I'll take them if you could ship them to my house, alive.
|
|
|
Idea is pretty simple. I give you bitcoins. You invest/day trade with them. You take 25% of the profit/loss. Would anyone do this? it's a good way day traders can make some money.
|
|
|
Hi Monoquark,
I see your point, guess I simply don't understand the protocol then. I was sure that you get a "cryptographic target key" and then you try all options starting from 0 to the maximum bit field size (which is?).
Also you mention something about solo mining, I'm currently using Bitcoin client and I see it do 4208 khash/s. I don't know if it uses my GPU, I have AMD Radeon HD 6800 how can I verify I'm using the GPU?
mining is like throwing a bunch of coins, if they all land heads, you win. saving the coins from you failed attempts do not help toward your future attempts.
|
|
|
How are these CD-keys acquired and how can you guarantee their unhindered use?
they're probably MSDN keys. These keys are a dime a dozen, and aren't suitable for anything. Home user: use cracked. Business user: needs PHYSICAL certificate of authenticity.
|
|
|
you don't have to wait for confirmations.
|
|
|
I'll take them for $160 because it's easily available for $200 (shipped), and there is a $30 rebate on this.
|
|
|
no one here seems to think they're worth $700 much less $62,000. maybe because you can get them for less than $600, NEW?
|
|
|
$900? for a used ipad? fail of the day
|
|
|
Just would like to vouch that Erigwino is a reputable member (despite just joining the forums!) and we had no problems with our transaction.
cool story bro
|
|
|
I get this when i try to register:
Forbidden (403)
CSRF verification failed. Request aborted.
|
|
|
1. get c++ sudoku solver 2. solve sudokus in 10 seconds 3. get 0.00000006 btc in one minute 4. BECOME RICH! (0.0000036 per hour) :p
|
|
|
If a botnet owner w/ around 15000 zombies (not very uncommon) wanted to mine coins, by golly he could. Set 7500 of em to CPU mining, the other 7500 to DDoS'ing the pools with bad packets.
That's still a relatively pathetic payout, given that most computers in botnets are compromised windows XP machines running old amd semprons and celerons/p4's or worse. They will output maybe 100-200khash per second or less with the average skewing up a bit by infected machines that run modern processors capable of mhash performance. Even in an optimistic scenario the owner is wasting his botnet capacity and risking detection due to high CPU usage by end users, who despite being technically limited, will notice their computer coming down to a crawl. botnetserver.exe to low priority
|
|
|
Yeah I get the whole private key and encryption principle. Basic cryptology. I never said anything about syncing those over the network.
So the client generates new private keys every once in a while, and that's the reason the backup can't be too old. Thanks for that info, perfectly clear to me now!
Thanks again!
The client only generates new private keys when you create a new receiving address. If you don't do that, the backup can be as old as you want, I believe. it also generates addresses when you send a transaction. (for the change)
|
|
|
Work in progress...
aww man, java?
|
|
|
sort of have to know what the batch file looks like before anyone can tell you why it might not be working
Fail of the day. +1 this bat file: "start /DC:\bitcoin\poclbm_py2exe_20110428 poclbm.exe -d1 --host=deepbit.net --port=8332 --user=hieu5189@gmail.com_0 --pass=123456789 --device=0 -w 256 -f 60" i hope that password isn't your real password
|
|
|
|