so the forum is not forbidden to use more than one account. I didn't hide it.
Forum accept multiple accounts but multiple accounts to cheat bounty is prohibited. You can have multiple accounts as you want but if your one account surely gets banned and you still using the other accounts anywhere except Meta board for the appeal, that's considered a ban evasion. You can lie all you want but sadly you're busted, try now to move on and say goodbye in the forum. throw me the rules which clearly says that to use more than one account is prohibited by the rules . Enough? ~ 25. Ban evasion (using or creating accounts while one of your accounts is banned) is not allowed.[e] ~
The ban is personal, not account related. So Long, and Thanks for All the Fish SPAM! /s
|
|
|
To spot possible Malware links behind Wallet download links use the quote function !
~
That's great tip buddy. I'll definitely add it the guide in the near future. I was wondering how the hell you detect so many scammers all the time, now I know your secret
|
|
|
This is simply for staking and marking my ownership of the address below. -----BEGIN BITCOIN SIGNED MESSAGE----- This is skywalker925 from bitcointalk.org and today is 2019.08.14 or as some of you might write it 08/14/2019. Time is 2:07 pm -----BEGIN BITCOIN SIGNATURE----- Version: Bitcoin-qt (1.0) Address: 19EPcSbNqarpTcRYGLR1jCTa5Hh8zrGMM7
ILlfNzKYHN4KyzFOguRLbUqlIWOZR/VzK0+EVjofJLTDdIOyfPkRMSxu1R+OLD6R7XcVutjGoAFW+yuXUAS+sKA= -----END BITCOIN SIGNATURE----- This is a wrong place to stake an address. There is a designated thread for this so better post it here > Stake your Bitcoin address here
|
|
|
4 New BlueKeep-like 'Wormable' Windows Remote Desktop Flaws DiscoveredEvery day there is a new threat. Keep your machine updated! Windows operating system contains four new critical wormable, remote code execution vulnerabilities in Remote Desktop Services, similar to the recently patched 'BlueKeep' RDP vulnerability.
Discovered by Microsoft's security team itself, all four vulnerabilities, CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, and CVE-2019-1226, can be exploited by unauthenticated, remote attackers to take control of an affected computer system without requiring any user interaction. Good that they found the vulnerabilities before the hackers. Besides this, Microsoft also says that the company has found "no evidence that these vulnerabilities were known to any third party," or being exploited in the wild.
"It is important that affected systems are patched as quickly as possible because of the elevated risks associated with wormable vulnerabilities like these," Microsoft strongly recommended.
If left unpatched, these security vulnerabilities could allow attackers to spread wormable malware in a similar way as the infamous WannaCry and NotPetya malware was spread across the globe in 2017.
|
|
|
I did it. It does not work.
I think the English is the problem here, maybe it will easier for you if you post in your local Russian section and ask someone to explain it in your language. We can't do more than what HCP already did to guide you. We cannot sign the message for you.
|
|
|
Today at 12:35:03 PM Reply with quote #10286 Quote from: xelja on Today at 12:04:45 PM This is xelja from bitcointal.or and today is 2019.08.13 Please confirm my address. 1CCzSWVkvMikWboDtAxq6An9XQivYYgrJn http://www.screencapture.ru/uploaded/13/3f/fb/133FfBF9.jpg Thank you. Why don't you copy/paste the information from Electrum, instead of posting image of it? It would be much easier to verify it. This proofs almost nothing as everyone can alter a picture pretty easy. Just an idea. But how can I copy there? Tell me. I do not kick. I will. If it is difficult for you to format the message just copy everything from electrum to brainwallet > https://brainwalletx.github.io/#verifyChoose Bitcoin-QT copy your message, your address, your signature from Electrum and then click on the "Signed message" Then copy the text here. Here is one example of singed message, and how it looks like
|
|
|
Why don't you copy/paste the information from Electrum, instead of posting image of it? It would be much easier to verify it. This proofs almost nothing as everyone can alter a picture pretty easy. Just an idea.
|
|
|
---Tempo fa ho fatto la pulizia dei messaggi nella mia casella e-mail e per sbaglio ho cliccato su Spam invece di Elimina, quindi non ho pių ricevuto messaggi da voi. Ho cambiato la password, ma non arrivando la mail non sono riuscita a confermarla quindi ora non riesco ad entrare nel mio account ne con la vecchia ne con la nuova. Vorrei poter cambiare la mail ed entrare nel mio account. Il mio indirizzo btc č:--- 1PaqkLqgpNCdYXbtmYZDdjjkeohCstLLeo --- Sono su bitcointalk - Dany166750 ma non sono pratica e non so cosa fare, non ho capito nulla Grazie, Dany166750
Quoted, but better to write it in English, not everyone are so fluent in Italian. Check the link in the previous message from asu, you will find out how to sign a message. If the wallet address if from exchange is almost worthless as you cannot sign a message form it.
|
|
|
This is a huge one. Over 40 Drivers Could Let Hackers Install Persistent Backdoor On Windows PCs If you own a device, or a hardware component, manufactured by ASUS, Toshiba, Intel, NVIDIA, Huawei, or other 15 other vendors listed below, you're probably screwed. A team of security researchers has discovered high-risk security vulnerabilities in more than 40 drivers from at least 20 different vendors that could allow attackers to gain most privileged permission on the system and hide malware in a way that remains undetected over time, sometimes for years. ... All the vulnerable drivers, as listed below, uncovered by the researchers, have been certified by Microsoft. American Megatrends International (AMI) ASRock ASUSTeK Computer ATI Technologies (AMD) Biostar EVGA Getac GIGABYTE Huawei Insyde Intel Micro-Star International (MSI) NVIDIA Phoenix Technologies Realtek Semiconductor SuperMicro Toshiba "Some vulnerable drivers interact with graphics cards, network adapters, hard drives, and other devices," researchers explain. "Persistent malware inside these devices could read, write, or redirect data stored, displayed, or sent over the network. Likewise, any of the components could be disabled as part of a DoS or ransomware attack."
Device driver flaws can be more dangerous than other application vulnerabilities because it allows an attacker access to the "negative" firmware rings that lie beneath the operating system and maintain persistence on the device, even if the operating system is completely reinstalled, just like in case of LoJax malware.
Researchers have reported these vulnerabilities to the affected vendors, of which some, including Intel and Huawei, have already released patch updates and issued a security advisory.
Besides this, researchers have also promised to soon release a script on GitHub that would help users find wormhole drivers installed on their systems, along with proof-of-concept code, video demonstrations, and links to vulnerable drivers and tools.
|
|
|
Let it be anonymous, just give us the numbers of those between 1 and 300 reports, those with reports from 300 to 1000, from 1000 to 2000, 2k to 3k, 3k to 5k and above 5k, or something like this. Counts of members with good reports in the last year: This statistics around the forum? As I understand this is the report stats only for the past year for the whole forum including the local sections.
|
|
|
Hah, I was so surprised to see a transaction on my coinbase address and it took sometime before I realize where those coins came from. Thanks man...again
|
|
|
@notbatman, do you really believe that the Earth is flat or you are just trolling around??
|
|
|
Someone mentioned FinwhaleX? I was looking at their NEW thread and my scam radar got tickled, I took few mins to look for more info and washed ashore to this thread, looks like the uhh had a brief story with bumping accounts, which further strengthen my suspicion, I'll watch them more closely. Cool, you are welcome, more eyes are always better for what we do here. Let's keep fighting the spam (and the scammers)
|
|
|
Begging for source merit is not begging Merit source running out of merit = you are doing it right. Here take one from me
|
|
|
Why we just don't represent it like s BTCThat should be enough to know that you are using Satoshis of Bitcoin Edited: fixed some phrases
|
|
|
The first post and already fucked up one. I don't really see any future for this profile outside of their local section. fake profiles are typically for the world inside our PCs or smarts
|
|
|
I know someone who has probably more than 50k good reports now, but I won't reveal his name. A few months ago he had 48k.. and he is not a bot. Here is the proof (if he didn't photoshoped it) Hmm the image quality is bad, I don't have time to find out why, here is the link to the image. https://m.imgur.com/gallery/rQnhcBx
|
|
|
Just keep an eye here if I post something like, "we need to check this.." If I do not have time to check or report I'll ask for help...
This is exactly what I am looking for. Just like at the beginning, clear rules and links to topics (needed to check) provided in the OP. I just read the OP and know immediately what to do if I have free time to contribute to the forum. Don't have to think too much and can start right away. From now I will wait for your "we need to check this..." post. Thank you. Do you have the notification subscription for Piggy's bot? I can mention you if there any cases. As I said before we haven't been in a critical situation. Michelle's bot is killing almost all the detected spam. Suchmoon's bot is killing all the plagiarism.
|
|
|
@theymos, Thank you for the stats Finally we have overview, can we have an own private board as the VIP one with restricted access based on good reports? Of course signature free.
|
|
|
|