Okey, someone close this topic! Both games are sold! How did you manage to sell Rust for 0.02 when I'm selling it for 0.01875 via a bot that's online 24/7?
|
|
|
How I currently do it:- bitcoin.conf:- rpcuser=Hellno rpcpassword=Hellno maxconnections=1000 checklevel=4 keypool=10000 rpcallowip=127.0.0.1 server=1 blocknotify=/home/bitcoin/block.sh %s walletnotify=/home/bitcoin/wallet.sh %s alertnotify=/home/bitcoin/alert.sh %s Then the .sh's are as follows:- alert.sh:- #!/bin/sh curl "http://127.0.0.1:9485/alert" -d "$@" block.sh:- #!/bin/sh curl "http://127.0.0.1:9485/block" -d "$@" wallet.sh:- #!/bin/sh curl "http://127.0.0.1:9485/wallet" -d "$@" In the program itself, I listen on local host like this:- //HTTP objects var http = require('http'); var httpServer = http.createServer(function (req, res) { dealWithHTTP(req, res); }).listen("9485", "127.0.0.1", 511, function (err) { if(err) { console.log("HTTP ERROR:-", err); } }); Then the 'dealwithhttp' is basically a switch statement based on /alert, /block, or, /wallet. /Alert sends me a message directly, /wallet (I.E. payment incoming) applies an update to the DB based on the arguments (Post data), and, messages me also (I like to know!), finally, /block looks for any unconfirmed addresses, and, rechecks them with the bitcoind. Maybe not the best way of doing it, but, a way. As you said you didn't want to do another RPC call, I can't help you, but, least this is a starting place. (Can anyone clarify when a [i]wallet transaction changes[/i]?). From what I've seen, once when it receives a payment, once when it receives the first confirmation (I.E. first time it sees it past the broadcast), and once when you send a payment.
|
|
|
will boost the value of DOGE
If it actually destroys the DOGE ... who's to say dev wouldn't just set the wallet to send them to his DOGE wallet lol Because any developer who can code anything related to cryptocurrencies could easily generate a valid address, without the private key, that way, no way to recover the coins. I believe we have seen this with another coin. NVC. Tried to prove an example, but, I keep getting "Firstbits not found" on Blockchain:- https://blockchain.info/search/11MXTrefsj1ZS3Q5e9D6DxH9gkZcA9EVmI'm obviously not skilled enough at this, but, this was my rough source for the example:- package base58;
import java.math.BigInteger;
public class base58 { public static void main(String[] args) { String hexHashString = "0000112233445566778899AABBCCDDEEFF010203040D976788"; char zeroChar = "0".charAt(0); char[] charmap = "123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz".toCharArray(); BigInteger myInt = new BigInteger(hexHashString, 16); BigInteger base = BigInteger.valueOf(58); StringBuilder myBuilder = new StringBuilder(); while(myInt.compareTo(BigInteger.ZERO) > 0) { BigInteger[] data = myInt.divideAndRemainder(base); myInt = data[0]; myBuilder.append(charmap[data[1].intValue()]); } int charCount = 0; for(char myChar:hexHashString.toCharArray()) { if(charCount++ < 2) { continue; } if(myChar == zeroChar) { myBuilder.append(charmap[0]); } else { break; } } for(int i = myBuilder.toString().length()-1; i >= 0; i--) { System.out.print(myBuilder.toString().charAt(i)); } } } Referenced from:- https://en.bitcoin.it/wiki/Technical_background_of_Bitcoin_addressesTrying to prove that even with a wacky hash like "0000112233445566778899AABBCCDDEEFF010203040", you can still get a valid BTC address, guess I failed that example, sorry.
|
|
|
will boost the value of DOGE
If it actually destroys the DOGE ... who's to say dev wouldn't just set the wallet to send them to his DOGE wallet lol Because any developer who can code anything related to cryptocurrencies could easily generate a valid address, without the private key, that way, no way to recover the coins.
|
|
|
Once you login, you're asked to enter your two factor authentication details, right? After that, it doesn't ask you until your next login, correct? If this is the case, sounds like a piece of malware just stole the session authentication token (Cookie) and then used that (Maybe in conjunction with relaying the connection through your computer, in case Cryptsy checks the IP it was issued to). Apparently 2FA is not as secure as I thought. That's probably what happened. Do you mind testing something? Withdraw something, verify it, then, without logging out, withdraw something else, tell me if it makes you verify then, in if doesn't, my first theory is looking all the better, if it doesn't, what actually stops him from just deleting the mail after he's done? Do you host your own mail server? Can you get logs? It requires email verification for every withdrawal. I'm starting to believe that whoever did that actually managed to access my email, verify the withdrawals, and then delete all the withdrawal emails. I'm using an email address from walla.com which turns out to be not so secure. I just was under the impression that by using 2FA my Crypty account is uncrackable. Well, so much for that... I thought the same thing.. Almost immediately after this happened, I checked my gmail logs to see if any foreign IP had accessed my account. None at all. Then refer back to my relaying, it'd be super simple to do, I'm pretty sure I could bring up some example code for you in a minute, simple as:- 1. Zombie computer (I.E. you, infected), connects to owner, 1.1.1.1:8493. 2. Zombie computer (I.E. you, infected), also connects to gmail.com:443. 3. Zombie computer (I.E. you, infected) then forwards all incoming traffic from gmail to the owner (1.1.1.1). 4. Zombie computer (I.E. you, infected) then forwards all incoming traffic from the owner (1.1.1.1) to gmail. No foreign IP addresses, as, everything is router through you. In fact, this is probably one of the most common tools in a botnet program, not only for this, but, to be able to then execute not-so-legal things from someone who isn't linked to you.
|
|
|
Of late BTC prices seem to have just been stuck ... why is it not moving up or down like earlier ?
Isn't a steady price what we want? A wildly fluctuating price is counter-productive to BTC as a currency. However, I'm sure the price will change on the back of some good/bad news. Patience is all that's needed here. Exactly this.
|
|
|
Never used 'Cryptsy', but, as a software developer I can easily see how this occured. He bypassed my two factor authentication Once you login, you're asked to enter your two factor authentication details, right? After that, it doesn't ask you until your next login, correct? If this is the case, sounds like a piece of malware just stole the session authentication token (Cookie) and then used that (Maybe in conjunction with relaying the connection through your computer, in case Cryptsy checks the IP it was issued to). Whoever did this managed to withdraw from my account without needing to access to my email account, which indicates that there is a serious security hole in Cryptsy. Do you mind testing something? Withdraw something, verify it, then, without logging out, withdraw something else, tell me if it makes you verify then, in if doesn't, my first theory is looking all the better, if it doesn't, what actually stops him from just deleting the mail after he's done? Do you host your own mail server? Can you get logs?
|
|
|
Thank you guys for the info, Unfortunately, I dint know this would be a risk, I wanted to send 60 BTC with zero fees, I guess its better.
With 60BTC, the tx is very likely a high priority one. (FYI: https://en.bitcoin.it/wiki/Transaction_fees) If so, you can send it without any fee using any popular clients like bitcoin-qt or Electrum. The tx will probably take a longer time to get included in a block though. I already sent it with a 0.020 TX fee, Because I was scared, and that was a long time ago, I noticed I wasent getting fast replies lol. I didn't notice your thread was created 20 days ago lol. I know, Tehn when someone replies, Im like facepalm, Who needs the info now? Its too late! Other people who are researching at a later date. For anyone else:- http://bitcoinfees.com/
|
|
|
Bot looks amazing - well done.. If you want remove a few more of the manual steps, you'll have a real winner..
btw, I'd like to buy : Sim City 4 Deluxe via STEAM -- PM me if you'd like to work something out.
PM'd, sorry for the delay.
|
|
|
I get your point. But in practice, how common is malware on linux systems. Maybe I am mistaken, but I have always felt this to be less likely there.
Less likely? Sure. Majority of malware probably isn't developed to target an operating system that's rarely used by 'stupid' people* (I.E. people who'd run "SuperHotPorn.jpg.exe" from the newsgroup a.b.erotica), and, an operating system that controls a shit ton less market share than it's buddies Macintosh and Windows. Impossible? No. *Yes, I realize there are pieces of malware out there that spread via exploits in popular 'open'/'public' software (Such as service daemons) and for that reason specifically target the operating system that runs the faulty software (And, in most cases, that'd be *NIX), but, I feel that the majority of malware is spread via items such as torrents and dodgy web-downloads, rather than actually specific exploits in applications to run executable code smuggled in from the outside.
|
|
|
Worth bumping it, I guess.
Nobody likes it. I like it and it's a nice idea, but selection of games is well...bit on short side for now Unfortunately, I don't have deep pockets to buy hundreds of games to put them on a bot which may or may not sell. I try to stock at-least the "Top seller" game on steam (Currently Rust). I'd also stock DayZ, but, to the extent of my knowledge, there's no way to get that game discounted. If you guys sell NBA2K14, I might be interested...
Could get that game for $17.50, unfortunately, due to the fact that it's not on the top 100 sellers for steam, I'm not going to buy it & and add it. If you'd like to buy it, feel free to PM me, and we can do a manual trade.
|
|
|
Probably because the prices aren't great and 6 confirmations can take like three hours
Changed from six to two confirmation.
|
|
|
Worth bumping it, I guess.
Nobody likes it.
|
|
|
Is 6gig or ram going to be a good middle ground? I have a 2gb lying around and bought a 4gb not to long ago. Just running the 4gb stick now (32bit) and even with windows only seeing 3gig worth, still rarely go over the 50% mark. Really don't want to spend the money to go for 8gig just for amory only. I always have a taskbar full of icons and constantly switching between. So it's not like I'm just checking email, close down and open internet explorer, close down and open kingsoft office... Kind of annoying that it always takes 20mins or more to 'build databases". Not only that but can hear my hd grinding away for the entire time. Or maybe the solution is to run it while taking a shower, or making dinner As someone running 12GB RAM (And, having Armory only use about 400MB total (Including BitcoinD)), it still takes ~ 20 minutes on first boot. Nothing you can do.
|
|
|
add a connect=127.0.0.1
scratch that, its bind=127.0.0.1 that you need
This solved it, unsure why (As wouldn't it already have to be connected to get the amount of remaining blocks?), but, it did, thank you
|
|
|
We can't see ten years into the future, so, we can't answer that. Assuming github is up, and, Armory's developers don't tear down their source (Although, with the internet, a copy is always available), you could always implement it yourself, but, who says BTC exists in ten years? Who says the protocol is the same?
Eh, impossible to say, all we can say is that the wallet specifications are public as of now, so, someone could now, but, in ten years, :shrug:
|
|
|
Long story short, I added two nodes I 100% trust to relay my bitcoin traffic for me (They're both on 24/7), like so:- But, now Armory gets stuck at 0 blocks, it manages to sync up from however many blocks it was back by (E.G., if it I was 55 blocks behind, it syncs to 0, then hangs):- Launching Bitcoin-QT manually works fine:- And help with why Armory refuses to go onto step 2? EDIT:- Reason why I want to relay my traffic is I've noticed that my legitimate IP address seems to be attached to all of my transactions on blockchain.info, I could firewall blockchain.info, but, then I'm sure there's other companies that also log data like that. I'd prefer just to relay it through someone who I'm sure isn't publicly logging me. I know I could relay it through tor (or any other sock proxy), but, I care less about my anonymity (I.E. that everything that goes through those two nodes is me) than I do about people just not having my IP.
|
|
|
As someone once told me:
- short answer: yes - long answer: yes
Short answer:- Safe to delete, yes. Long answer:- Safe to delete, yes, but, that doesn't stop malware on the computer from recording data while the PC is offline, and, broadcasting it when it's online, which, is why this is not recommended in the slightest. If you are going to do this, carry around a hardware USB write blocker (Or a SATA to USB, with a SATA write blocker, would probably be cheaper) with Debian installed & the .deb for Armory on it, boot into a live 'CD' whenever you're going to do this.
|
|
|
You've just screwed the anonimity that you hoped to keep by posting your plan on a publicly viewable web forum. My suggestion is to send these funds in several stages to a bitcoin mixer with the end destination a new address that you create seperate from your main client. Once the required amount has arrived in your single, seperated address; then pay your debt in one lump sum. Mark that address/wallet.dat for what it is, and keep it forever seperate from your main client.
I don't care if someone knows I'm doing it, as long as they can't determine the end-point of my BTC, nor can they link any of my addresses together without, well, knowing they're my addresses.
|
|
|
God damn, gonna trust it with the lowest possible amount due to the highly good reviews I've seen, this is going to bite me in the ass, I know it.
EDIT:- Vouch, worked fine.
|
|
|
|