I can make one and sell them for 60 each would anyone be interested Okay so i need someone who can program a board so it can show the latest bitcoin prices
|
|
|
We have a lot of the "silliest" answers here, from people who have no datacenter or AC experience. You put up a bounty, you get stupid spammers and beggars. You basically have two choices:- Traditional refrigerant air conditioning with a condensing outdoor unit, - Evaporative "Swamp coolers", where facilities allow large outside berth for building flow-through, and the local weather is favorable. The amount of air conditioning required is calculable. You have two factors: 1. The amount of air conditioning required to keep an unloaded building at room temperature vs the hottest outside temperatures. This is directly related to the building's insulation and R factor. If you have an uninsulated warehouse style steel building, you are going to be using much more AC to keep the building at room temperature than a highly insulated facility, 2. The amount of heat that needs to be removed from equipment heat generation. I am not sure of the BTU rating, but I will need to dissipate upwards of 40,000 watts. Unfortunately, #2 will be the major factor in designing an air conditioning system, your equipment-generated heat is much more than the amount needed for building cooling. The cons of air conditioning is that it is a closed system, so even on cool days, you'll be running AC equivalent to 40,000 watts of heat removal. This is one factor that has data centers looking for better ways of doing things. Air conditioning has a lot of weird units of measurement, they can't seem to just use joules and watts like a normal physicist would. I will try to process some of these measurements like "tons" and "BTUs" to give you an idea about your AC power bills and required capacity. ton = 12000 BTUs/hour, or 3517 watts. (based on how much ice would be used to provide the same refrigeration) 1 watt = 3600 joules per hour 1 btu = 1055.05585 joules 1 watt = 3.41214163 btu / hour therm = 100,000 BTU EER = Energy Efficiency Ratio = BTUs/watt-hour. BTU/hr vs watts of AC unit. A number 8-12 is typical SEER = season-based voodoo. EER = -0.02 × SEER˛ + 1.12 × SEER COP = Coefficient of perfomance. What we really want to know - i.e. how many watts will remove 1000 watt of heat. COP = EER / 3.412 The first thing to figure out is 40,000 watts equals how much in these AC terms, and how much electricity will it take. Lets remove everything except watts and the EER rating: W req = W load / COP -> W req = W load * 3.412 / EER So for 40,000 watts, and an example of 9 EER-rated air conditioning, we get W req = 40000W * 3.412 / 9 -> 15,164 watts Next, how much AC capacity is required in those weird AC terms? 40000 watts = 11.4155251142 tons of air conditioning So add that power use and capacity on top of what AC would normally be required for the space. Evaporative cooling is measured a different way, in the temperature drop from intake air temp, with accompanying increased humidity. You can make 100F outside air into 75F inside air. However, you will need to look at the cubic feet per minute ratings of the systems to see what can keep up with your heat load. You may decide that 85F will be the maximum "output" temperature rise after air goes through your racks - for this much cooling, you will be looking at garage-door sized walls of fans from the outside and gallons of water per minute. However, the evaporative cooling does have the advantage that you are putting in a massive outside air circulation system - the 75% of the day and year when outside air is below 75F, you will need nothing more than to run the fans. Inside a closed air conditioned building, evaporative cooling may enhance efficiency a bit. AC removes humidity, to the point where the IDUs need to pump water out. You could add some humidity back to pre-cool the hot AC intake air (you can't humidify cold air AC output). The humidity would have to be strictly monitored to not go overboard or add more humidity than the AC can remove. Whatever system is implemented, you need to direct airflow through your facility and systems, ideally in a typical contained hot/cool-aisle system:
|
|
|
Sorry for the delay, I was letting a day elapse to examine the state of CSV and discover what they are doing at bitcoincharts. I downloaded Dec-27 CSVs, and then now that newer nightly CSVs are published, attempted to synchronize again. Again the files have changed in a way where the previous history is not byte identical with either of the previous CSV downloads. I'll do a diff/compare to see what's being altered, but it's out of my control anyway.
To clarify, there are three sources of data to be used that are combined: -Nightly CSVs: data since the start of time to about 2-26 hours ago, -History API: maximum of five days of history available up to now, -Socket stream: live trades
I will have to resort to the strategy I initially conceived but thought impractical, which is to not have a local copy, but to "explore" the current remote CSV by downloading ranges of bytes until I find a point not too far before the last SCID timestamp. If they keep changing the CSV, even indexing it locally won't work precisely. If your SCID is less than five days old, we don't need to hit the CSV data, but bytes ranges of CSV is faster than API calls, and should cause less server load.
|
|
|
Well i have got data in rows... per row theres info like this:
1315922016,5.800000000000,1.000000000000
I have loaded it into excel (i donmt have SPSS installed), how can i interpret it (im not a programmer by the way)?
The first should be date i suppose but whats the stupiud format, how can i get it to normal format recognizeable by excel?
Or does excel import it somewhat improperly?
Both Excel times and Unix Epoch time are simply a number. - Epoch time is seconds since midnight 1/1/1970.
- Excel time is days since January "0" 1900
Excel time is 1 greater than it should be after Feb 28 1900, since Excel replicates a 25-year-old Lotus 1-2-3 bug. The Excel formula is: =(A1/86400)+25569 This makes the time right now 1388349029 -> 41637.8545023148. You then only need to format the cells as the date/time format you want. It sounds like you might want just daily pricing, the maths of which can be done less painlessly in a programming language. It's already been done, press download on this site: http://www.quandl.com/BITCOIN-Bitcoin-Charts/BITSTAMPUSD-Bitcoin-Markets-bitstampUSD
|
|
|
The OP's power supply looks like an OEM that only sells in Spanish-speaking areas. It looks like it comes from deep in generic Guang Dong China; the company lies and says they have manufacturing facilities when these are probably CWT-built. The linked page even has a picture of a Jun-Fu capacitor, which should be in the hall of shame instead of a feature. Not well received by those who know this stuff: http://www.jonnyguru.com/forums/showthread.php?t=9570That being said, if you are running at anything other than the stock speed, you are not guaranteed to have a system that doesn't crash all over the place. Add to that, two GPUs doing Bitcoin mining need lots of case cooling or an open case with fans right on them.
|
|
|
The move to water-cooled applications raises many challenges for facility executives. For example, experience shows that a building’s chilled water system is anything but clean. Few data center operators understand the biology and chemistry of open or closed loop cooling systems. Even when the operating staff does a great job of keeping the systems balanced, the systems still are subject to human errors that can wreak permanent havoc on pipes. ...
You could just post links instead of being a tool: www.facilitiesnet.com/datacenters/article/Free-Air-WaterCooled-Servers-Increase-Data-Center-Energy-Efficiency--12989http://www.facilitiesnet.com/datacenters/article/ripple-effect--8227Location: Obviously wherever you live will play a huge part in this ... if your near mountains, the suggestions above will get you some interesting ambient air to play with; along with the possibility of cheap local electricity if you put up some windmill/solar near facility. Again, that is just additional capital cost when your probably more focused on spending as much as you can on G/HASH vs hedging your own power source.
Building a data center for BITCOIN or ANYCOIN should follow most of the current standards out there. Any computer equipment for extended periods of time at high temperatures greatly reduces reliability, longevity of components and will likely cause unplanned downtime. Maintaining an ambient temperature range of 68F to 75F (20 to 24C) is optimal for system reliability. This temperature range provides a safe buffer for equipment to operate in the event of air conditioning or HVAC equipment failure while making it easier to maintain a safe relative humidity level.
It is a generally agreed upon standard in the computer industry that expensive IT equipment should not be operated in a computer room or data center where the ambient room temperature has exceeded 85F (30C). ... Recommended Computer Room Humidity Relative humidity (RH) is defined as the amount of moisture in the air at a given temperature in relation to the maximum amount of moisture the air could hold at the same temperature. In a Mining Farm or computer room, maintaining ambient relative humidity levels between 45% and 55% is recommended for optimal performance and reliability. ..
You too: http://www.avtech.com/About/Articles/AVT/NA/All/-/DD-NN-AN-TN/Recommended_Computer_Room_Temperature_Humidity.htm
|
|
|
Here's a facebook update: http://www.datacenterknowledge.com/archives/2012/07/16/facebook-revises-data-center-cooling-system/ In phase 2 of the Prineville project, Facebook has replaced the misters with an evaporative cooling system featuring adiabatic media made of fiberglass. Warm air enters through the media, which is dampened by a small flow of water that enters the top of the media. The air is cooled as it passes through the wet media. Air Not Fully “Scrubbed”
The change followed an incident in which a plume of smoke from a fire spread across the area around the Facebook data center. Staff could smell the smoke inside the data center. That prompted the Facebook’s data center team to examine other options for treating and “scrubbing” air as it makes it way into the data center.To clarify the above, there was a brush fire outside and they were pumping smoke and ash through their data center. They now have a waterfall through filter media that pulls particulates out of the air and into the water. I actually attempted to make my own swamp cooler for my GPU room, it didn't work out so well as I just was drizzling water through a block of stacked cardboard. Swamp cooler pads aren't available in stores where I live: http://reviews.homedepot.com/1999/100343657/aspen-snow-cool-29-in-x-29-in-replacement-evaporative-cooler-pad-reviews/reviews.htm
|
|
|
Those work best when you are pumping air through the facility, outside air that is already hot and needs to be cooled. You cannot just circulate the same air, unless you want to create a rain forest. If it is cool outside, you don't need vapor cooling, just lots of outside air. You can look at facebook's system: http://gigaom.com/2012/08/17/a-rare-look-inside-facebooks-oregon-data-center-photos-video/They use misters to cool lots of outside air - the evaporation of water cools the outside air when it adds humidity.
|
|
|
I would caution everyone here that you not blindly trust code from a user who's first post out of newbie jail is a request for you to run an EXE on your system. An exe or Java bytecode can do anything at any time, including installing a backdoor or grabbing your wallet.
|
|
|
It is the unix epoch timestamp, the trade price, and the trade volume, for every single trade.
|
|
|
I'll let you figure out who's a spammer. However, I used the user data I gathered to make a much more interesting graph - new users per week: I can't tell you how many sock puppets per week though...
|
|
|
Removal of old accounts is not unprecedented. Many users have requested account deletion on this forum, and others may have been deleted for non-publicized reasons. I did some data crunching, and got 3565 missing account numbers, either because they were deleted or were never created; here's a partial listing: 2 5 7 8 9 15 18 19 20 25 44 50 54 56 57 58 60 61 62 63 64 65 67 68 69 70 71 72 73 74 75 76 77 79 80 81 82 83 84 85 86 87 89 90 91 92 93 94 98 99 100 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 136 137 138 141 142 148 149 150 151 152 153 156 157 160 161 162 164 166 167 168 169 170 172 173 174 175 176 177 178 179 180 181 184 185 186 187 188 189 190 191 193 194 195 196 199 200 201 204 207 209 210 211 212 213 215 216 218 219 220 221 222 223 226 227 228 229 230 231 232 233 234 236 238 240 245 246 248 250 252 253 255 256 257 260 263 265 268 279 283 285 289 290 297 303 308 329 379 407 486 492 497 503 504 508 536 549 560 567 590 596 598 609 610 613 615 624 629 630 631 636 637 642 646 648 649 650 652 658 659 662 663 670 671 672 675 679 684 689 690 697 702 703 715 716 717 718 719 720 721 725 726 727 730 731 734 735 736 737 740 741 743 744 747 748 753 754 755 760 761 763 766 767 769 770 771 773 774 775 776 778 780 781 782 783 784 785 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 804 805 806 808 809 810 811 812 814 815 816 817 818 819 822 823 825 826 827 829 830 831 832 833 834 835 836 837 838 839 840 841 843 845 848 850 851 852 853 854 856 860 861 862 863 865 866 868 869 870 871 872 873 876 877 878 880 885 886 887 888 890 892 893 894 895 897 898 905 906 907 908 909 910 911 912 914 915 916 917 918 919 921 922 924 925 926 928 929 931 932 935 936 937 938 939 940 941 942 943 945 947 948 950 952 954 956 957 958 959 960 961 962 963 964 967 968 969 971 972 975 976 977 978 979 980 981 982 985 986 987 988 989 990 991 992 993 994 995 996 999 1002 1004 1005 1006 1007 1008 1009 1011 1012 1014 1015 1018 1020 1021 1022 1023 1024 1025 1026 1028 1029 1030 1031 1035 1038 1039 1040 1042 1043 1049 1051 1053 1054 1055 1056 1057 1060 1061 1062 1063 1065 1066 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1138 1139 1140 1144 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1160 1161 1162 1163 1164 1165 1166 1167 1170 1172 1173 1174 1175 1176 1177 1178 1180 1181 1182 1183 1184 1185 1186 1187 1188 1190 1191 1192 1193 1194 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1208 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1267 1269 1271 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1308 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1332 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1358 1359 1360 1363 1364 1365 1366 1367 1368 1369 1371 1372 1374 1380 1381 1382 1383 1384 1385 1387 1388 1389 1390 1392 1393 1394 1395 1396 1397 1401 1402 1403 1404 1405 1406 1407 1408 1411 1412 1413 1417 1418 1419 1420 1422 1423 1424 1426 1428 1429 1430 1435 1437 1440 1441 1443 1445 1448 1449 1450 1451 1452 1453 1455 1456 1457 1460 1461 1464 1465 1466 1468 1469 1470 1471 1472 1473 1474 1475 1476 1478 1480 1483 1484 1485 1486 1487 1489 1490 1491 1492 1493 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1509 1511 1512 1513 1516 1517 1518 1519 1521 1522 1524 1525 1526 1527 1529 1534 1535 1536 1537 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1563 1564 1566 1568 1570 1573 1574 1575 1576 1578 1579 1580 1582 1583 1584 1585 1586 1587 1589 1591 1592 1593 1594 1596 1599 1602 1604 1605 1606 1607 1608 1610 1611 1612 1613 1614 1616 1617 1618 1619 1620 1621 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1645 1647 1649 1650 1654 1657 1658 1660 1665 1666 1671 1672 1677 1678 1679 1681 1683 1684 1685 1687 1690 1691 1695 1696 1698 1699 1705 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1721 1722 1723 1728 1729 1731 1732 1735 1736 1737 1739 1740 1743 1744 1745 1747 1748 1750 1754 1756 1757 1758 1759 1760 1761 1762 1764 1765 1766 1767 1768 1769 1770 1771 1773 1777 1778 1782 1784 1785 1787 1788 1789 1790 1792 1793 1795 1797 1798 1800 1803 1807 1808 1809 1813 1817 1818 1820 1822 1824 1827 1828 1831 1834 1837 1841 1847 1848 1849 1850 1851 1856 1861 1863 1866 1870 1871 1872 1874 1878 1880 1883 1885 1886 1888 1889 1890 1891 1893 1894 1895 1899 1901 1902 1903 1907 1908 1910 1911 1912 1914 1918 1920 1921 1926 1927 1930 1938 1940 1942 1943 1945 1948 1955 1956 1957 1960 1963 1964 1965 1970 1971 1974 1977 1978 1984 1985 1989 1991 1993 1995 1997 1999 2001 2002 2006 2013 2014 2022 2023 2025 2026 2030 2035 2037 2039 2041 2042 2046 2048 2050 2052 2053 2054 2055 2058 2059 2063 2064 2066 2067 2068 2071 2074 2075 2077 2079 2080 2085 2086 2088 2090 2092 2095 2097 2101 2103 2105 2107 2108 2109 2110 2115 2118 2119 2120 2121 2123 2124 2138 2139 2140 2142 2144 2148 2153 2155 2156 2158 2161 2166 2172 2173 2174 2175 2178 2182 2183 2184 2187 2188 2192 2194 2196 2198 2199 2201 2205 2207 2208 2210 2215 2218 2219 2220 2227 2234 2236 2239 2240 2242 2244 2245 2247 2248 2251 2254 2258 2260 2261 2263 2267 2269 2271 2274 2277 2278 2280 2281 2286 2288 2289 2293 2294 2295 2296 2298 2299 2300 2301 2309 2313 2314 2316 2317 2319 2323 2325 2328 2329 2337 2338 2341 2349 2352 2353 2355 2356 2357 2361 2362 2363 2364 2366 2368 2374 2375 2376 2387 2388 2391 2394 2395 2396 2397 2398 2402 2403 2405 2406 2412 2413 2416 2420 2421 2422 2425 2429 2430 2431 2432 2437 2438 2440 2441 2442 2443 2445 2446 2448 2450 2451 2452 2458 2461 2463 2466 2468 2469 2472 2476 2479 2480 2481 2484 2495 2497 2507 2509 2512 2513 2514 2517 2519 2521 2524 2526 2528 2529 2530 2531 2532 2534 2538 2543 2547 2550 2562 2564 2566 2570 2571 2574 2579 2582 2588 2590 2592 2593 2598 2601 2602 2604 2606 2611 2616 2617 2618 2623 2628 2635 2636 2648 2651 2655 2656 2660 2667 2672 2674 2676 2677 2679 2680 2681 2682 2684 2689 2692 2697 2699 2704 2709 2712 2713 2714 2716 2719 2722 2726 2734 2735 2738 2744 2745 2746 2748 2750 2756 2757 2761 2762 2767 2769 2770 2771 2772 2774 2775 2776 2777 2779 2792 2796 2798 2799 2800 2801 2807 2816 2823 2825 2828 2829 2830 2833 2835 2841 2842 2843 2844 2846 2851 2860 2861 2863 2866 2868 2869 2870 2875 2876 2879 2882 2886 2887 2888 2889 2890 2891 2892 2893 2895 2898 2899 2900 2901 2902 2907 2910 2913 2919 2922 2923 2924 2925 2926 2928 2929 2934 2941 2943 2944 2945 2948 2949 2950 2951 2952 2953 2955 2956 2957 2958 2959 2960 2961 2965 2968 2972 2973 2974 2977 2978 2980 2982 2983 2986 2992 2995 2996 2997 2999 A lot of web services remove accounts after inactivity, even if it's an email box full of emails or a file sharing site with images or files. The dickheads at dyndns deleted my personal domains because I hadn't logged in for 30 days. I compiled a list of account numbers with the following criteria: - Have never logged in since the day the account was created,
- have zero posts,
- were created before 2013.
This is just a minimum criteria for junk accounts that can be pruned. There are 38276 of those (of 200,000+): http://we.lovebitco.in/deadacct.csv"usernum" "Name" "Posts" "Date Registered" "Last Active" 258 "krs" 0 06/17/10 04:39 PM 06/17/10 04:39 PM 266 "gtwickline" 0 06/21/10 12:16 AM 06/21/10 12:38 AM 276 "david718" 0 06/25/10 05:17 PM 06/25/10 05:17 PM 280 "mhatta" 0 06/28/10 12:56 AM 06/28/10 03:09 AM 286 "hotdrop" 0 06/29/10 11:48 PM 06/30/10 12:10 AM 296 "thekremlin" 0 07/06/10 12:05 PM 07/07/10 06:49 AM 300 "Jamespunte" 0 07/08/10 06:02 AM 07/08/10 06:03 AM 301 "Pilot" 0 07/08/10 09:47 AM 07/08/10 09:59 AM 304 "jondavis468" 0 07/09/10 05:33 PM 07/09/10 05:39 PM 307 "Comatus" 0 07/11/10 01:11 PM 07/11/10 01:11 PM 319 "koskenkorva" 0 07/12/10 03:34 AM 07/12/10 05:20 AM 324 "JoesphCros" 0 07/12/10 05:33 AM 07/12/10 05:34 AM ... One could even up that criteria to accounts that have zero posts and have not been logged into for a year, for 44007 accounts: http://we.lovebitco.in/deadacct1yr.csv(edit: re-uploaded in tab-delimited, quoted unicode format for better chance you can import correctly; there are many wacky user names with weird characters on purpose.) What are old accounts hurting? Cleaning up would remove some of these from use as a currency in old account resale, and also lower the scamming account takeover possibilities the next time there is a data breach.
|
|
|
Inconveniencing a web service is not a good idea, even if they are materially guilty of theft. There are correct avenues to pursue; outside of law enforcement, you can make a credible case that the account holder is in violation of terms of service to their account hosting or domain name provider.
|
|
|
I am not a lawyer, so I would have your lawyer read this to you: 18 U.S.C. United States Code, 2010 Edition Title 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 47 - FRAUD AND FALSE STATEMENTS Sec. 1030 - Fraud and related activity in connection with computers From the U.S. Government Printing Office, www.gpo.gov
§1030. Fraud and related activity in connection with computers
(a) Whoever—
(1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;
(2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—
(A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);
(B) information from any department or agency of the United States; or
(C) information from any protected computer;
(3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States;
(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period;
(5)(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;
(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or
(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss.1
(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if—
(A) such trafficking affects interstate or foreign commerce; or
(B) such computer is used by or for the Government of the United States; 2
(7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any—
(A) threat to cause damage to a protected computer;
(B) threat to obtain information from a protected computer without authorization or in excess of authorization or to impair the confidentiality of information obtained from a protected computer without authorization or by exceeding authorized access; or
(C) demand or request for money or other thing of value in relation to damage to a protected computer, where such damage was caused to facilitate the extortion;
shall be punished as provided in subsection (c) of this section.
(b) Whoever conspires to commit or attempts to commit an offense under subsection (a) of this section shall be punished as provided in subsection (c) of this section.
(c) The punishment for an offense under subsection (a) or (b) of this section is—
(1)(A) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(1) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and
(B) a fine under this title or imprisonment for not more than twenty years, or both, in the case of an offense under subsection (a)(1) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;
(2)(A) except as provided in subparagraph (B), a fine under this title or imprisonment for not more than one year, or both, in the case of an offense under subsection (a)(2), (a)(3), or (a)(6) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;
(B) a fine under this title or imprisonment for not more than 5 years, or both, in the case of an offense under subsection (a)(2), or an attempt to commit an offense punishable under this subparagraph, if—
(i) the offense was committed for purposes of commercial advantage or private financial gain;
(ii) the offense was committed in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or of any State; or
(iii) the value of the information obtained exceeds $5,000; and
(C) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(2), (a)(3) or (a)(6) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;
(3)(A) a fine under this title or imprisonment for not more than five years, or both, in the case of an offense under subsection (a)(4) or (a)(7) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and
(B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(4),3 or (a)(7) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph;
(4)(A) except as provided in subparagraphs (E) and (F), a fine under this title, imprisonment for not more than 5 years, or both, in the case of—
(i) an offense under subsection (a)(5)(B), which does not occur after a conviction for another offense under this section, if the offense caused (or, in the case of an attempted offense, would, if completed, have caused)—
(I) loss to 1 or more persons during any 1-year period (and, for purposes of an investigation, prosecution, or other proceeding brought by the United States only, loss resulting from a related course of conduct affecting 1 or more other protected computers) aggregating at least $5,000 in value;
(II) the modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals;
(III) physical injury to any person;
(IV) a threat to public health or safety;
(V) damage affecting a computer used by or for an entity of the United States Government in furtherance of the administration of justice, national defense, or national security; or
(VI) damage affecting 10 or more protected computers during any 1-year period; or
(ii) an attempt to commit an offense punishable under this subparagraph;
(B) except as provided in subparagraphs (E) and (F), a fine under this title, imprisonment for not more than 10 years, or both, in the case of—
(i) an offense under subsection (a)(5)(A), which does not occur after a conviction for another offense under this section, if the offense caused (or, in the case of an attempted offense, would, if completed, have caused) a harm provided in subclauses (I) through (VI) of subparagraph (A)(i); or
(ii) an attempt to commit an offense punishable under this subparagraph;
(C) except as provided in subparagraphs (E) and (F), a fine under this title, imprisonment for not more than 20 years, or both, in the case of—
(i) an offense or an attempt to commit an offense under subparagraphs (A) or (B) of subsection (a)(5) that occurs after a conviction for another offense under this section; or
(ii) an attempt to commit an offense punishable under this subparagraph;
(D) a fine under this title, imprisonment for not more than 10 years, or both, in the case of—
(i) an offense or an attempt to commit an offense under subsection (a)(5)(C) that occurs after a conviction for another offense under this section; or
(ii) an attempt to commit an offense punishable under this subparagraph;
(E) if the offender attempts to cause or knowingly or recklessly causes serious bodily injury from conduct in violation of subsection (a)(5)(A), a fine under this title, imprisonment for not more than 20 years, or both;
(F) if the offender attempts to cause or knowingly or recklessly causes death from conduct in violation of subsection (a)(5)(A), a fine under this title, imprisonment for any term of years or for life, or both; or
(G) a fine under this title, imprisonment for not more than 1 year, or both, for—
(i) any other offense under subsection (a)(5); or
(ii) an attempt to commit an offense punishable under this subparagraph.
(d)(1) The United States Secret Service shall, in addition to any other agency having such authority, have the authority to investigate offenses under this section.
(2) The Federal Bureau of Investigation shall have primary authority to investigate offenses under subsection (a)(1) for any cases involving espionage, foreign counterintelligence, information protected against unauthorized disclosure for reasons of national defense or foreign relations, or Restricted Data (as that term is defined in section 11y of the Atomic Energy Act of 1954 (42 U.S.C. 2014(y)), except for offenses affecting the duties of the United States Secret Service pursuant to section 3056(a) of this title.
(3) Such authority shall be exercised in accordance with an agreement which shall be entered into by the Secretary of the Treasury and the Attorney General.
(e) As used in this section—
(1) the term “computer” means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;
(2) the term “protected computer” means a computer—
(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
(B) which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States;
(3) the term “State” includes the District of Columbia, the Commonwealth of Puerto Rico, and any other commonwealth, possession or territory of the United States;
(4) the term “financial institution” means—
(A) an institution, with deposits insured by the Federal Deposit Insurance Corporation;
(B) the Federal Reserve or a member of the Federal Reserve including any Federal Reserve Bank;
(C) a credit union with accounts insured by the National Credit Union Administration;
(D) a member of the Federal home loan bank system and any home loan bank;
(E) any institution of the Farm Credit System under the Farm Credit Act of 1971;
(F) a broker-dealer registered with the Securities and Exchange Commission pursuant to section 15 of the Securities Exchange Act of 1934;
(G) the Securities Investor Protection Corporation;
(H) a branch or agency of a foreign bank (as such terms are defined in paragraphs (1) and (3) of section 1(b) of the International Banking Act of 1978); and
(I) an organization operating under section 25 or section 25(a) 4 of the Federal Reserve Act;
(5) the term “financial record” means information derived from any record held by a financial institution pertaining to a customer's relationship with the financial institution;
(6) the term “exceeds authorized access” means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter;
(7) the term “department of the United States” means the legislative or judicial branch of the Government or one of the executive departments enumerated in section 101 of title 5;
( the term “damage” means any impairment to the integrity or availability of data, a program, a system, or information;
(9) the term “government entity” includes the Government of the United States, any State or political subdivision of the United States, any foreign country, and any state, province, municipality, or other political subdivision of a foreign country;
(10) the term “conviction” shall include a conviction under the law of any State for a crime punishable by imprisonment for more than 1 year, an element of which is unauthorized access, or exceeding authorized access, to a computer;
(11) the term “loss” means any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service; and
(12) the term “person” means any individual, firm, corporation, educational institution, financial institution, governmental entity, or legal or other entity.
(f) This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States.
(g) Any person who suffers damage or loss by reason of a violation of this section may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. A civil action for a violation of this section may be brought only if the conduct involves 1 of the factors set forth in subclauses 5 (I), (II), (III), (IV), or (V) of subsection (c)(4)(A)(i). Damages for a violation involving only conduct described in subsection (c)(4)(A)(i)(I) are limited to economic damages. No action may be brought under this subsection unless such action is begun within 2 years of the date of the act complained of or the date of the discovery of the damage. No action may be brought under this subsection for the negligent design or manufacture of computer hardware, computer software, or firmware.
(h) The Attorney General and the Secretary of the Treasury shall report to the Congress annually, during the first 3 years following the date of the enactment of this subsection, concerning investigations and prosecutions under subsection (a)(5).
(i)(1) The court, in imposing sentence on any person convicted of a violation of this section, or convicted of conspiracy to violate this section, shall order, in addition to any other sentence imposed and irrespective of any provision of State law, that such person forfeit to the United States—
(A) such person's interest in any personal property that was used or intended to be used to commit or to facilitate the commission of such violation; and
(B) any property, real or personal, constituting or derived from, any proceeds that such person obtained, directly or indirectly, as a result of such violation.
(2) The criminal forfeiture of property under this subsection, any seizure and disposition thereof, and any judicial proceeding in relation thereto, shall be governed by the provisions of section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853), except subsection (d) of that section.
(j) For purposes of subsection (i), the following shall be subject to forfeiture to the United States and no property right shall exist in them:
(1) Any personal property used or intended to be used to commit or to facilitate the commission of any violation of this section, or a conspiracy to violate this section.
(2) Any property, real or personal, which constitutes or is derived from proceeds traceable to any violation of this section, or a conspiracy to violate this section 6
(Added Pub. L. 98–473, title II, §2102(a), Oct. 12, 1984, 98 Stat. 2190; amended Pub. L. 99–474, §2, Oct. 16, 1986, 100 Stat. 1213; Pub. L. 100–690, title VII, §7065, Nov. 18, 1988, 102 Stat. 4404; Pub. L. 101–73, title IX, §962(a)(5), Aug. 9, 1989, 103 Stat. 502; Pub. L. 101–647, title XII, §1205(e), title XXV, §2597(j), title XXXV, §3533, Nov. 29, 1990, 104 Stat. 4831, 4910, 4925; Pub. L. 103–322, title XXIX, §290001(b)–(f), Sept. 13, 1994, 108 Stat. 2097–2099; Pub. L. 104–294, title II, §201, title VI, §604(b)(36), Oct. 11, 1996, 110 Stat. 3491, 3508; Pub. L. 107–56, title V, §506(a), title VIII, §814(a)–(e), Oct. 26, 2001, 115 Stat. 366, 382–384; Pub. L. 107–273, div. B, title IV, §§4002(b)(1), (12), 4005(a)(3), (d)(3), Nov. 2, 2002, 116 Stat. 1807, 1808, 1812, 1813; Pub. L. 107–296, title II, §225(g), Nov. 25, 2002, 116 Stat. 2158; Pub. L. 110–326, title II, §§203, 204(a), 205–208, Sept. 26, 2008, 122 Stat. 3561, 3563.)
|
|
|
Images must be less than 1.5MB. Resize or compress your image.
Okay I understand what you are saying about resizing my image. BUT Considering how many pictures I have on here. THAT will be a pain in the ASS. Just a thought but couldn't you make it an option? Consider how much of a pain it is to hit a thread on mobile that wants to load 1.5MB images, or multiple images this size. 20 images like that in a thread is more data to download than Windows 95 installation from CD. Allowing images that size is generous. This image is 350kB, do you really need more?:
|
|
|
How can you create your own bootstrap.dat with the latest block?
Just look at the previous page of posts for linearize or pynode references.
|
|
|
If you wish for uber security, a VM won't protect you from a "spy on everything you do" trojan keylogger. If you can log onto the virtual machine and operate it, so can a remote-control backdoor.
On your own computer, the biggest adversary is usually yourself; I would speculate that more people have lost virtual currency from hardware failure or misplaced early indifference than from wallet-stealing hack attempts. Therefore my first advice would be not to make things overly complicated in a way that will lose your money.
The first line of defense is to not be stupid. Web browsing on a computer with bitcoins is the biggest risk. Besides downloading "bitcoin ticker" applications that steal your wallet, browser plugins such as java, flash, and acrobat consistently have new exploits allowing arbitrary code execution, where just visiting the wrong site can get you infected. If VM is your solution, you should browse the web in VM.
The second line of defense is encrypted wallets. If your wallet data is stolen, a very long passphrase can make it virtually useless. Most naive wallet stealers don't also include keyloggers (but you will probably begin seeing these). Since you are defending against attackers without physical access, even a password taped to your monitor is better than no password.
Do not upload your data anywhere unless it is strongly encrypted, meaning with a computer-generated encryption key. Store your own wallet backups to protect against hardware failure and meth-head theft.
|
|
|
|