router isn't compromised. There is FOSS router software available for maximum security, have a gander and lurk.

Anonymous 10/13/2017 (Fri) 11:57:40 [Preview] No. 1051 del
I use a cheap but private VPN service, with encryption and (allegedly) no IP logging reading the ToS.

I do not use wifi, that is insecure. My wifi chip in my computer (along with the bluetooth chip and camera) have been physically removed. Linux of-course.

I use Mozilla Firefox for the most part, sometimes Tor too.

One thing I do is make sure I manually program Bleachbit to scrub sqlite files in my browser directory routinely. Logs, caches, cookies etc: content-prefs.sqlite, cookies.sqlite, formhistory.sqlite, healthreport.sqlite, places.sqlite, signons.sqlite, webappsstore.sqlite (and their associated file formats) from my browser directory. Tor too stores these same kinds of databases, so any browser you use you'll want to learn what is in those directories and what they store.

Then, I also use Random Agent Spoofer to spoof my browser agent (spoofing metadata about what OS I use, what kind of browser it is, headers, get requests, etc.) and also allows me to disable webgl and geolocation in chrome.

I also use noscript and HTTPS Everywhere. Scrub noscript whitelist and reconfigure the list to your liking, whatever suites your browsing habits.

Go to about:config and learn how to use it, but be careful!!! There are some tweaks you can use to fortify and secure your browser, and to make it stop bragging about data.

BTC Mixing services links anon 10/17/2016 (Mon) 12:33:37 [Preview] No. 608 [Reply] [Last 50 Posts]

Anonymous 10/17/2016 (Mon) 20:36:47 [Preview] No. 609 del

Anonymous 10/12/2017 (Thu) 00:22:15 [Preview] No. 1049 del
how 2 buy bitcoins?

Secure OSes Anonymous 05/09/2016 (Mon) 18:21:17 [Preview] No. 37 [Reply] [Last 50 Posts]
What is the best OS option for a secure setup?
How do OpenBSD and Linux with patches compare in terms of the security they offer?
69 posts and 1 image omitted.

Anonymous 09/18/2017 (Mon) 13:55:34 [Preview] No. 1028 del
Tor sort of works now but there's no official Tor-OpenRC script besides the deprecated AUR version of that script. Also, UseEntryGuardsAsDirGuards is deprecated, Endwall might need to update his endtorrc file.

Endwall 09/19/2017 (Tue) 06:29:25 [Preview] No. 1029 del
Yeah I noticed this a while ago and updated the file in endconf.git but forgot to copy it to the rest of the repo locations. Should be updated now. I guess the whole idea is that there is a best way to do something, (Tor settings for instance), so lets find that best way and spread it.

Endwall 09/19/2017 (Tue) 06:47:16 [Preview] No. 1030 del
I've been off of the ball for a while though. For instance I noticed recently that xtrac-ytpl.sh has stopped working. I'll look at this next weekend, but I've got homework up the wazoo.

I strongly believe that binary package based distributions are not the way to go for security. You're trusting the packager or the packaging team not to insert their own backdoor or malware, and you have no way to check if that has happened. Everything running on a secure computer has to have been compiled from source that is resident on your computer. That way if you suspect that something is wrong, you can at least check. I don't have the time or the expertise to do this but there are enough computer security experts out there that will, and will hopefully raise a red flag in a blog post, or in an article, or publicize it in a bug tracker. Right now, by using parabola (debian, ubuntu,mint,fedora,etc) , I'm trusting the packager that they don't work for an Intelligence agency of some small European country, or for a hacking team operating out of Russia. If they get caught (unlikely) they can just change their fake name and move on to the next distribution of linux (if they're not already doing it to the packages there as well).

I generally fell off of the wagon when I realized that my computer hardware and operating system were a major point of unreliability, and the probable source of my leak and privacy issues.

Binary package based distributions are a good place to start for someone learning to use GNU/Linux, but they're not the place to be for secure / private systems. Those are just my opinions, I'm not an expert in computer security, but by talking about it we'll get to the bottom of this eventually.

systemd Anonymous 09/27/2017 (Wed) 22:18:38 [Preview] No. 1039 del
About security vulnerabilities on systemd:

Beware of the combination with Wayland. Also systemd is not the only problem, Avahi has been a problem for a while.

Anonymous 10/03/2017 (Tue) 06:25:47 [Preview] No. 1042 del
This is supposedly better than firejail, and it sure is harder to use than firejail from the looks of it.

(120.89 KB 640x793 Lain.jpg)
System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply] [Last 50 Posts]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.
7 posts and 2 images omitted.

Anonymous 08/26/2017 (Sat) 05:19:43 [Preview] No. 1007 del

>why the hell does Linux need 150MB to start up and release a console to me?

"Linux" doesn't. Parabola does. Maybe Parabola sucks. I dunno. I just checked my Slackware installation:

Without X: 54 MiB
With X & a lightweight window manager: 83 MiB

It could be lower, too, but I am running a number of daemons like ntpd and sshd, and I recompiled those that don't come compiled with hardening flags by default. Usually, that means they take more memory. The tradeoff is better security.


>Inferno runs on stock Nintendo DS Lite with 4 MB RAM, but it can run on even smaller hardware.

This expands dong. I've always wanted to try Inferno, but never got around to it.

Anonymous 08/27/2017 (Sun) 17:39:20 [Preview] No. 1008 del
>OpenBSD 6.1 starts in text mode command line in 27MB of memory
Uses less than that for me.
This depends on architecture, with amd64 and i386 being some of the most memory using ones.

Endwall 09/19/2017 (Tue) 07:03:03 [Preview] No. 1031 del

I trust FreeDOS more than I trust GNU/Linux. Get your system back up and running. I used to run this on a Pentium III system but it corupted the file system twice in a row after copying some files into the games directory. I Wiped and reinstalled, and tried it again same result. So I stopped using it, and started using MS DOS instead. But that aside I think that FreeDOS and OpenGEM have a real future. I think that FreeDOS should be an important part of the private computing future. They just need to port a heavy duty file encryption program to the base system and I'm sure gpg is already ported. When you get your system back up please post the memory usage results. Thanks!

Endwall 09/19/2017 (Tue) 07:06:02 [Preview] No. 1032 del
The machine I used is a SunBlade 150 UltraSparc IIi 550MHz computer from 2003.

Anonymous 09/27/2017 (Wed) 21:38:23 [Preview] No. 1038 del
I don't want to sound cliché but I suspect great part of the RAM in parabola is thanks to systemd.

Don't give up on GNU/Linux, there are some distros that take it to extremes to cut the packages to minimum. Source Mage in particular has the philosophy of only including what you want, nothing more, and the sources are clean and untouched. I don't have access to my installation but as soon as I get it I will post results, meanwhile look at how some guy went to have a graphical environment with 97MB.

Hardware Endwall 09/18/2016 (Sun) 18:31:31 [Preview] No. 580 [Reply] [Last 50 Posts]
Discuss hardware and alternative hardware concepts to increase computer and online privacy and security.
Edited last time by Endwall on 09/18/2016 (Sun) 18:50:04.
7 posts and 1 image omitted.

Endwall 08/12/2017 (Sat) 20:06:08 [Preview] No. 1001 del
Zilog Z80

Parallax Propeller

On August 6, 2014, Parallax Inc., released all of the Propeller 1 P8X32A hardware and tools as open-source hardware and software under the GNU General Public License (GPL) 3.0. This included the Verilog code, top-level hardware description language (HDL) files, Spin interpreter, PropellerIDE and SimpleIDE programming tools, and compilers.[3]
Edited last time by Endwall on 08/12/2017 (Sat) 20:10:01.

Anonymous 08/21/2017 (Mon) 22:34:40 [Preview] No. 1002 del
>Minifree isn't recommend or trusted anymore
>a shop owned by Libreboot main developer is not trusted anymore
Okay, shill. Take your overpriced garbage list and go back to reddit. You really added nothing new to value. instead of pointing to actual hardware with libre support like wireless chipsets with ath9k firmware or marvell-chipset based routers with 802.11ac support or mediatek-based NAS that runs fully free software you posted some Libre© TecnoPenguin™ overpriced jew shit.

>Libre Tea Computer Card
>still not FSF approved after 2 years of screeching
>absolutely harmful hardware lifecycle model
>le 3d printed laptop meme, 1366x768 15" screen
>not knowing about Neo900 and Openmoko

Endwall 09/03/2017 (Sun) 23:52:30 [Preview] No. 1011 del

RC2014 is a simple 8 bit Z80 based modular computer originally built to run Microsoft BASIC. It is inspired by the home built computers of the late 70s and computer revolution of the early 80s. It is not a clone of anything specific, but there are suggestions of the ZX81, UK101, S100, Superboard II and Apple I in here. It nominally has 8K ROM, 32K RAM, runs at 7.3728MHz and communicates over serial at 115,200 baud.

RC2014 is available in kit form for you to solder together.  Through-hole components are used throughout, making soldering easy, even for those with limited soldering experience.  Along with a selection of modules to extend functionality, such as serial terminals with HDMI output, digital input modules or, simple keyboard, the RC2014 is a very adaptable computer.

Assembly guides can be found here:

Module information including schematic diagrams and technical descriptions can be found here:

GitHub repository can be found here:

Google Group for RC2014 owners can be found here:

Message too long. Click here to view full text.

Endwall 09/04/2017 (Mon) 00:33:49 [Preview] No. 1012 del
As soon as you turn RC2014 on you can start programming in Microsoft BASIC.  This is very easy to get started with and some very complex programs can be written.  To get right down to the metal, though, you can write your programs in Z80 machine code.

Development of the RC2014 has lead to a more powerful machine with pageable ROM, 64k RAM, compact flash storage and a whole range of expansion peripherals.  With the right modules, it’s now possible to run CP/M, which opens the RC2014 up to a wide range of software.

RC2014 can be bought from Tindie:

Endwall 09/06/2017 (Wed) 21:07:20 [Preview] No. 1016 del

Z80 Retrocomputing 18 - Z180 CPU board for RC2014
https://youtube.com/watch?v=D9u9hhNjcEY [Embed]
Dr. Scott M. Baker
In this video, I build and try out a Z180 CPU board to replace the Z80 CPU in my RC2014 retrocomputer. Aside from simply being faster than the Z80 that I'm currently using, the Z180 offers a lot of on-board peripherals (serial IO, timers, interrupt controller, mmu, dma, etc). I benchmark the 20 Mhz Z180 against my 7.3728 Mhz Z80. I'm saving exploration of the onboard peripherals for a future video. For more retrocomputing projects, see http://www.smbaker.com/

YM2149/ AY-3-8910 Sound Card for the RC2014 computer
https://youtube.com/watch?v=-iLwi9FagFE [Embed]

rc2014-ym2149 Designed by Ed Brindley
Demonstration of my sound card for the RC2014 computer. The board is Open Hardware and was produced entirely with Open Source Software (as was this video) PCB now available on Tindie:
Schematics and Gerbers for the board are available here:
Edited last time by Endwall on 09/06/2017 (Wed) 21:07:58.

Compile Thread Anonymous 11/27/2016 (Sun) 20:44:39 [Preview] No. 692 [Reply] [Last 50 Posts]
Endwall guy should keep irrelevant compile instructions in this thread by editing the OP or edit the Sticky thread before purging said irrelevant posts in various threads. Just remind them to compile from source and redirect them to this thread.
6 posts omitted.

Install torsocks from source Endwall 12/04/2016 (Sun) 06:01:50 [Preview] No. 710 del
Install Torsocks from source

$ su
# pacman -S git
# apt-get install git
$ mkdir -p ~/git
$ cd ~/git
$ git clone https://git.torproject.org/torsocks.git

or if tor is already running with previous version of torsocks
$ torsocks git clone https://git.torproject.org/torsocks.git

$ mkdir -p ~/tor
$ mv torsocks ~/tor
$ cd ~/tor
$ cd torsocks
$ ./autogen.sh

Message too long. Click here to view full text.

youtube-dl from git Endwall 12/04/2016 (Sun) 06:02:28 [Preview] No. 711 del
Install Youtube-dl from source git

$ cd ~/
$ mkdir -p git
$ cd git
$ torsocks git clone https://github.com/rg3/youtube-dl.git
$ cd youtube-dl
$ su
# torsocks pacman -S zip pandoc
# pacman -Rc youtube-dl
# exit
$ make
$ ls
$ cd ~/bin
$ ln -s ~/git/youtube-dl/youtube-dl youtube-dl
$ cd ~
$ export PATH=$HOME/bin:$PATH

Message too long. Click here to view full text.

Tor from git repo Endwall 12/04/2016 (Sun) 06:03:18 [Preview] No. 712 del
Clone tor from git repo


$ mkdir ~/git
$ cd ~/git
$ torsocks -i git clone http://dccbbv6cooddgcrq.onion/tor.git
$ cd tor
$ cd src
$ cd or
$ nano or.h
$ nano routerparse.c
$ nano circuituse.c
$ cd ..
$ sudo su

Message too long. Click here to view full text.

Anonymous 01/15/2017 (Sun) 22:04:32 [Preview] No. 797 del
is there reason to use torsocks over git's builtin socks5 proxy?

wouldn't it be better if you just register as http.proxy and https.proxy variable by git config?

Not sure what revision of git your distro ships with but using torsocks should be considered depreciated hack for applications with builtin socks5 proxy support.

Reop from source Endwall 08/09/2017 (Wed) 22:53:08 [Preview] No. 999 del
Install REOP from Source
$ mkdir -p ~/src
$ cd ~/src
$ endget --no-check-certificate https://www.tedunangst.com/flak/files/reop-3.0-snapshot.tar.gz
$ tar -xvf reop-3.0-snapshot.tar.gz
$ cd reop
$ ./configure
$ make
$ ./reop --help
$ cd ~/bin
$ ln -s ~/src/reop/reop reop
$ export PATH=$HOME/bin:$PATH
$ reop --help

Generate a key pair
$ cd ~

Message too long. Click here to view full text.

Edited last time by Endwall on 08/09/2017 (Wed) 22:57:34.