Everything posted by Sensei
-
Privacy notice + downtime on Tuesday 11th April
In the thread "Anti spam suggestion", I made suggestion, which was ignored: use JavaScript in the code.. Bots won't be able to bypass it, unless somebody will rewrite them.. https://www.w3schools.com/jsref/prop_win_localstorage.asp LocalStorage is a client-side supercookie, not sent from the browser to the server like regular cookies. It would be a nightmare/impossible to write workaround for bots written in wget/curl or equivalent code.
-
Interacting with RS485 into a USB adapter... am lost in space.
Try this and tell us what the result is: https://www.cyberciti.biz/hardware/5-linux-unix-commands-for-connecting-to-the-serial-console/ ps. It is from https://www.google.com/search?q=serial+communication+on+linux https://unix.stackexchange.com/questions/42376/reading-from-serial-from-linux-command-line They suggest: cat /dev/ttyS0 or cat < /dev/ttyS0 (if ttyS0 is your serial port, but that you should get from previous tutorials) Shouldn't it be in the (online) manual of your device? Using general serial communication, you will most likely get raw data.. Which are "good for the programmer".. Try google: "how to read voltage|amperage|temperature on [model name of your device] youtube video".. maybe someone (engineer) has already bought it and made a video of how to use it, which is very common these days. This looks promising: https://www.youtube.com/watch?v=L1dxwzC3lkg How? You'd have to build all the electronics to make it work (on the breadboard at least).. Arduino would be a better choice. It comes with Arduino Studio and has lots of tutorials.. https://www.google.com/search?q=how+to+read+temperature+arduino+video https://www.arduino.cc/ Arduino analog pins are built-in voltmeters.. As long as they are within the 0-5 volt range.. Otherwise, you will have to use a voltage divider and limit the input voltage to this range (otherwise the Arduino will be damaged) Arduino-clone here is for $5 or so. You connect some sensor, for example, temperature on a breadboard, with the necessary resistors and other things, GND of the breadboard to GND in Arduino, +5V of the breadboard to +5V in Arduino, sensor pin to analog or digital pin, depending on the tutorial of the sensor. And then run Arduino Studio and write (or copy from the tutorial) the source code that reads the data from the Arduino. A job for less than an hour for a temperature sensor.
-
Privacy notice + downtime on Tuesday 11th April
Such problems can happen if there is an invisible layer at the top of the page that prevents you from clicking on the right area (captures events).. On my Linux, these ads were at the top. If I hovered over a profile, the profile popup was below the ads. CSS should let you choose the priority of the element. https://www.w3schools.com/cssref/pr_pos_z-index.php
-
Preserving Body Parts In Outer Space
The human body contains water. Water has a density of 1 g/cm^3. Ice has a lower density 0.917 g/cm³ than water (which is why it floats on the surface of the ocean). Attempting to freeze the body causes an increase in volume (each gram of water of 1 cm^3 is converted to ice crystals of ~ 1.09 cm^3 volume) and cells can be damaged. This is under normal pressure. https://www.google.com/search?q=damage+of+cells+by+cryopreservation However, there is a vacuum in space with almost no pressure. What happens to water in such an environment can be seen in this video:
-
Create a drip system that is capable of making stalagmites
https://en.wikipedia.org/wiki/Stalagmite "grows" from the bottom to the top. https://en.wikipedia.org/wiki/Stalactite "grows" from the top to the bottom. You could try sodium acetate: ..you've never 3D printed anything really.. ? To make a 5 cm figure you have to wait 2-3 hours.. 5 cm height = 500 layers with 0.1mm/layer.
-
Anti spam suggestion.
..only a real idiot would use A.I. to bypass a website's CAPTCHA to send a spam email.. when he could tell to hack X, Y, Z.. ..don't add it to HTML form data (it can be automated).. make it JavaScript prompt() https://www.w3schools.com/jsref/met_win_prompt.asp prompt() -> set localstorage variable (they are JS only available, unlike cookies) -> pass to normal website -> check whether localstorage is the right one. e.g. md5( prompt question answer + random salt + ip of a person )
-
Using VPS to bypass the internet cencorship
Do you have SSH access to your VPS? Which distro on VPS? What storage? Do you have a local Linux installed on some physical disk? Which distro? Do you have a Linux Live pendrive? If none, then get 4 GB-16 GB fresh pendrive (it will be erased). $4 in the shop here for 32 GB, the smallest one is enough. Only 4GB will be used anyway. Download the latest Kali Linux Live from: http://old.kali.org/kali-images/kali-2023.1/ e.g. wget -c http://old.kali.org/kali-images/kali-2023.1/kali-linux-2023.1-live-amd64.iso wget -c http://old.kali.org/kali-images/kali-2023.1/kali-linux-2023.1-live-i386.iso (verify checksum!) On Windows you can use Rufus https://rufus.ie/en/ to erase pendrive and write ISO on pendrive. On Linux you can use dd command. Once you have terminal running use ssh login@domain (you don't have to have domain registered - VPS have public IPv6 reverse domain and perhaps public IPv4, some companies sell IPv4 for additional money per month) enter your SSH password to VPS (should be in the e-mail after purchase, or web control panel) Once you're logged on your VPS: sudo apt update sudo apt install apache2 service apache2 start (eventually "systemctl start apache2") nmap localhost should show you that TCP port 80 is open. Then use http://domain or http://vps-domain-name to see if HTTP server is working (the website HTML is in /var/www/html the most likely. ls -l /var/www/html to list files. You need sudo to edit the file e.g. sudo nano /var/www/html/index.html ) sudo apt install tor proxychains4 service tor start (eventually "systemctl start tor") nmap localhost should show you that TCP port 9050 is open (but it is open LOCALLY on VPS, not globally!) (edit settings to open it globally, but then somebody can abuse it for you) From home you can get something like that: └─$ nmap domain Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-08 07:10 UTC Nmap scan report for DOMAIN (IP) Host is up (0.13s latency). rDNS record for IP: DOMAIN Not shown: 997 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh 25/tcp filtered smtp 80/tcp open http Now, when you want invisible access to Tor network on a remote server from home, you use: ssh -L :1234:localhost:9050 login@domain Then in Firefox > Settings > Network Settings, Proxy, set SOCKS Host to localhost and port 1234 From now on, when you go to Firefox, it will try to connect to localhost at port 1234, ssh will tunnel it through encrypted SSH port 22 to VPS server, which will then use Tor network for further world.. You can use apache2 as proxy server too. https://www.google.com/search?q=apache2+as+proxy+server It won't be as safe as SSH+Tor, but Google and other services should work. (Google and other social medias hate Tor, Proxy, VPN and want to steal your identity.. therefor all these "verify by text message", "verify by phone".. etc. etc.) If you want to go this route, you will need some sort of SSL certificate.. (Let's Encrypt is free, so it is most likely very insecure ) You can make SSH tunnel between home and VPS to your Apache-Proxy-Server: ssh -L :80:localhost:80 login@domain Then in Firefox > Settings > Network Settings, Proxy, set HTTP Proxy Host to localhost and port 80 It won't need SSL certificate and will be much more secure. (and going that route, you don't need to have exposed HTTP proxy server for other people, sooner or later some bot will find open proxy-server and everybody will use it, better if you connect to it through encrypted SSH by localhost address and local port) Verify if you have some random IP address on https://www.whatismyip.com/ or similar stuff: https://www.google.com/search?q=what+is+my+ip Check your VPS traffic daily.. For people with money, there is Skylink from Musk.. It is damn expensive TBH.. To configure it for you? Or to teach you entire Linux?
-
Is there a shining star of all crops ? [agriculture]
..that would have to be GMO.. ..crops are not very efficient food sources.. There's a reason aliens are "green".. They've simply inserted vegetable genes into their own genome, which means they need to be exposed to "sunbath", with H2O, C2O and nutrients to ensure they have enough food.. ..monocrop farming is not recommended if you have no external source of nutrients.. i.e. such farm is exhausting natural nutrients provided by the air with water (thunderstorms with NOx).. Thus crop rotation was "invented".. External sources of fertilizer make monoculture etc.. redundants.. even to the level that even soil is not needed.. i.e. hydroponic.. (How much soil do you have on the ISS space station?)
-
Need description of Prime# distribution in Riemann hypothesis
Learn programming..
-
What Is Physics?
..everything.. ? Exactly, reverse.. This is the most childish definition of biology I've heard.. This is the most childish definition of chemistry I've heard..
-
Nurdles
You don't understand. If an Englishman in the UK types XYZ into Google, you get something different than if ABC from anywhere in the world gets.. My "nurdles" gives different Google results than your "nurdles".. ..or do you want me to use Tor/VPN first...? I could do that.... I would have to shut down my computer first and start Linux.. (I just ran Windows to watch TV, with a USB Tuner because of the events of that day)
-
When Signing In To The Forum
..you meant "give us an e-mail, we will send to your e-mail a special security code that you will enter to verify that the e-mail reached you" ? I hate such crap.. I have lost the ability to log into some servers this way.. Emails are no longer available.. and verification codes are not available.. (Verification code sent to the phone number - an even worse idea.. and can be used to hack a smartphone) 2FA is crap.. Used mainly by governments to illegally hack into the accounts of ordinary users.. Therefore they push so hard to have it everywhere.. You don't need anyone's FB password or hacking someone's password (time intensive) if 2FA is enabled on FB or other Internet account..
-
Technology Stabilization
Arms manufacturers would of course disagree I.e., guys with AK-47s vs. modern stuff.. ..bouncing barrels and thus a lack of precision vs. recoil cushioning, etc. "Stabilization" i.e. the end of some technology will be reached when the size of an electronic component, will be counted in atom(s).. ..but it opens up new areas of optimization through multicore/threading, better algorithm optimization and so on.... But according to my buddies in the industry, almost no one is interested in such things. They claim that the cost of the programmer is higher than the cost of the hardware, i.e., it is cheaper to buy more machines than to force the programmer to write better, more optimized code.. (but he writes stuff in Bash, Perl and Python, because "it is quick, easy and cheap".. C/C++ code runs 1000x faster than Python doing the same stuff, without even multi-threading optimizations)
-
The Official JOKES SECTION :)
- Nurdles
Sorry, but your Google link goes nowhere for me.. I have the Greenpeace website with information on how to catch nurdles on the sieve on the beach..- Unnecessary Personal Attack (split from Anti Iron Chemical)
...You said you haven't seen it.... and even though you have no idea what the movie is about.... you gave me a negative.... .When Donald's secret's about prostitutes were reveled to the world he was upset... dunno way.. you want it for just like that for ME?- What three wishes.
You are a funny human being... ..but you forgot the way lottery works.. if you wish to win the lottery, and win.. multiplied by millions of times..- Unnecessary Personal Attack (split from Anti Iron Chemical)
..any difference, than your life?- Anti Iron Chemical
Wasn't the name of the compounds described in the film?- The Pi symbol "Π" is God's name in the bible, Pi is "3.14", and Ex "3:14" draws the Pi symbol when God says "I am that Pi" (new book)
Since you call me (in 2018): https://www.google.com/search?q=PI+irrational+numerals+system ps. Try @God next time, please..- Should Homeless Addicts Be Removed From Cities?
Possibly in countries such as the U.S.. That would be reasonable thinking in a capitalist country.. Here the landlords have adjusted it to have only a one-year contract with tenants. Every year I have 70% of the neighbors in the building replaced. This allows landlords to increase their bills every new year. (If I were, being an landlord, and a human being, I would do the same) Nothing? If you buy a bunch of new apartments to rent out, you increase the price of the apartments on the market, which prevents others from buying (or renting) them at a lower price.. ..they should not buy too many apartments in the first place.. Do you know what it's like for IT programmers (with salaries like 10x the minimum salary here)? They buy an apartment, rent it for a mortgage + some margin, and the whole investment is a perpetual motion.. Repeat. Multiple times.. I ask the guy - why on earth, you buy yet another apartment for which you get monthly less than you earn in a day of programming, instead of investing in creating your own IT company.. I think it would be better if the government creates buildings for people.. "public housing".. no rents, no evictions, no homelessness.. The problem is with people, industry, greed.. The government passes everything (in some countries), or almost everything (in other countries) to private companies. They just give the money (your tax money) and expect results. This is a great way for them to steal government (i.e. your) money for each party. https://en.wikipedia.org/wiki/Public–private_partnership It doesn't matter if it's the construction of highways, buildings, health care, military, etc. Often, the same commodity sold in the normal market (to "the person on the street") costs less that the government pays for it through "public-private partnerships".. To me this is some kind of joke or parody.. If I order the construction of 100 buildings and pay in advance, and the land is mine, I should be treated like a king.. i.e. get a discount instead of being robbed.. If the government orders something, especially in large quantities, from a commercial company, it should cost much less than if John Doe, straight from the street, got the company to do the same things.. If there are too many inquiries, the cement factory raises the price, If there are too many inquiries, the brick factory raises the price, etc. etc. and the entire budget of the company that wins the race to the government contract is screwed up.. If the cement plant has more demand for electricity, the power plant raises the price.. How to go bankrupt here (from a businessman's point of view) is well known knowledge, get a contract with the government.. You get a contract for X to supply Y, and then in the middle of the time of everything prices went up and X^2 may not be enough.. ps. In Russia, it is corrupted in a different way. ps2. In China, it is corrupted in a yet another different way.- Is this the beginning of the end ?
Apart from the concerns you have in your mind: How do you ban a website in a democratic country? It doesn't even work in non-democratic countries.. One can buy a VPN. Second one can buy a dedicated server. The third can change the DNS to a completely different one. Yet another one can intercept a computer in another country and remotely use it.. or you can hire someone in another country to relay questions and answers by phone/email/file or whatever.. You would have to ban the entire Internet (dismount cables, cell-towers etc.) to prevent one person from using a website if that is their desire.. What privacy concerns?!- Is the brain the only one asleep ?
Don't drink anything after 6 pm if you plan to go to bed at 10 pm.- Hello World Program In C
Open a normal terminal and use: cat /usr/local/include/stdio.h Does it work? If you also have "Permission denied," open the terminal in administrator mode. List contents of /usr/local and /usr/local/include to see if you have the right files there. Finally, use the: chmod -R 777 /usr/local/include/ -R should do it recursively with all files and subfolders. (check the manual e.g. man chmod) Before resolving the "Permission denied" error, there is no point in analyzing the rest of the messages.. You can use: cd /usr/local ls -l or cd /usr/local/include ls -l to see what permissions are assigned to files and folders. chmod 777 filename means read+write+executable access for every administrator, user and guest (which is the weakest/dangerous one) Refer to the manual: https://man7.org/linux/man-pages/man1/chmod.1.html- Should TikTok Be Banned in the US?
Paraphrasing it: If the application records your videos, photos, selfies, it can immediately knows who you are (e.g. it can search in an external database with faces e.g. Facebook, old Google+ or Twitter etc.) and your family and friends. USA-IT companies do/did it all the time ("automatic photo tagging") https://www.wired.com/story/facebook-drops-facial-recognition-tag-people-photos/ From 2010 to 2021 is 11 years.. Enough to gather their data even for external FB user. If the app shows things the user has clicked on, then after a while it knows which topics people are interested in (clicked) and which are not (skipped). If the application connects to the Internet then it knows your IP address, the less valuable/precise IPv4 and perhaps the more valuable/precise IPv6. Any application owner that connects to the Internet has server logs.. Public static IPs used by dedicated servers have well-know exact locations to within a few meters i.e. you go to McD, KFC, PizzaHut, and connect to their free open hotspot and (other) companies could know you're at the restaurant. If the app knows which WiFi SSID/ESSID you are connected to, it knows your almost exact location on the world map. Google is trying to fight it (so they are the only ones who know, which you can check in your Google Account). You can explore how this works for developers (they need to find a new workaround in newer versions of Android): https://stackoverflow.com/questions/21391395/get-ssid-when-wifi-is-connected Older Androids let the app know the phone's IMEI, as well as the phone number. Newer versions return nulls. So companies have to force the user to give them the phone number, and then it is verified by SMS.. 2FA even gave them a good excuse to do it all day. When I started writing scripts in Python in March, Google started showing ads like "40k per month salary in your city" and similar ads with jobs.. Should we ban Google? I haven't seen any report clearly (to the developer) showing evidence of malfunctioning apps from TikTok, Huawei or any other Chinese company's app where they downloaded more data than US companies IT.. Any application that executes code it just downloaded from the Internet can do bad things, but it won't be detected for a long as the target (the person being attacked) is identified and the special code is uploaded only for this person. It can take minutes, seconds, milliseconds for this code to be on the device.. and then it is wiped out by itself.. Malicious applications that have built-in malicious behavior are much easier to identify without any doubt. Developer can decode it and tell what code is doing or pass it through soapbox to see malicious behavior. An application that identifies person by person and has an auto-update function must have an infrastructure that allows their programmers-hackers to inject malicious code into only one exact person in the world.. - Nurdles
Important Information
We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.