for a second i say WHAT in windows!!! i put some addresses in myAddyList.txt dir: C:\Users\x PS C:\Users\x> findstr.exe -f -F myAddyList.txt balances-bitcoin > final.txt i get this error FINDSTR: Cannot open balances-bitcoin Does the textfile balances-bitcoin exist? Did you download it ? Please read the thread from the beginning if you didn't download it yet. Also, you need to adjust the syntax. Windows does not take parameters with a " -" but with a " /" You can find a lot of explanations of findstr online, to properly adjust your syntax.
|
|
|
I do not understand how the virus can broke 2-factor protection if it is constantly changing very fast.
The algorithms to derive the OTP is publicly available. The changing code you are referring to is a Time-based OTP. It is derived using a secret (seed) and the current time. If an attacker knows the secret, he can create the same OTP since he is also able to read the clock. Anti-Virus is made for the security of our computer anything that is bad for the system anti-virus will block it.
No, it won't. It will block a small subset of all potential threats. The known one and thee very obvious ones. [...] because of the unidentified malware that we downloaded from browsing the net.
You don't just download malware by browsing the web. It will be downloaded either by some drive-by exploits (not that probable) or by manual user interaction (very probable; e.g. 'crack all private keys by running this program' scam).
|
|
|
Seems like i have to review someone's posts. I don't wanna be a top 100 merit stabber
|
|
|
Did you already develop a security concept which secures you in other (probable) events ?
Securing your mnemonic code against emanations from cables used to carry the video signal is something very advanced.
If you indeed already have a concept which secures you against any other events of a compromised seed, you should be able to generate it without being displayed on your screen. Why even displaying it at all ? Just use the command line and some simple script to generate a seed and convert it into a mnemonic code without even displaying them. Just save them or do whatever you want to do. You don't have to use electrum or any other desktop wallet.
If i were you, i'd rather focus on more possible events. Is your computer clean ? Fresh installed or bootable OS without internet access and without manipulated hardware ? What about physical security ? How are you going to secure your seed ? How are you going to access it ?
All of those questions should be answered first before thinking about emanations from video cables.
But to answer your questions.. just use the command line and plug out your screen. Voilà.
|
|
|
- Private cryptocurrencies:
Monero (the most popular), PIVX, Dash, Zcash, Particl, among many others.
I am only aware of one cryptocurrency which truly protects your privacy: Monero. Anything else (especially PIVX, Dash and Zcash) are just promoting to be privacy orientated, while in fact it is trivial to de-anonymize the transactions. I never heard of Partricl, so i can't talk about that. But if there is any other crypto which is truly(!) private, i'd be glad to hear about that. Especially about the technology used. But the mentioned ones (except Monero) are definitely not privacy-orientated. If someone is really interested in protecting his privacy, he should either use coinjoin, a proper mixing service or Monero. [/list]
|
|
|
When a newbie talks about an account, he often means Blockchain.com's wallet.
Might be possible, but we don't know for sure. When a newbie talks about an account, they often refer to a wallet. When a newbie talks about a public key, they often refer to an address. Newbies often use the wrong terms. Most probably they simply don't know better and heard a word and thought this is describing exactly what they mean. Or, others think that they have an account 'with the blockchain' when installing a wallet. OP still didn't answer which wallet he is using. I guess the problem is solved ? He didn't reply after the OP within the last 4 days.
|
|
|
I am aware of this factor, but still, if there is an opportunity to defend ourselves, then why not?
The thing is, that the majority of malware (more than 95%) is written for windows. This alone makes it safer to use linux/mac. In a targeted attack, it doesn't matter at all which OS you are using. But in such an attack an AV wouldn't help at all either. You can configure windows to be relatively secure. But this takes a lot of effort and know-how, while on the other hand other OS's are more secure by default (linux / macOS). If you can, you should go for linux. For any software you need to be running on windows, simply install a virtual machine.
|
|
|
I tried to search for '"4 bit IV" winrar' in the google - there is only your post. I looked a little at the whole on Winrar password vulnerabilities - nothing. Can you tell me more about what you are talking about?
There have been multiple vulnerabilities already. WinRAR used its own encryption mechanism before implementing standard (good) algorithms. However, the vulnerability i was referring to actually was from 7zip. Sorry, my bad. They used a 16 byte IV (instead of 128 byte as defined in the standard) of which 8 byte were 0's, so effectively a 8 byte IV. This hasn't been found for several years. Relying on WinRAR, WinZIP or 7zip for storing confidential information is always a bad idea. If you want to encrypt data, use some good and reputable software which is made for doing so (e.g. VeraCrypt).
|
|
|
I quote you because you are mistaken. You said he wouldn't copy the virus by copying "documents, pictures and music", and that is a lie, and yes i am correcting you.
He might be copying the infected file, but not the malware which itself is running in the background migrated into another process. These processes won't be started on the new install at all. If he obvioulsy opens the infected file and get infected again.. well of course his compuer will be compromised again.. And he most probably is NOT infected with a virus, but with another kind of malware. I don't get why you even mention something about the signature campaign, which you clearly also participate in...
Because you participate in a spam campaign. I don't. And your postquality also backs this up. And no, the term when it was coined, and i think still is, was clearly macro virus, not macro malware.
A virus is defined by the way it spreads itself. A virus spreads itself by exploiting vulnerabilities automatically resulting in a lot of infections at a fast pace. THE BACKUP CAN COPY THE MALWARE. If he does it from a secure os, such as Linux running live from a dvd, the copying won't execute it, that is, until he opens a freshly installed windows, open the file and executes it (ie. the macro virus).
Copying never executes the malware. Doesn't matter whether from linux or windows. If he decides to open an infected doc file and allowing macros to be execued (which has to be done explicitly), then he is at fault. Most probably he got infected in a different way. Now, please stop spreading your dangerous sciolism.
|
|
|
As if viruses did not infect "documents". I wonder if you are even familiar with the concept of "macro" virus? And, how about exploits to the image rendering system abused from pictures? I also have bad news to you about music, its tagging system, and exploiting the bundled players...
Wow. This post is just to reach your quota for your sig payment it seems ? We are not talking about exploits here. This is not about what can be exploited. This was about how he can move to a new system backing up his files. What does an exploit in any rendering software to do with that ? Also, do you really believe a malware will 'infect' all .doc files with a "macro virus" ?? Do you really believe that ? You do know that they have to be explicitly allowed to be executed by the user ? What can or can not be exploited was never the topic here. If you are not familiar with the 5/7 stages of a malware attack, that's fine. But please don't write such a nonsense. Or at least don't quote/mention me while doing it. P.s. The term you were looking for is malware, not virus. A virus is just a small subcategory of malware. Google it. You don't want to use a secure OS and other people don't want to use a software which slows down their PC.
There are no secure OS. Bugs and vulnerabilities are everywhere. The same goes for software. Even more most of the vulnerabilities come from applications not from OS. There is no 100% secure OS, yes. But Windows is by far the least secure OS of all available ones. A professional administrator needs days of work to get a windows network close to be as a secure as a linux network is by default. And a few hours invested into a linux network will make a big difference again. Windows is having more than enough vulnerabilities each month. Linux and MacOS too, but not this extent. And i am only talking about security vulnerabilities know.. ignoring all the bugs windows has (boot loop, files deleted, takes an hour to update ... ).
|
|
|
Not really a question, but the question mark is there so that I could later weasel out with some bullshit like this: I presented a question, not a statement.
Learning from the best. Don't forget: Yes, of course rules only apply to those you oppose
|
|
|
Unfortunately in my experience getting merits has nothing to do with good content.
That's a statement which can only come from someone who has received a total of one (in numbers: 1) merit. And in the mean time this bumping system kills every initiative that is not promoted by big guys.
Let me rephrase this: [..] this bumping system kills every scam promoted by newbies.
|
|
|
But what is the problem to install antivirus and don’t worry? It is very easy app.
The company behind the software is collecting lots of data. They are using that data to make money. And it slows down your computer pretty heavily since it needs quite a lot of resources. But what is the problem to install a proper OS and don't worry? It is very easy software.You don't want to use a secure OS and other people don't want to use a software which slows down their PC.
|
|
|
So your theory is that if multiple users criticize your behavior then it must be coordinated?
Is this a rhetorical question ? Remember: Yeah but he's never ever wrong
|
|
|
Wie unsere persönliche Bumping Power ist, kann man ja noch nachvollziehen aber ich würde es schön finden, wenn der jeweilige Bumping-Score jedes Beitrags mit angezeigt wird. Nach der aktuellen Regelung ist das einfach total intransparent und sieht so aus, als würden die Themen irgendwie zufällig sortiert werden.
Theymos hat es absichtlich so designt, dass es nicht sichtbar ist. Das soll dazu dienen, dass das bumping nicht verkauft werden kann (da man schlecht nachweisen kann, dass man wirklich gebumpt hat). Kein Score -> keine Nachvollziehbarkeit -> kein Verkaufen (hoffentlich). Und für komplett neu Beiträge ist die Regelung ziemlich unvorteilhaft, sofern von einem Newbie erstellt. Die würden ohne Kommentar gleich auf einer der hinteren Seiten verschwinden, da der Newbie als Ersteller keine Bumping-Power hat.
Das ist ja, denke ich, Sinn der Sache. Zu viele Newbies posten dort ihre Scams und hoffen Leute anzuziehen um Ihnen die Satoshis aus der Tasche zu ziehen. Aber man kann die Posts ja auch mit einem Klick wieder nach "last post" sortieren. Ich glaube eher, dass der größte Effekt durch dieses Update sein wird, dass es einerseits keiner merkt, dass bisheriges Spam-Bumping nicht mehr klappt und selbst wenn Spam-Bumper es merken, verstehen sie die Funktionsweise des neuen Systems nicht. ^^ Die meisten werden denke ich trotzdem weiterspammen ohne zu merken, dass es nix mehr bringt. Oder die Beiträge in anderen Boards posten, in denen es die Restriktionen nicht gibt, was dann wieder zu Spam führt.
|
|
|
This is actually right where it is much more better if we do have AV than have nothing at all.
This - as a general statement - is wrong. It depends on a lot of factors, mostly the OS. If you are using windows.. then yes, you need some AV. But why are you using windows in the first place ? Because you like the clicky-pointy way of opening applications ? Is it worth compromising your security for that ? An AV can slow down your system pretty heavily. It always depends on what you need and what tradeoffs you are willing to take. Come to think that you can even get a full or pro version via cracked without spending some dime
Sure.. get a cracked version for free. Because that is surely not infected with malware I mean.. come on.. are you really that naive ? New and updated viruses as the years passed by do exist that's why if we are looking for some good AV then better pick one of the best.
Exactly these new and 'updated' viruses (you meant malware, right ?) won't be detected by AV's.
|
|
|
Use signal and talk to whom? To only 3 nerds from bitcointalk?
Signal is more popular than you think, it has over 10 million download on Google Play I can confirm that. The majority of my friends are using signal or threema. Only a small percentage (<10% still sticks with whatsapp). I mean.. sure i still have whatsapp installed, but thats only for those few people who don't know how to switch to a dilfferent one. Even one non-techy person i know is only communicating via signal with all of her friends (all of them are far away from being tech-savy). Signal is steadily gaining more user. All of the data affairs of facebook are definitely good reasons to switch.
|
|
|
If no highlight, there's one more thing that may add extra output to your transaction: 2FA fee.
An output for the 2FA fee (to trustedcoin) is highlighed blue. Overall, there are 3 colors: Green highlighted: "Sending address" from own electrum wallet Yellow highlighted: "Change address" from own electrum wallet Blue highlighed: Address to buy 2FA credits from TrustedCoin Not highlighted: Address which does not belong to the own walllet / or TrustedCoin to top up the 2FA credit.
|
|
|
|