Linux has less than 1% users around the world, though the users runs to millions they are still insignificant figure among windows and Mac users in the world. It might be difficult for other users to relate with your challenges and I think the adoption of the OS was due to how the OS relate with new users and they got familiar with it. I found it hard to believe you never started with windows.
Statscounter puts the % of linux desktop users at 1,85% https://gs.statcounter.com/os-market-share/desktop/worldwideFor developers, it's 25,3% https://en.wikipedia.org/wiki/Usage_share_of_operating_systems#Desktop_and_laptop_computersFor webservers, it's 34.2% (vs windows @ 28.9%). This stat astounded me, who in their right minds would run windows on a webserver? https://w3techs.com/technologies/comparison/os-linux,os-windowsFor webservers, if you look at all *nix systems, the rate goes up to 71,1% https://w3techs.com/technologies/overview/operating_systemLinux isn't a marginal OS that's being run by allmost nobody, it has wide support (even commercial) and it's being used by many professionals. That being said: it's true a lot of home users are misinformed. I know an IT crisis manager, he's been in the business for over 30 years. When I talked to him about linux, he said: "I'll never let anybody in my office run linux, it's just a black screen where you have to enter commands, so it cannot be used in the workplace". He was quite supprised when i booted my laptop and saw what linux can actually do. As for the last part of your question: the first pc i bought was an ibm machine with an Intel 80286 processor, two 3,5" diskette trays (no harddisk). It was a 16 bit machine. I had a couple versions of DOS laying around on physical diskettes, i had to make copies since those things had bad sectors quite often (at least, if you bought the cheaper brands). Let me know if a machine with those specs ran windows The first time i saw windows, you had to boot dos, then start windows from DOS... It was that simple Unfortunately Linux is not safe due to viruses. In Windows you can get many antivirus and malware software, in Linux you can not do anything ( one or two antivirus soft, which is outdated due to small users group ). Plus in Windows you have a lot of various software, also developed ones. In Linux you can get outdated software, possible with developed virus from repo. I agree with Artemis3 completely, but wanted to expand a little bit... In my company, we're doing exactly what Artemis3 was saying: we have ClamAV on one of my servers, and it scans every document that's being uploaded because these documents get opened on windows machines, so we want to be as sure as humanly possible we're not storing infected files that can later be opened on windows machines. The guy in charge didn't want to rely on an open source virus-scanner anymore, so i had to look into the commercial alternatives.. There are loads... https://www.ubuntupit.com/best-linux-antivirus-top-10-reviewed-compared/- Sophos
- Comodo
- ClamAV
- F-PROT
- Chkrootkit
- Rootkit Hunter
- ClamTK
- BitDefender
- ESET NOD32 Antivirus 4
- Avast Core Security
- ...
|
|
|
1 - mocacinno Let's see if i'm on a lucky streak
|
|
|
Well, avikz's list is a good start, but what interests me the most is what they'll do with my data: - How is it stored (which medium, firewalls, unrouted networks, which database vendor, which OS,...)
- Where is it stored (which countrie(s), where do they keep their backups, is there a guard in the datacenter,...)
- How long will it be stored (x months after transaction, forever,...)
- Who will be able to access my data (all employees, certain employees, only the person in charge of KYC, partners of the company, anybody giving the company money, everybody in general, a 3 letter agency without a warrant,...)
I'd like this info from every company i give my info to... And it should be verified by a trustworthy thirth party before i believe anything they say. Far to often i've heared from companies that keep sensitive data in a web accessible relational database on an unpatched, unfirewalled system... I've seen companies keeping their backups on a public accessible ftp server (with an old, vulnerable ftp daemon). I've even seen companies that had backupsets that were available on their website (backups taken with phpmyadmin into a remote accessible path that were not moved to safety after the backup had run). In these cases, it didn't even matter if you knew the legal name of the company. Sure, you'll have someone to drag to court, but the harm has already been done. I'd rather not have to sew a company than getting some money from them because they lost all my private information and it's now for sale for a couple bucks on some darknet marketplace forever....
|
|
|
I'm a sysadmin, most of my servers run SLES nowadays. At home, i usually go for bsd, unless i have to start compiling drivers myself (in which case i usually switch to debian). It's not because compiling drivers is impossible, but because once you start compiling drivers, you'll have to manually check for new versions once in a while, and recompile if a new version has been found. This being said: my employer forces me to use a windows PC for work purposes... So most of my time, my desktop system is windows... I hate it. It's completely bolted down, centrally managed. I can't even install any application without sending the binary to the laptop admin so he can update his filter with the hash of the binary (otherwise the system's filter won't even let me start the application). The security "features" really stop me from doing what i want to do all the time, and even if there's a setting i can change i have to go trough sooooo many configuration screens just to edit something smal. I'm not even talking about how slow this windows system is, the updates take for ages, rebooting is slow,.... If i update my servers, i just register a new repo with newer binaries, enter "zypper up" and 3 minutes later i have all the new packages. If i reboot, it takes just a few moments from hitting enter on the terminal and being able to ping my server again. If i had the choice, i'd probably never touch a system with a windows os ever again... But that's just my personal opinion
|
|
|
Wow I've been participating in these raffles for a while now, finally hit the jackpot I'll send you my details in PM, thanks!
|
|
|
@Royse777, if you're a beginner, and you want to save yourself a headache messing with docker, cross compiling,... It might be better to install the latest ubuntu on a clean virtual machine (like virtualbox). Then follow https://github.com/spesmilo/electrumBasically sudo apt-get install python3-pyqt5 python3-pip python3-setuptools protobuf-compiler git clone git://github.com/spesmilo/electrum.git cd electrum git submodule update --init python3 -m pip install .[fast] protoc --proto_path=electrum --python_out=electrum electrum/paymentrequest.proto ./run_electrum
|
|
|
@Royse777: you cloned the git repo, not the binaries... There are no signatures for these source files. If you want to proceed, you'll have to create the binary for yourself. I don't see any documentation as to how to compile the binary in a windows environment, but maybe you can run linux as a virtual machine on your desktop in order to compile the sourcecode (there's a complete how-to on building windows binaries from linux here: https://github.com/spesmilo/electrum/tree/master/contrib/build-wine)?An other option is that you ask somebody you really, really, really, really trust to build the binary for you... But even then, i'd probably only run it on the testnet inside a jail (or on a computer that's not being used for anything else, contains no other user data, and will be scratched afterwards)
|
|
|
This address belongs to a wallet that contains 137 addresses that were (at one point in time) funded. https://www.walletexplorer.com/wallet/02101970cc8b344e/addressesThere were points in time the balance of the wallet was close to ~5 BTC https://www.walletexplorer.com/wallet/02101970cc8b344e?page=2So, i think it's safe to conclude that your customer is either somebody that's been around for a long time, and did tons of transactions (in which case he'll have to figure out what went wrong by himself) OR your customer is using a non-custodial wallet (web wallet, exchange wallet,...), in which case he'll need to contact his non-custodial wallet's support team. My gut feeling is that it's the second option: a newbie that's using a non-custodial wallet but has no idear how things work. He created an address, gave it to you, you created a transaction funding this address, but his non-custodial wallet isn't updating it's records (either because they have technical problems, because they're a scam, because they're monitoring the wrong chain, because your customer copied a donation address instead of an address belonging to his account, because the customer's pc was infected with a clipboard virus,...). Anyways, it's not up to you to solve his problems, however, you might want to consider giving him some best-effort support. Maybe let your support engineer spend one or two hours trying to find out which wallet your customer used help him find out if they scammed him. Do make it perfectly clear that you're not responsible for their choice of wallets, and there is no way you can actually recover the funds for them, nor will you reimburse them if they were scammed by the wallet provider they chose. If the address hadn't belonged to such a big wallet, i'd say dothebeats' post was also worth looking into... You wouldn't believe how many times a newbie creates a BCH wallet and funds an address from this wallet on the BTC chain (or any other fork combination).
|
|
|
You can also download electrum, create a new wallet (import bitcoin addresses or private keys), then import your private key without sweeping. If you're going to spend these funds anyways, sweeping will result in extra fees... The method OmegaStarScream has provided has the added benefit of sweeping your "old" funds into a HD wallet, but the sweeping itself will create a new transaction moving your funds to the new HD wallet, so a miner's fee will be added. If you spend the funds afterwards, a second transaction will be created and a second miner's fee will have to be payed. If you're not 100% sure the private key was stored securely, and you're not going to spend your funds right away, following OmegaStarScream's instructions might be better. If your private key was stored as secure as humanly possible or if you're going to spend your funds right away, my method will do the trick, and it'll cost you less in miner's fees (imho)
|
|
|
1 - mocacinno perfect last couple of raffles were always full before i stumbled upon them, this time i'm first Thanks!
|
|
|
Sorry to say, but you'll learn nothing while mining litecoin with an rPi. You defenately won't mine enough to buy anything (whatsoever) on any shop anywhere. https://litecoin.info/index.php/Mining_hardware_comparison#CPUAn rpi4 (latest model) has a quadcore Cortex A72. The A72 isn't in the above list, but it's clear that these CPU's seldomly hash at a hashrate higher than 5 kH/s Enter this number into one of the many mining calculators like this one (first his on google) https://www.cryptocompare.com/mining/calculator/ltc?HashingPower=5&HashingUnit=KH%2Fs&PowerConsumption=0&CostPerkWh=0&MiningPoolFee=0The ESTIMATED income, per YEAR is 0.00007916 Litecoin. At current preev rate, that's less than half a dollarcent (in other words, you'll have to mine 200 years at current diff, block reward and exchange rate to mine $1) Even if you find a pool that accepts really low diff shares, the chance you'll find a share is very low... So basically, mining litecoin with an rPi is just wasting cpu cycles while nothing at all happens. As for who is accepting LTC, there are payment gateways like coinpayments that accept a lot of established altcoins (as long as the shopowner configures them). I'm not a fan of coinpayments, but you might look trough their business directory and check out their vendors to see if you can find one that accepts LTC
|
|
|
--snip---
Oh abra can read this thread sir?
yes... They can. If they want to ask extra questions they can create a free account, if they just want to read these posts they can do so without registering an account.
|
|
|
Can i say this message to abra support ?
If it's really problematic, you can always point them towards this thread... It should explain everything that needs to be said:
Abra wallet is using their (bittrex's) api to create new deposit addresses (and probably to process withdrawals aswell). You used Abra's wallet and created a new BSV deposit address. You sent BTC to this BSV address If they (bittrex) import the private key that was used to generate the BSV address into a BTC wallet, they'll be able to give you a partial refund (it would be acceptable if they charged you a couple hundred bucks to pay their engineer to perform these steps).
So, you'll basically need Abra to confirm that the BSV deposit address created with their api was shown to you so you could deposit BSV, then you'll need bittrex's staff to send you your funds back.
To be honest, i have no idear if abra is going to be willing to acknowledge this to bittrex, nor do i know if bittrex would be willing to export private keys from a BSV node and import them into a BTC node. Some exchanges do this for free, others charge a nominal fee, some won't help you at all... It's a roll of the dice, but if i were faced with this situation, at least i'd try to get my funds back.
I'd just send them a link to this thread instead... Since Heisenberg_Hunter has actually re-created your problem, they'll even be able to ask additional questions if they want to.
|
|
|
A lot of replies since i left the office yesterday... I do have some additional remarks/answers... - I've been around for a while, i did not fall for this trap nor did i intend to steal the 3 BTC. I immediately saw this mail for what it was: scam spam. I logged in over VPN using a secure client using a non privileged user so i could learn a thing or two about the method in order to post a warning.
- This thread has been created because i googled for the ip and some sentences of the mail i received and could not find a hit right away. By making this thread, i hope it gets indexed by google, so when a new user gets the same mail but decides to DYOR, at least he'll find my warning when he googles part of the mail he/she received. That's all there is to it. This thread is made to protect unknowing users from getting scammed
- If you connect to an unknown ssh server, there are some attack vectors, but if you use a secure client as an unprivileged used, no X forewarding, VPN,... The risks are rather limited. AFAIK, an attacker has to find a vulnerability in your client in order to do anything malicious. In this case, i'm pretty sure this guy was only after the deposit that was asked in order to "activate" a withdrawal address
- If there's a russian speaker on this forum, it would be nice of him/her to contact the host of this scammer and get his account suspended (the hosting company seems to be https://thehost.ua/, the client has a VPS with ip176.114.8.35)
|
|
|
--snip-- Thaks u sir i try contact the bittrex but my english so bad so hard to communicate
If it's really problematic, you can always point them towards this thread... It should explain everything that needs to be said: Abra wallet is using their (bittrex's) api to create new deposit addresses (and probably to process withdrawals aswell). You used Abra's wallet and created a new BSV deposit address. You sent BTC to this BSV address If they (bittrex) import the private key that was used to generate the BSV address into a BTC wallet, they'll be able to give you a partial refund (it would be acceptable if they charged you a couple hundred bucks to pay their engineer to perform these steps). So, you'll basically need Abra to confirm that the BSV deposit address created with their api was shown to you so you could deposit BSV, then you'll need bittrex's staff to send you your funds back. To be honest, i have no idear if abra is going to be willing to acknowledge this to bittrex, nor do i know if bittrex would be willing to export private keys from a BSV node and import them into a BTC node. Some exchanges do this for free, others charge a nominal fee, some won't help you at all... It's a roll of the dice, but if i were faced with this situation, at least i'd try to get my funds back.
|
|
|
Ah, I get it now... Abra claims to be a non-custodial wallet (which is unverified), but only for BTC, LTC, BCH and ETH. For other coins they probably use bittrex's api, so for all other altcoins (except BTC, LTC, BCH and ETH), abra is a CUSTODIAL wallet. IF what they're telling you is the truth, they are right and they cannot help you. However, there are 2 more things you can do: - Search Abra's TOS/FAQ/... take screenshots if you have to. Try to find out if they were clear upfront that they are only non-custodial for 4 coins, and they keep all other coins on an exchange. If they did not tell you in their FAQ, their TOS, on their website or in their app, you might be able to ask them to repay you, since you were using their product under the false assumption they were non-custodial for all altcoins, so by not telling you that they kept some of your funds on an exchange, it's a little bit their fault that you cannot recover your funds
- Try contacting bittrex TOGETHER with abra's support, explain the situation (you sent BTC to a BSV address, not knowing your BSV private keys were not derived from the xprv generated by the recovery seed from abra, but instead they were generated trough an api with bittrex). Try to convince bittrex support to send you your BTC back. Do realise you'll need abra's support, since the deposit address was most probably generated using abra's api
|
|
|
I have a few questions regarding running a Bitcoin gambling website online.
I am located in Canada. So I'm not sure if it's legal for me run a site like this online from within Canada.
If it is legal for me to host the site else where, where is it possible for me to host it and do I need to get it licensed or it's okay to operate without a license since it's crypto.
I advise you to search a lawyer specialised in this matter instead of following any advice you get on an online forum. I do know in a lot of jurisdictions it's NOT ok to run a crypto casino since it's *just* crypto
|
|
|
I don't use my main email address to anything realted to bitcoin. I'll see if something pops up. My other mails are full of spam so I don't really check them. Another thing to be aware of. Even if you try to login using SSH it will reveail you IP not to say what other damage could make. Then you can be a targed for furhter attacs.
Yeah, true... I did connect trough VPN tough, so i'm not worried... And even if you didn't use a vpn, the scammer knows your ip, but that's about it... If he scans a couple of subnets that belong to some more popular isp's he'll find hundred's of ip's belonging to endusers, so logging the ip from somebody he tried to scam doesn't seem that dangerous to me. Offcourse, it's bad for your privacy, since the scammer does know your email and ip. btw: if somebody that understands the dangers of these kinds of scams wants to have a look at this scammer's setup, you can always ask the password in PM. I won't post it publicly, nor will i send it to somebody i feel might end up getting scammed if i give him/her the password.
|
|
|
Just a quick heads-up for any newbies that are likely to fall for this new scam method i just got confronted with. Somebody got his hands on my private email and sent me a message that was not stopped by gmail's filters, nor did it look like any of that bulk scam crap you get every day. The pretense of this scammer is that he mistakenly sent an email containing login details to a server that is running some kind of "wallet". If you log in trough ssh, you are shown some kind of menu and you immediately see the wallet contains +3 BTC. Offcourse, in order to withdraw the 3 BTC you need to "activate" a withdrawal address by sending the scammer a couple bucks... He's hiding a classic scam behind something that might be technically difficult for unexperienced users. This way, i think he hopes the unexperienced user will stare at the technical difficult task and doesn't notice it's just an old scam method with a new coat of paint. Anybody reading this post after receiving such an email: if you send any money to "activate" your address, you'll get robbed... It might seem like a good deal to send somebody a couple bucks in order to receive ~$12000, but in reality you'll just lose a couple bucks. Don't get scammed!I got a mail in my mailbox with following text: Hi James
We have just talked on Skype.
We have setup access point to your private Bitcoin wallet. You can now access it via SSH. I recommend Putty to access remote wallet.
Here are the details: ssh: 176.114.8.35 username: james75 password: <snipped>
Don't hesitate to reach out to us, if you have any questions.
Regards, David Private Bitcoin Vault
btw: my name isn't James I have the full mail headers aswell, in case somebody wants to try to track this scammer down. A simple nslookup already pointed to https://thehost.ua/ as hosting company. However, this host's page doesn't have an english, dutch or french translation (only russian?), so if somebody speaks russian, it would be nice if they could open a complaint to the hosting company... One of their users is scamming people using their services.
|
|
|
|