Adding bitcoin adress containing magstripe to the card will be nice option.
|
|
|
Does really Americas last hope for non-violent change is in old man who might die soon? And the dumb majority of voters still can wote some monkey-man as president again and again. I know about Ron Paul but he looks more like a false hope figure than real revolutionary.
|
|
|
Actually, there are many sites out there that carry malicious payloads and attract potential victims with lures such as porn among other things
Don't want to drive this already demeted thread to full offtopic, but such malware spreading sites does not contain real porn. They are type of social engineering to trick users to download and double click malware executable file. The real porn sites with dialers installed using vulnerable and misconfigured Internet Explorer 5.01 and 5.5 is more than decade old history. Ohh, times when almost every computer had a V90 Flex modem connected to phone line...
|
|
|
Don't expect or suppose the hardware to be able to deliver more than factory default's. Every piece of chip is unique. Some might have greater overclock potential, some might run only at default speeds. Only experimenting will show you what your hardware is capable of.
The 760MHz is already overclocked! The HD5850 default frequency is 725MHz.
|
|
|
Porn is a major vector for viruses.
Watching Porn actually is quite safe. Only the real life encounters with prostitution is the major vector of viruses, bacteria and pubic lices. About your original post, just chill down! Internet is for porn, got it? And the pictures in question are not even porn.
|
|
|
Don't know how your card looks like, but my guess is that it have reference cooler and that it is blowing hot air from one GPU past other GPU heatsink. Was a minor problem in some HD5970 models.
try to buy card with fan positioned in center between GPU's or but aftermarket heatsink for 6990.
The ultimate solution might be installing water cooling on your video card. Forget about the special thermal compound, in my opinion it's marketing bullshit. Properly installed Arctic Silver 5 or similar high-end compound will be just as good.
|
|
|
When I used bnet to crack some rar password, after few days of work I noticed about 20% drop in quantity that never really recovered. And it was not worth the efforts, since the rar file contained basically crap.
Bandwidth, some bursts of activity - ok, this is not noticed by most losers. 100% CPU load might make machines too unresponsive to alert some seek for help. And if the loser is joining other networks as well, the computer in most cases is like Pentium 2 struggling with Windows Vista.
sure thing. im still pretty sure that you dont know how a botnet works. trying to troll me? I'm pretty sure you can't name a distributed password cracking software designed to run on multiple computers. And I'm totally sure you don't have seen botnet in action and how stuff is done.
|
|
|
Most people don't understand the difference between damaging tangible items in real world and damaging virtual files in computer systems. As a person who spends most of his life in virtual world, I can see the differences between virtual and real world clearly. The people who don't understand the virtual world are trying to enforce real life rules in virtual world. And as a result actions in virtual world can result in consequences in real life. It's absolutely wrong.
Back to original posting that started thread. The Bitcoin is convinient means of payment. It have all the advantages that is mentioned in Bitcoin website. And it's also perfectly suited for black hat activity both as means of payment for services, and as a source of income. No more private amateur porn from compromised accounts, wallet.dat is first thing to go.
|
|
|
Botnets in my opinion is not effective miners. They mostly is CPU based and the 100% load might alert few compromised losers to reinstall computers. All other is true.
thats not how it works. they mostly rely on the fact that the user will not notice any changes (increased load, saturated bandwidth) to their computer -- typically because of user ignorance. if the first thought was to reinstall, botnets would not be in as big of use as they are today. When I used bnet to crack some rar password, after few days of work I noticed about 20% drop in quantity that never really recovered. And it was not worth the efforts, since the rar file contained basically crap. Bandwidth, some bursts of activity - ok, this is not noticed by most losers. 100% CPU load might make machines too unresponsive to alert some seek for help. And if the loser is joining other networks as well, the computer in most cases is like Pentium 2 struggling with Windows Vista.
|
|
|
You are also wrong! Electronics hardware is disassembled by reverse engineers. Some hackers also might be able to extensively modify electronics, but no majority of hackers are capable of such feat. Also only few engineers are able to hack networked systems or are members of underground comunnity.
When you want access to particular system, you try all possibilities that your skill level allow. Guessing the password, using exploit if available or social engineering your way in. This does not make difference how you are called.
|
|
|
Probably missed out some uPnP libraries...
|
|
|
Easy, your BitcoinWalletProtect[tm] will warn you that a new unknown process is accessing your (hopefully smaller and secondary) wallet file and ask you to allow access! The next wallet stealer version will either kill the wallet protector process or patch/bypass it. The Bitcoin running as server is another option. This is arms race, and smart people will always be few steps in lead. True. So we don't try at all? I should turn my firewall and antivirus off. It's not like the next malware or attack won't disable them anyway? There is difference between writing next to useless application and intentionally sabotaging security measures. And how about remote access tools like Radmin? You still can use software like that to interact with target computer and make transaction on your behalf.
|
|
|
You are wrong! Hacker is hacker. When there was no laws and unnecesary prejudice against people who understand computers and hack into computer networks, all hackers were called hackers. Crackers are neologism artifically created to distant from people who hack websites, write malware and other stuff. This is wrong. I have seen on numerous ocassions how so called "white hat" hackers from well known security companies get boored and deface websites just for fun.
Basically in my opinion it is not evil to deface some website, take down some small part of network or write new piece of worm as long as the CRT monitor of the victim does not explode and blast shrapnel in face.
|
|
|
From time to time you also must run cracks for the software you install. LOL really? Either buy the software or install a free software alternative. Running an untrusted binary is something that you must not do if you want your computer to be secure. Probably americans can buy all the software they want and it costs to them less than they spend on dinner in restourant. But for some people not so lucky to born in developed country and rich parents, the software costs are too high. For example MS Office Enterprise will cost me about 2 years of income. And none want to use inferior alternatives. Yes, I can use Open Office and I like OOo, but I also like to have both MS Office 2007 Enterprise and OOo on my computer. If OOo will have problems with some docs, I will use the MS Office with the sucky ribbon. About untrusted binaries you got it right. But we sometimes need to use them. Not only cracks, some technical tools also. Good if they can be run in virtual enviroment like VMWare. Easy, your BitcoinWalletProtect[tm] will warn you that a new unknown process is accessing your (hopefully smaller and secondary) wallet file and ask you to allow access! The next wallet stealer version will either kill the wallet protector process or patch/bypass it. The Bitcoin running as server is another option. This is arms race, and smart people will always be few steps in lead.
|
|
|
Botnets in my opinion is not effective miners. They mostly is CPU based and the 100% load might alert few compromised losers to reinstall computers. All other is true.
|
|
|
Namecoin is a joke. Rroot DNS servers can't resolve .bit TLD.
What's wrong to .ch .se or .is domains? For hosting Bitcoin exchange they are perfectly suitable.
|
|
|
Built-in password protection of wallet.dat file can help in situations when you only have wallet.dat file and no keylogger on the target system. Using computationally expensive decryption like in KeePass will delay the dictionary attack. But it will fail if the system is infected and attacker waits until you enter password for wallet.dat and then steal your wallet and coins.
If Bitcoin really becames widespread, the users will start to really care about security of their computers and be carefull what they do. The times when users was afraid from running setup.exe and asked more experienced users to assist in installing software will return.
|
|
|
For example you need to be able to do ctrl-c on a bitcoin address or have provider-pluggable cloud-based backup built in. There are a million things still to do.
You can do that! There is button "Copy to Clipboard". You probably missed it because the button is yet not skinnable... Sorry, can't resist being sarcastic. Cloud based backup is bad idea. Backing up wallet on so called "cloud" gives 2 concerns. First the cloud can be destroyed by adversary or accident more easily than offline backups in your phisical possesion. Second, even if the backup crypto is not broken, the theft of wallet is more easily done becouse all you need is login information than wallet.dat file itself. Login information is a little bit easier to retrieve from remote systems using keyloggers than file.
|
|
|
The malware might no be able to interact with processes within virtual machine, but the malware can give the attacker full control over your computer, including mouse and keyboard. The hacker can interactwith your computer just like you do, and transfer your coins using mouse and keyboard. And it's only matter of wasted time and lines of code before targeted malware appears that is able to tamper with virtual machines directly, if the need ever comes.
Antivirus is no protection. It will not detect properly crafted malware for weeks, sometimes even months. I know what i say.
|
|
|
What should you need to change in Bitcoin client??? You need to bloat the GUI with skinnable themes to attract additional bunch of retarded users who judge software purely from so called "eye candy"? (search youtube for "happy tree friends eye candy") (lol)
You must get rid of the block count in statusbar that most users even did not notice?
The Bitcoin is example of simplicity and functionality. I have said my word.
|
|
|
|