TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The Research Pirates of the Dark Web

196 点作者 chewymouse超过 9 年前

8 条评论

dorianm超过 9 年前
The Sci-Hub Tor URL is <a href="https:&#x2F;&#x2F;scihub22266oqcxt.onion" rel="nofollow">https:&#x2F;&#x2F;scihub22266oqcxt.onion</a> (source: <a href="https:&#x2F;&#x2F;vk.com&#x2F;sci_hub?w=wall-36928352_5896" rel="nofollow">https:&#x2F;&#x2F;vk.com&#x2F;sci_hub?w=wall-36928352_5896</a>)<p>Image: <a href="http:&#x2F;&#x2F;i.imgur.com&#x2F;xZmDmPY.jpg" rel="nofollow">http:&#x2F;&#x2F;i.imgur.com&#x2F;xZmDmPY.jpg</a>
评论 #11072318 未加载
anc84超过 9 年前
&gt; the dark web, a part of the Internet often associated with drugs, weapons, and child porn.<p>Indeed, due to journalists perpetuating that meme on and on again. Thanks for strengthening the bad image, Atlantic.
评论 #11072837 未加载
评论 #11074346 未加载
评论 #11072586 未加载
评论 #11071979 未加载
评论 #11072097 未加载
评论 #11075684 未加载
评论 #11073654 未加载
deathwarmedover超过 9 年前
Really surprised this article makes no mention of Aaron Swartz and his battle with JSTOR.
评论 #11072245 未加载
评论 #11073435 未加载
crazzzyraccoon超过 9 年前
Why are the academics forced to publish their papers through these paywalls? Hosting a PDF on the university website seems cheeper than going through these publishers.<p>Are these university imposed rules? Are they forced to go through these publishers if they want their paper peer reviewed and published in journals?
评论 #11072628 未加载
评论 #11072583 未加载
MKolchin超过 9 年前
I use it almost everyday, it&#x27;s even more convenient to search an article in Google Scholar and then download a paper thorough Sci-Hub, than to use Scopus.com or Web of Knowledge&#x27;s search engine.
评论 #11072621 未加载
Estragon超过 9 年前
Has anyone successfully found something useful which they couldn&#x27;t find elsewhere using this tool? I tried it on a few things yesterday and was disappointed.
评论 #11074446 未加载
评论 #11076183 未加载
kefka超过 9 年前
I find the way TOR is used lacking. I really would like to have .Onion resolution across my whole system (in my case, I extensively use Linux). So, Here&#x27;s a way to do just that:<p>I use a significant amount of HiddenServices to communicate back and forth with my machines. My eventual goal was to be able to process data from different geographical areas and have them inserted into MQTT via Node-Red. Until now, it was all or nothing with regards to proxy settings.<p>I have figured that out. For those that want to integrate seamless .onion usage across the whole of Node-Red (and every other Linux program), follow this.<p>get the following packages (Ubuntu, Debian)<p><pre><code> sudo apt-get install tor iptables dnsmasq dnsutils </code></pre> Add the following to the &#x2F;etc&#x2F;tor&#x2F;torrc file<p><pre><code> VirtualAddrNetworkIPv4 10.192.0.0&#x2F;10 AutomapHostsOnResolve 1 TransPort 9040 DNSPort 53 DNSListenAddress 127.0.0.2 </code></pre> Restart TOR<p><pre><code> sudo service tor restart </code></pre> Edit &#x2F;etc&#x2F;dnsmasq.conf and add the following:<p><pre><code> listen-address=127.0.0.1 resolv-file=&#x2F;etc&#x2F;realresolv.conf server=&#x2F;onion&#x2F;127.0.0.2 </code></pre> Make a new file, called &#x2F;etc&#x2F;realresolv.conf . Add this in the file:<p><pre><code> nameserver 107.170.95.180 nameserver 8.8.8.8 </code></pre> Restart DNSmasq:<p><pre><code> sudo service dnsmasq restart </code></pre> Run the IPtables firewall update for redirection<p><pre><code> sudo iptables -t nat -A OUTPUT -p tcp -d 10.192.0.0&#x2F;10 -j REDIRECT --to-ports 9040 </code></pre> Also, this script must be run at every boot, so add this in &#x2F;etc&#x2F;rc.local, ABOVE the &quot;exit 0&quot;<p><pre><code> &#x2F;sbin&#x2F;iptables -t nat -A OUTPUT -p tcp -d 10.192.0.0&#x2F;10 -j REDIRECT --to-ports 9040 </code></pre> Once you do those things, your whole Linux sustem will be able to resolve .onion addresses seamlessly, yet leaving alone canonical address schemes. this means that you can talk with a MQTT-out on an .onion, or control remote servers via exec node and SSH. And since you don&#x27;t have to poke holes through firewalls, networking between Hidden Nodes with Node-Red sitting on top makes IoT sensor capture from remote areas (Work, home, car, hackerspace) very easy.<p>Of course, this does not discuss how to actually add a new hidden service You should think very hard before enabling a service: Make sure there is good authentication on them along with the newest updates. There is no determining origination on these kinds of attacks.<p>cite: <a href="http:&#x2F;&#x2F;www.linuxquestions.org&#x2F;questions&#x2F;linux-networking-3&#x2F;how-to-access-the-darknet-tor-network-4175553338&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.linuxquestions.org&#x2F;questions&#x2F;linux-networking-3&#x2F;h...</a> , Have confirmed directions work flawlessly on Ubuntu 14.04, 15.04, and 15.10 (various flavors of Ubuntu, XUbuntu, KUbuntu)
评论 #11078461 未加载
yk超过 9 年前
Somehow I believe that thing could have an awesome forum. (But alas, it does not have one.)