OooOOoOoO NOW I get it. Awesome.
EDIT: I see 9 in the top stack, what's the maximum? Also, what is the maximum stacking cable length? Because once you get above so many, you have to start over on another stack.
|
|
|
Torrents break the files into regular and specific piece sizes, and hash each piece with SHA-1. The list of hashes is included in the .torrent file. This is my understanding based on the wikipedia article on bittorrent.
|
|
|
Apparently I was fired from ElletSys with out ever being notified as I was kicked from the ElletSys communication channel-- So now I have plenty of knowledge to contribute to the open source community.
I believe in the dream too PocketCoin! No more greedy corporates wasting our hard earned time and money!!!
lol you were involved with that too?
|
|
|
There were several IP addresses used, one of which was an interesting one in Spain. Pretty sure most of the blocks were sent through other pools to disguise them, and proxies too. The general consensus seems to be that he stopped operating after P2SH was implemented, because it broke his pool script and he must not have wanted to bother fixing it.
|
|
|
It doesn't seem to do input validation. The string "test" was accepted as a valid bitcoin address.
|
|
|
Dammit, now I'm going to have to get behind like 8 proxies, send my bitcoins to various exchanges, then send them back to new offline wallets in weird amounts.
|
|
|
My rule of thumb for OCZ and other SandForce based drives: If it doesn't fail within the first month of operation, it is pretty much guaranteed to last for a long while. I have had astounding failure rates, but the ones that don't fail are awesomely fast. SandForce controllers are a whole new level of absolute shit QA testing, usually a bad drive will fail during OS install or shortly thereafter.
|
|
|
You don't have to tell it on the forum, and indeed the forum is the last place you should be looking for help.
Why are you so afraid of them knowing who you are? Sounds beyond shady. Way beyond shady. If you are afraid of compromising a trusted position on some other site, it sounds like you shouldn't be holding any such position of trust in the first place.
|
|
|
IS there such a thing as DDoS protection? Before you start services try to find out about the DDoS sizes the community had to face in the past and see if your countermeasures are remotely available to stop/circumvent these. I have no numbers at hand now, but some of the past ddos were massiv enough to take down the big pools at the same time... and especially for DeepBit and BTCGuild i am quite sure they have a badass bandwith that should sustain a lot of traffic..
http://prolexic.com/They are a bit on the extreme end of the spectrum, and are therefore one of the most expensive. Likely there are cheaper providers that would stand up to most attacks. MtGox uses Prolexic, and I heard at one point that the cost would be $10k/month.
|
|
|
if japan is anything like its media it must be one fucked up place.
Understatement. Vending machines with used child's underwear, anyone? It's a strange place.
|
|
|
Correct, both parties need to sign up at WalletBit with their email as stated in the press release.
You could easily make it so that the wallet has a bitcoin address to receive coins, and so that the user can send to a bitcoin address. There's really no technical reason for not offering that, right? It does have an address to receive funds to, or did you mean something else? Oh, so I am misunderstanding Kris' statement before? It can work where I send bitcoins from my cleint (e.g., bitcoin-qt) to a Bitcoin addres for the WAP wallet for the recipient? (i.e., standalone user) Yes, but you can only send them from the WAP client to other walletbit users. For me, I had to sign up for 2 accounts: one WAP and one "normal", in order to withdraw at all to a normal bitcoin address.
|
|
|
On a bus, nice. This takes RFC 1149 to a whole new level.
|
|
|
The thing is, from what I understand, ASIC processes are somewhat specific to the company that makes them, since each has its own IP and they all want to keep it away from each other. Do you have access to the engineers that can perform the company specific customizations to fit your process? They are usually the bulk of the NRE cost, from what I understand, since they must validate the mask that is being made for the chips.
|
|
|
Full custom ASIC is about as big as you can get. Unless you mean adding more employees or something.
|
|
|
Could you do the same thing as was done at the time of the big hack last year and transfer a specified number of bitcoins to a specified address, after having announced the address and the amount? Ideally, we would see the amount moved cover the total asks, at minimum.
|
|
|
You should get some frangible ammo to try out, it sounds like a lot of fun to play with. In the middle of this video: http://youtu.be/6dYX-h-5HDQ he is shooting steel targets with it.
|
|
|
Yeah I was just providing information about it for you to research because it was brought up. I don't think it would fit in well in this application either.
Well if the wallet got stolen, then you'd have to use the Yubikey to unlock it to send coins. Like if you steal an ATM machine, good luck getting it open without ruining the money. Well yeah, as long as you never kept the Yubikey near the device except when you wanted to use it, otherwise they would just get stolen together. That's why I don't totally get the idea of the Yubikey Nano, because it is designed to be plugged in and left in the USB port and not removed.
|
|
|
|