Bitcoin Forum
May 24, 2024, 03:37:21 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 [28] 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 165 »
541  Bitcoin / Project Development / Re: Would any one want a Bitcoin Ticker on: December 30, 2013, 03:08:24 AM
I can make one and sell them for 60 each would anyone be interested  Undecided
Okay so i need someone who can program a board so it can show the latest bitcoin prices
542  Bitcoin / Mining / Re: .25 BTC BOUNTY for the best answer on: December 29, 2013, 10:47:13 PM
We have a lot of the "silliest" answers here, from people who have no datacenter or AC experience. You put up a bounty, you get stupid spammers and beggars.

You basically have two choices:

- Traditional refrigerant air conditioning with a condensing outdoor unit,
- Evaporative "Swamp coolers", where facilities allow large outside berth for building flow-through, and the local weather is favorable.

The amount of air conditioning required is calculable. You have two factors:
1. The amount of air conditioning required to keep an unloaded building at room temperature vs the hottest outside temperatures.
 This is directly related to the building's insulation and R factor. If you have an uninsulated warehouse style steel building, you are going to be using much more AC to keep the building at room temperature than a highly insulated facility,
2. The amount of heat that needs to be removed from equipment heat generation.

I am not sure of the BTU rating, but I will need to dissipate upwards of 40,000 watts.
Unfortunately, #2 will be the major factor in designing an air conditioning system, your equipment-generated heat is much more than the amount needed for building cooling. The cons of air conditioning is that it is a closed system, so even on cool days, you'll be running AC equivalent to 40,000 watts of heat removal. This is one factor that has data centers looking for better ways of doing things.

Air conditioning has a lot of weird units of measurement, they can't seem to just use joules and watts like a normal physicist would. I will try to process some of these measurements like "tons" and "BTUs" to give you an idea about your AC power bills and required capacity.

ton = 12000 BTUs/hour, or 3517 watts. (based on how much ice would be used to provide the same refrigeration)
1 watt = 3600 joules per hour
1 btu = 1055.05585 joules
1 watt = 3.41214163 btu / hour

therm = 100,000 BTU
EER = Energy Efficiency Ratio = BTUs/watt-hour. BTU/hr vs watts of AC unit. A number 8-12 is typical
SEER = season-based voodoo. EER = -0.02 × SEER˛ + 1.12 × SEER
COP = Coefficient of perfomance. What we really want to know - i.e. how many watts will remove 1000 watt of heat. COP = EER / 3.412

The first thing to figure out is 40,000 watts equals how much in these AC terms, and how much electricity will it take. Lets remove everything except watts and the EER rating:
Wreq = Wload / COP -> Wreq = Wload * 3.412 / EER

So for 40,000 watts, and an example of 9 EER-rated air conditioning, we get
Wreq = 40000W * 3.412 / 9  ->  15,164 watts

Next, how much AC capacity is required in those weird AC terms?
40000 watts = 11.4155251142 tons of air conditioning

So add that power use and capacity on top of what AC would normally be required for the space.


Evaporative cooling is measured a different way, in the temperature drop from intake air temp, with accompanying increased humidity. You can make 100F outside air into 75F inside air. However, you will need to look at the cubic feet per minute ratings of the systems to see what can keep up with your heat load. You may decide that 85F will be the maximum "output" temperature rise after air goes through your racks - for this much cooling, you will be looking at garage-door sized walls of fans from the outside and gallons of water per minute.

However, the evaporative cooling does have the advantage that you are putting in a massive outside air circulation system - the 75% of the day and year when outside air is below 75F, you will need nothing more than to run the fans.

Inside a closed air conditioned building, evaporative cooling may enhance efficiency a bit. AC removes humidity, to the point where the IDUs need to pump water out. You could add some humidity back to pre-cool the hot AC intake air (you can't humidify cold air AC output). The humidity would have to be strictly monitored to not go overboard or add more humidity than the AC can remove.

Whatever system is implemented, you need to direct airflow through your facility and systems, ideally in a typical contained hot/cool-aisle system:
543  Economy / Trading Discussion / Re: SierraChart feed/bridge reborn - Realtime Bitcoin charting on: December 29, 2013, 09:15:52 PM
Sorry for the delay, I was letting a day elapse to examine the state of CSV and discover what they are doing at bitcoincharts. I downloaded Dec-27 CSVs, and then now that newer nightly CSVs are published, attempted to synchronize again. Again the files have changed in a way where the previous history is not byte identical with either of the previous CSV downloads. I'll do a diff/compare to see what's being altered, but it's out of my control anyway.

To clarify, there are three sources of data to be used that are combined:
-Nightly CSVs: data since the start of time to about 2-26 hours ago,
-History API: maximum of five days of history available up to now,
-Socket stream: live trades

I will have to resort to the strategy I initially conceived but thought impractical, which is to not have a local copy, but to "explore" the current remote CSV by downloading ranges of bytes until I find a point not too far before the last SCID timestamp. If they keep changing the CSV, even indexing it locally won't work precisely. If your SCID is less than five days old, we don't need to hit the CSV data, but bytes ranges of CSV is faster than API calls, and should cause less server load.
544  Economy / Economics / Re: Historic data on bitcoin price on: December 29, 2013, 08:52:10 PM
Well i have got data in rows... per row theres info like this:

1315922016,5.800000000000,1.000000000000


I have loaded it into excel (i donmt have SPSS installed), how can i interpret it (im not a programmer by the way)?

The first should be date i suppose but whats the stupiud format, how can i get it to normal format recognizeable by excel?

Or does excel import it somewhat improperly?

Both Excel times and Unix Epoch time are simply a number.
  • Epoch time is seconds since midnight 1/1/1970.
  • Excel time is days since January "0" 1900
Excel time is 1 greater than it should be after Feb 28 1900, since Excel replicates a 25-year-old Lotus 1-2-3 bug.
The Excel formula is:
=(A1/86400)+25569
This makes the time right now 1388349029 -> 41637.8545023148. You then only need to format the cells as the date/time format you want.


It sounds like you might want just daily pricing, the maths of which can be done less painlessly in a programming language. It's already been done, press download on this site:
http://www.quandl.com/BITCOIN-Bitcoin-Charts/BITSTAMPUSD-Bitcoin-Markets-bitstampUSD
545  Other / Beginners & Help / Re: Question on PSU on: December 29, 2013, 07:54:02 AM
The OP's power supply looks like an OEM that only sells in Spanish-speaking areas. It looks like it comes from deep in generic Guang Dong China; the company lies and says they have manufacturing facilities when these are probably CWT-built. The linked page even has a picture of a Jun-Fu capacitor, which should be in the hall of shame instead of a feature. Not well received by those who know this stuff: http://www.jonnyguru.com/forums/showthread.php?t=9570

That being said, if you are running at anything other than the stock speed, you are not guaranteed to have a system that doesn't crash all over the place. Add to that, two GPUs doing Bitcoin mining need lots of case cooling or an open case with fans right on them.
546  Bitcoin / Mining / Re: .25 BTC BOUNTY for the best answer on: December 29, 2013, 02:25:38 AM
The move to water-cooled applications raises many challenges for facility executives. For example, experience shows that a building’s chilled water system is anything but clean. Few data center operators understand the biology and chemistry of open or closed loop cooling systems. Even when the operating staff does a great job of keeping the systems balanced, the systems still are subject to human errors that can wreak permanent havoc on pipes.
...

You could just post links instead of being a tool:
www.facilitiesnet.com/datacenters/article/Free-Air-WaterCooled-Servers-Increase-Data-Center-Energy-Efficiency--12989
http://www.facilitiesnet.com/datacenters/article/ripple-effect--8227

Location: Obviously wherever you live will play a huge part in this ... if your near mountains, the suggestions above will get you some interesting ambient air to play with; along with the possibility of cheap local electricity if you put up some windmill/solar near facility. Again, that is just additional capital cost when your probably more focused on spending as much as you can on G/HASH vs hedging your own power source.

Building a data center for BITCOIN or ANYCOIN should follow most of the current standards out there. Any computer equipment for extended periods of time at high temperatures greatly reduces reliability, longevity of components and will likely cause unplanned downtime. Maintaining an ambient temperature range of 68F to 75F (20 to 24C) is optimal for system reliability. This temperature range provides a safe buffer for equipment to operate in the event of air conditioning or HVAC equipment failure while making it easier to maintain a safe relative humidity level.

It is a generally agreed upon standard in the computer industry that expensive IT equipment should not be operated in a computer room or data center where the ambient room temperature has exceeded 85F (30C).
...
Recommended Computer Room Humidity
Relative humidity (RH) is defined as the amount of moisture in the air at a given temperature in relation to the maximum amount of moisture the air could hold at the same temperature. In a Mining Farm or computer room, maintaining ambient relative humidity levels between 45% and 55% is recommended for optimal performance and reliability.
..
You too:
http://www.avtech.com/About/Articles/AVT/NA/All/-/DD-NN-AN-TN/Recommended_Computer_Room_Temperature_Humidity.htm
547  Bitcoin / Mining / Re: .25 BTC BOUNTY for the best answer on: December 29, 2013, 01:21:24 AM
Here's a facebook update:

http://www.datacenterknowledge.com/archives/2012/07/16/facebook-revises-data-center-cooling-system/

In phase 2 of the Prineville project, Facebook has replaced the misters with an evaporative cooling system featuring adiabatic media made of fiberglass. Warm air enters through the media, which is dampened by a small flow of water that enters the top of the media. The air is cooled as it passes through the wet media.
Air Not Fully “Scrubbed”

The change followed an incident in which a plume of smoke from a fire spread across the area around the Facebook data center. Staff could smell the smoke inside the data center. That prompted the Facebook’s data center team to examine other options for treating and “scrubbing” air as it makes it way into the data center.


To clarify the above, there was a brush fire outside and they were pumping smoke and ash through their data center. They now have a waterfall through filter media that pulls particulates out of the air and into the water.

I actually attempted to make my own swamp cooler for my GPU room, it didn't work out so well as I just was drizzling water through a block of stacked cardboard. Swamp cooler pads aren't available in stores where I live: http://reviews.homedepot.com/1999/100343657/aspen-snow-cool-29-in-x-29-in-replacement-evaporative-cooler-pad-reviews/reviews.htm
548  Bitcoin / Mining / Re: .25 BTC BOUNTY for the best answer on: December 29, 2013, 01:16:36 AM
Those work best when you are pumping air through the facility, outside air that is already hot and needs to be cooled. You cannot just circulate the same air, unless you want to create a rain forest. If it is cool outside, you don't need vapor cooling, just lots of outside air.

You can look at facebook's system: http://gigaom.com/2012/08/17/a-rare-look-inside-facebooks-oregon-data-center-photos-video/




They use misters to cool lots of outside air - the evaporation of water cools the outside air when it adds humidity.
549  Other / Off-topic / Re: Paying Bitcoins for people to test and give feedback for my first Java game! on: December 29, 2013, 12:50:54 AM
I would caution everyone here that you not blindly trust code from a user who's first post out of newbie jail is a request for you to run an EXE on your system. An exe or Java bytecode can do anything at any time, including installing a backdoor or grabbing your wallet.
550  Economy / Economics / Re: Historic data on bitcoin price on: December 28, 2013, 11:51:05 PM
It is the unix epoch timestamp, the trade price, and the trade volume, for every single trade.
551  Other / Meta / Re: Forum 1000 "Activity" Hall-of-Fame on: December 28, 2013, 11:48:35 PM
I'll let you figure out who's a spammer. However, I used the user data I gathered to make a much more interesting graph - new users per week:



I can't tell you how many sock puppets per week though...
552  Other / Meta / Re: Can an abandoned account be removed? on: December 28, 2013, 10:08:46 PM
Removal of old accounts is not unprecedented. Many users have requested account deletion on this forum, and others may have been deleted for non-publicized reasons. I did some data crunching, and got 3565 missing account numbers, either because they were deleted or were never created; here's a partial listing:
Code:
2
5
7
8
9
15
18
19
20
25
44
50
54
56
57
58
60
61
62
63
64
65
67
68
69
70
71
72
73
74
75
76
77
79
80
81
82
83
84
85
86
87
89
90
91
92
93
94
98
99
100
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
136
137
138
141
142
148
149
150
151
152
153
156
157
160
161
162
164
166
167
168
169
170
172
173
174
175
176
177
178
179
180
181
184
185
186
187
188
189
190
191
193
194
195
196
199
200
201
204
207
209
210
211
212
213
215
216
218
219
220
221
222
223
226
227
228
229
230
231
232
233
234
236
238
240
245
246
248
250
252
253
255
256
257
260
263
265
268
279
283
285
289
290
297
303
308
329
379
407
486
492
497
503
504
508
536
549
560
567
590
596
598
609
610
613
615
624
629
630
631
636
637
642
646
648
649
650
652
658
659
662
663
670
671
672
675
679
684
689
690
697
702
703
715
716
717
718
719
720
721
725
726
727
730
731
734
735
736
737
740
741
743
744
747
748
753
754
755
760
761
763
766
767
769
770
771
773
774
775
776
778
780
781
782
783
784
785
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
804
805
806
808
809
810
811
812
814
815
816
817
818
819
822
823
825
826
827
829
830
831
832
833
834
835
836
837
838
839
840
841
843
845
848
850
851
852
853
854
856
860
861
862
863
865
866
868
869
870
871
872
873
876
877
878
880
885
886
887
888
890
892
893
894
895
897
898
905
906
907
908
909
910
911
912
914
915
916
917
918
919
921
922
924
925
926
928
929
931
932
935
936
937
938
939
940
941
942
943
945
947
948
950
952
954
956
957
958
959
960
961
962
963
964
967
968
969
971
972
975
976
977
978
979
980
981
982
985
986
987
988
989
990
991
992
993
994
995
996
999
1002
1004
1005
1006
1007
1008
1009
1011
1012
1014
1015
1018
1020
1021
1022
1023
1024
1025
1026
1028
1029
1030
1031
1035
1038
1039
1040
1042
1043
1049
1051
1053
1054
1055
1056
1057
1060
1061
1062
1063
1065
1066
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1138
1139
1140
1144
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1160
1161
1162
1163
1164
1165
1166
1167
1170
1172
1173
1174
1175
1176
1177
1178
1180
1181
1182
1183
1184
1185
1186
1187
1188
1190
1191
1192
1193
1194
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1208
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1267
1269
1271
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1308
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1332
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1358
1359
1360
1363
1364
1365
1366
1367
1368
1369
1371
1372
1374
1380
1381
1382
1383
1384
1385
1387
1388
1389
1390
1392
1393
1394
1395
1396
1397
1401
1402
1403
1404
1405
1406
1407
1408
1411
1412
1413
1417
1418
1419
1420
1422
1423
1424
1426
1428
1429
1430
1435
1437
1440
1441
1443
1445
1448
1449
1450
1451
1452
1453
1455
1456
1457
1460
1461
1464
1465
1466
1468
1469
1470
1471
1472
1473
1474
1475
1476
1478
1480
1483
1484
1485
1486
1487
1489
1490
1491
1492
1493
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1509
1511
1512
1513
1516
1517
1518
1519
1521
1522
1524
1525
1526
1527
1529
1534
1535
1536
1537
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1563
1564
1566
1568
1570
1573
1574
1575
1576
1578
1579
1580
1582
1583
1584
1585
1586
1587
1589
1591
1592
1593
1594
1596
1599
1602
1604
1605
1606
1607
1608
1610
1611
1612
1613
1614
1616
1617
1618
1619
1620
1621
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1645
1647
1649
1650
1654
1657
1658
1660
1665
1666
1671
1672
1677
1678
1679
1681
1683
1684
1685
1687
1690
1691
1695
1696
1698
1699
1705
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1721
1722
1723
1728
1729
1731
1732
1735
1736
1737
1739
1740
1743
1744
1745
1747
1748
1750
1754
1756
1757
1758
1759
1760
1761
1762
1764
1765
1766
1767
1768
1769
1770
1771
1773
1777
1778
1782
1784
1785
1787
1788
1789
1790
1792
1793
1795
1797
1798
1800
1803
1807
1808
1809
1813
1817
1818
1820
1822
1824
1827
1828
1831
1834
1837
1841
1847
1848
1849
1850
1851
1856
1861
1863
1866
1870
1871
1872
1874
1878
1880
1883
1885
1886
1888
1889
1890
1891
1893
1894
1895
1899
1901
1902
1903
1907
1908
1910
1911
1912
1914
1918
1920
1921
1926
1927
1930
1938
1940
1942
1943
1945
1948
1955
1956
1957
1960
1963
1964
1965
1970
1971
1974
1977
1978
1984
1985
1989
1991
1993
1995
1997
1999
2001
2002
2006
2013
2014
2022
2023
2025
2026
2030
2035
2037
2039
2041
2042
2046
2048
2050
2052
2053
2054
2055
2058
2059
2063
2064
2066
2067
2068
2071
2074
2075
2077
2079
2080
2085
2086
2088
2090
2092
2095
2097
2101
2103
2105
2107
2108
2109
2110
2115
2118
2119
2120
2121
2123
2124
2138
2139
2140
2142
2144
2148
2153
2155
2156
2158
2161
2166
2172
2173
2174
2175
2178
2182
2183
2184
2187
2188
2192
2194
2196
2198
2199
2201
2205
2207
2208
2210
2215
2218
2219
2220
2227
2234
2236
2239
2240
2242
2244
2245
2247
2248
2251
2254
2258
2260
2261
2263
2267
2269
2271
2274
2277
2278
2280
2281
2286
2288
2289
2293
2294
2295
2296
2298
2299
2300
2301
2309
2313
2314
2316
2317
2319
2323
2325
2328
2329
2337
2338
2341
2349
2352
2353
2355
2356
2357
2361
2362
2363
2364
2366
2368
2374
2375
2376
2387
2388
2391
2394
2395
2396
2397
2398
2402
2403
2405
2406
2412
2413
2416
2420
2421
2422
2425
2429
2430
2431
2432
2437
2438
2440
2441
2442
2443
2445
2446
2448
2450
2451
2452
2458
2461
2463
2466
2468
2469
2472
2476
2479
2480
2481
2484
2495
2497
2507
2509
2512
2513
2514
2517
2519
2521
2524
2526
2528
2529
2530
2531
2532
2534
2538
2543
2547
2550
2562
2564
2566
2570
2571
2574
2579
2582
2588
2590
2592
2593
2598
2601
2602
2604
2606
2611
2616
2617
2618
2623
2628
2635
2636
2648
2651
2655
2656
2660
2667
2672
2674
2676
2677
2679
2680
2681
2682
2684
2689
2692
2697
2699
2704
2709
2712
2713
2714
2716
2719
2722
2726
2734
2735
2738
2744
2745
2746
2748
2750
2756
2757
2761
2762
2767
2769
2770
2771
2772
2774
2775
2776
2777
2779
2792
2796
2798
2799
2800
2801
2807
2816
2823
2825
2828
2829
2830
2833
2835
2841
2842
2843
2844
2846
2851
2860
2861
2863
2866
2868
2869
2870
2875
2876
2879
2882
2886
2887
2888
2889
2890
2891
2892
2893
2895
2898
2899
2900
2901
2902
2907
2910
2913
2919
2922
2923
2924
2925
2926
2928
2929
2934
2941
2943
2944
2945
2948
2949
2950
2951
2952
2953
2955
2956
2957
2958
2959
2960
2961
2965
2968
2972
2973
2974
2977
2978
2980
2982
2983
2986
2992
2995
2996
2997
2999

A lot of web services remove accounts after inactivity, even if it's an email box full of emails or a file sharing site with images or files. The dickheads at dyndns deleted my personal domains because I hadn't logged in for 30 days.

I compiled a list of account numbers with the following criteria:
  • Have never logged in since the day the account was created,
  • have zero posts,
  • were created before 2013.

This is just a minimum criteria for junk accounts that can be pruned. There are 38276 of those (of 200,000+):
http://we.lovebitco.in/deadacct.csv

Code:
"usernum"	"Name"	"Posts"	"Date Registered"	"Last Active"
258 "krs" 0 06/17/10 04:39 PM 06/17/10 04:39 PM
266 "gtwickline" 0 06/21/10 12:16 AM 06/21/10 12:38 AM
276 "david718" 0 06/25/10 05:17 PM 06/25/10 05:17 PM
280 "mhatta" 0 06/28/10 12:56 AM 06/28/10 03:09 AM
286 "hotdrop" 0 06/29/10 11:48 PM 06/30/10 12:10 AM
296 "thekremlin" 0 07/06/10 12:05 PM 07/07/10 06:49 AM
300 "Jamespunte" 0 07/08/10 06:02 AM 07/08/10 06:03 AM
301 "Pilot" 0 07/08/10 09:47 AM 07/08/10 09:59 AM
304 "jondavis468" 0 07/09/10 05:33 PM 07/09/10 05:39 PM
307 "Comatus" 0 07/11/10 01:11 PM 07/11/10 01:11 PM
319 "koskenkorva" 0 07/12/10 03:34 AM 07/12/10 05:20 AM
324 "JoesphCros" 0 07/12/10 05:33 AM 07/12/10 05:34 AM
...

One could even up that criteria to accounts that have zero posts and have not been logged into for a year, for 44007 accounts: http://we.lovebitco.in/deadacct1yr.csv

(edit: re-uploaded in tab-delimited, quoted unicode format for better chance you can import correctly; there are many wacky user names with weird characters on purpose.)

What are old accounts hurting? Cleaning up would remove some of these from use as a currency in old account resale, and also lower the scamming account takeover possibilities the next time there is a data breach.
553  Bitcoin / Bitcoin Discussion / Re: Legality of attacking scammers? (specifically hashblaster and axonlabs) on: December 28, 2013, 09:23:59 PM
Inconveniencing a web service is not a good idea, even if they are materially guilty of theft.

There are correct avenues to pursue; outside of law enforcement, you can make a credible case that the account holder is in violation of terms of service to their account hosting or domain name provider.
554  Economy / Economics / Re: Historic data on bitcoin price on: December 28, 2013, 09:15:38 PM
http://api.bitcoincharts.com/v1/csv/

This much data will make Excel shit the bed though.
555  Bitcoin / Bitcoin Discussion / Re: Legality of attacking scammers? (specifically hashblaster and axonlabs) on: December 28, 2013, 09:05:06 PM
I am not a lawyer, so I would have your lawyer read this to you:

18 U.S.C.
United States Code, 2010 Edition
Title 18 - CRIMES AND CRIMINAL PROCEDURE
PART I - CRIMES
CHAPTER 47 - FRAUD AND FALSE STATEMENTS
Sec. 1030 - Fraud and related activity in connection with computers
From the U.S. Government Printing Office, www.gpo.gov

§1030. Fraud and related activity in connection with computers

(a) Whoever—

(1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;

(2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—

(A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);

(B) information from any department or agency of the United States; or

(C) information from any protected computer;

(3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States;

(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period;

(5)(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;


(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or

(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss.1

(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if—

(A) such trafficking affects interstate or foreign commerce; or

(B) such computer is used by or for the Government of the United States; 2

(7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any—

(A) threat to cause damage to a protected computer;

(B) threat to obtain information from a protected computer without authorization or in excess of authorization or to impair the confidentiality of information obtained from a protected computer without authorization or by exceeding authorized access; or

(C) demand or request for money or other thing of value in relation to damage to a protected computer, where such damage was caused to facilitate the extortion;

shall be punished as provided in subsection (c) of this section.

(b) Whoever conspires to commit or attempts to commit an offense under subsection (a) of this section shall be punished as provided in subsection (c) of this section.

(c) The punishment for an offense under subsection (a) or (b) of this section is—

(1)(A) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(1) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and

(B) a fine under this title or imprisonment for not more than twenty years, or both, in the case of an offense under subsection (a)(1) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;

(2)(A) except as provided in subparagraph (B), a fine under this title or imprisonment for not more than one year, or both, in the case of an offense under subsection (a)(2), (a)(3), or (a)(6) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;

(B) a fine under this title or imprisonment for not more than 5 years, or both, in the case of an offense under subsection (a)(2), or an attempt to commit an offense punishable under this subparagraph, if—

(i) the offense was committed for purposes of commercial advantage or private financial gain;

(ii) the offense was committed in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or of any State; or

(iii) the value of the information obtained exceeds $5,000; and

(C) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(2), (a)(3) or (a)(6) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;

(3)(A) a fine under this title or imprisonment for not more than five years, or both, in the case of an offense under subsection (a)(4) or (a)(7) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and

(B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(4),3 or (a)(7) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;

(4)(A) except as provided in subparagraphs (E) and (F), a fine under this title, imprisonment for not more than 5 years, or both, in the case of—

(i) an offense under subsection (a)(5)(B), which does not occur after a conviction for another offense under this section, if the offense caused (or, in the case of an attempted offense, would, if completed, have caused)—

(I) loss to 1 or more persons during any 1-year period (and, for purposes of an investigation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected computers) aggregating at least $5,000 in value;

(II) the modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals;

(III) physical injury to any person;

(IV) a threat to public health or safety;

(V) damage affecting a computer used by or for an entity of the United States Government in furtherance of the administration of justice, national defense, or national security; or

(VI) damage affecting 10 or more protected computers during any 1-year period; or

(ii) an attempt to commit an offense punishable under this subparagraph;

(B) except as provided in subparagraphs (E) and (F), a fine under this title, imprisonment for not more than 10 years, or both, in the case of—

(i) an offense under subsection (a)(5)(A), which does not occur after a conviction for another offense under this section, if the offense caused (or, in the case of an attempted offense, would, if completed, have caused) a harm provided in subclauses (I) through (VI) of subparagraph (A)(i); or

(ii) an attempt to commit an offense punishable under this subparagraph;

(C) except as provided in subparagraphs (E) and (F), a fine under this title, imprisonment for not more than 20 years, or both, in the case of—

(i) an offense or an attempt to commit an offense under subparagraphs (A) or (B) of subsection (a)(5) that occurs after a conviction for another offense under this section; or

(ii) an attempt to commit an offense punishable under this subparagraph;

(D) a fine under this title, imprisonment for not more than 10 years, or both, in the case of—

(i) an offense or an attempt to commit an offense under subsection (a)(5)(C) that occurs after a conviction for another offense under this section; or

(ii) an attempt to commit an offense punishable under this subparagraph;

(E) if the offender attempts to cause or knowingly or recklessly causes serious bodily injury from conduct in violation of subsection (a)(5)(A), a fine under this title, imprisonment for not more than 20 years, or both;

(F) if the offender attempts to cause or knowingly or recklessly causes death from conduct in violation of subsection (a)(5)(A), a fine under this title, imprisonment for any term of years or for life, or both; or

(G) a fine under this title, imprisonment for not more than 1 year, or both, for—

(i) any other offense under subsection (a)(5); or

(ii) an attempt to commit an offense punishable under this subparagraph.

(d)(1) The United States Secret Service shall, in addition to any other agency having such authority, have the authority to investigate offenses under this section.

(2) The Federal Bureau of Investigation shall have primary authority to investigate offenses under subsection (a)(1) for any cases involving espionage, foreign counterintelligence, information protected against unauthorized disclosure for reasons of national defense or foreign relations, or Restricted Data (as that term is defined in section 11y of the Atomic Energy Act of 1954 (42 U.S.C. 2014(y)), except for offenses affecting the duties of the United States Secret Service pursuant to section 3056(a) of this title.

(3) Such authority shall be exercised in accordance with an agreement which shall be entered into by the Secretary of the Treasury and the Attorney General.

(e) As used in this section—

(1) the term “computer” means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;

(2) the term “protected computer” means a computer—

(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or

(B) which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States;

(3) the term “State” includes the District of Columbia, the Commonwealth of Puerto Rico, and any other commonwealth, possession or territory of the United States;

(4) the term “financial institution” means—

(A) an institution, with deposits insured by the Federal Deposit Insurance Corporation;

(B) the Federal Reserve or a member of the Federal Reserve including any Federal Reserve Bank;

(C) a credit union with accounts insured by the National Credit Union Administration;

(D) a member of the Federal home loan bank system and any home loan bank;

(E) any institution of the Farm Credit System under the Farm Credit Act of 1971;

(F) a broker-dealer registered with the Securities and Exchange Commission pursuant to section 15 of the Securities Exchange Act of 1934;

(G) the Securities Investor Protection Corporation;

(H) a branch or agency of a foreign bank (as such terms are defined in paragraphs (1) and (3) of section 1(b) of the International Banking Act of 1978); and

(I) an organization operating under section 25 or section 25(a) 4 of the Federal Reserve Act;

(5) the term “financial record” means information derived from any record held by a financial institution pertaining to a customer's relationship with the financial institution;

(6) the term “exceeds authorized access” means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter;

(7) the term “department of the United States” means the legislative or judicial branch of the Government or one of the executive departments enumerated in section 101 of title 5;

(Cool the term “damage” means any impairment to the integrity or availability of data, a program, a system, or information;

(9) the term “government entity” includes the Government of the United States, any State or political subdivision of the United States, any foreign country, and any state, province, municipality, or other political subdivision of a foreign country;

(10) the term “conviction” shall include a conviction under the law of any State for a crime punishable by imprisonment for more than 1 year, an element of which is unauthorized access, or exceeding authorized access, to a computer;

(11) the term “loss” means any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service; and

(12) the term “person” means any individual, firm, corporation, educational institution, financial institution, governmental entity, or legal or other entity.

(f) This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States.

(g) Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. A civil action for a violation of this section may be brought only if the conduct involves 1 of the factors set forth in subclauses 5 (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(i). Damages for a violation involving only conduct described in subsection (c)(4)(A)(i)(I) are limited to economic damages. No action may be brought under this subsection unless such action is begun within 2 years of the date of the act complained of or the date of the discovery of the damage. No action may be brought under this subsection for the negligent design or manufacture of computer hardware, computer software, or firmware.

(h) The Attorney General and the Secretary of the Treasury shall report to the Congress annually, during the first 3 years following the date of the enactment of this subsection, concerning investigations and prosecutions under subsection (a)(5).

(i)(1) The court, in imposing sentence on any person convicted of a violation of this section, or convicted of conspiracy to violate this section, shall order, in addition to any other sentence imposed and irrespective of any provision of State law, that such person forfeit to the United States—

(A) such person's interest in any personal property that was used or intended to be used to commit or to facilitate the commission of such violation; and

(B) any property, real or personal, constituting or derived from, any proceeds that such person obtained, directly or indirectly, as a result of such violation.

(2) The criminal forfeiture of property under this subsection, any seizure and disposition thereof, and any judicial proceeding in relation thereto, shall be governed by the provisions of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853), except subsection (d) of that section.

(j) For purposes of subsection (i), the following shall be subject to forfeiture to the United States and no property right shall exist in them:

(1) Any personal property used or intended to be used to commit or to facilitate the commission of any violation of this section, or a conspiracy to violate this section.

(2) Any property, real or personal, which constitutes or is derived from proceeds traceable to any violation of this section, or a conspiracy to violate this section 6

(Added Pub. L. 98–473, title II, §2102(a), Oct. 12, 1984, 98 Stat. 2190; amended Pub. L. 99–474, §2, Oct. 16, 1986, 100 Stat. 1213; Pub. L. 100–690, title VII, §7065, Nov. 18, 1988, 102 Stat. 4404; Pub. L. 101–73, title IX, §962(a)(5), Aug. 9, 1989, 103 Stat. 502; Pub. L. 101–647, title XII, §1205(e), title XXV, §2597(j), title XXXV, §3533, Nov. 29, 1990, 104 Stat. 4831, 4910, 4925; Pub. L. 103–322, title XXIX, §290001(b)–(f), Sept. 13, 1994, 108 Stat. 2097–2099; Pub. L. 104–294, title II, §201, title VI, §604(b)(36), Oct. 11, 1996, 110 Stat. 3491, 3508; Pub. L. 107–56, title V, §506(a), title VIII, §814(a)–(e), Oct. 26, 2001, 115 Stat. 366, 382–384; Pub. L. 107–273, div. B, title IV, §§4002(b)(1), (12), 4005(a)(3), (d)(3), Nov. 2, 2002, 116 Stat. 1807, 1808, 1812, 1813; Pub. L. 107–296, title II, §225(g), Nov. 25, 2002, 116 Stat. 2158; Pub. L. 110–326, title II, §§203, 204(a), 205–208, Sept. 26, 2008, 122 Stat. 3561, 3563.)
556  Bitcoin / Bitcoin Discussion / Re: Best way to make fancy pants paper wallet for xmas grab bag on: December 28, 2013, 08:49:31 PM
http://bitaddress.org

2nd tab, press print, get:

557  Other / Meta / Re: Image Proxy on: December 28, 2013, 08:30:29 PM
Images must be less than 1.5MB. Resize or compress your image.

Okay I understand what you are saying about resizing my image. BUT Considering how many pictures I have on here. THAT will be a pain in the ASS. Just a thought but couldn't you make it an option?

Consider how much of a pain it is to hit a thread on mobile that wants to load 1.5MB images, or multiple images this size. 20 images like that in a thread is more data to download than Windows 95 installation from CD. Allowing images that size is generous.

This image is 350kB, do you really need more?:
558  Bitcoin / Bitcoin Discussion / Re: [ANN] Bitcoin blockchain data torrent on: December 28, 2013, 07:57:47 PM
How can you create your own bootstrap.dat with the latest block?
Just look at the previous page of posts for linearize or pynode references.
559  Bitcoin / Bitcoin Technical Support / Re: One VM per wallet, secure? cost-effective? efficient? on: December 28, 2013, 05:50:57 AM
If you wish for uber security, a VM won't protect you from a "spy on everything you do" trojan keylogger. If you can log onto the virtual machine and operate it, so can a remote-control backdoor.

On your own computer, the biggest adversary is usually yourself; I would speculate that more people have lost virtual currency from hardware failure or misplaced early indifference than from wallet-stealing hack attempts. Therefore my first advice would be not to make things overly complicated in a way that will lose your money.

The first line of defense is to not be stupid. Web browsing on a computer with bitcoins is the biggest risk. Besides downloading "bitcoin ticker" applications that steal your wallet, browser plugins such as java, flash, and acrobat consistently have new exploits allowing arbitrary code execution, where just visiting the wrong site can get you infected. If VM is your solution, you should browse the web in VM.

The second line of defense is encrypted wallets. If your wallet data is stolen, a very long passphrase can make it virtually useless. Most naive wallet stealers don't also include keyloggers (but you will probably begin seeing these). Since you are defending against attackers without physical access, even a password taped to your monitor is better than no password.

Do not upload your data anywhere unless it is strongly encrypted, meaning with a computer-generated encryption key. Store your own wallet backups to protect against hardware failure and meth-head theft.
560  Bitcoin / Project Development / Re: [BOUNTY] 0.05 BTC to crawl a onion URL on: December 28, 2013, 05:34:16 AM
It will be impossible to scan all possible directories or pages on a website, you can only spider the linked pages.

Lets say the web server has an account only protected by a long URL:
www.dumbsite.com/accounts/3na83ajfoen

If you only want to check for just eight-letter-long URLs, it will take 36^8 = 2821109907456 web requests. At 1000 URL checks per second that will take you over 32000 years.

Also, going to URLs and then making the web admin failure public can land you in jail: http://appleinsider.com/articles/13/03/18/hacker-involved-in-att-ipad-3g-e-mail-breach-sentenced-to-41-months-in-jail
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 [28] 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 165 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!