Locate wallet.dat Instruction to locate wallet.dat for your OS can be found here: https://en.bitcoin.it/wiki/Securing_your_walletThen: Assuming your backup is recent enough that you haven't used up all of your key pool... restoring a wallet to a new (or old) location and rescanning the block chain should leave you with all your coins. Just follow these steps: Shut down the Bitcoin program. Copy your backed-up wallet.dat into your bitcoin data directory. If copying into existing profile, delete files blk*.dat to make the client re-download the block chain.
|
|
|
Earth will stay inhabitable for about five hundred million years. That's a lot. IMHO, humanity as we know it will almost certainly NOT exist in ten thousand years. Or if it still exists, it won't matter much because it won't be the most intelligent life form anymore. Humans will be over-powered by machines, who might just keep them as pets or something. And for a machine, the concept of being "inhabitable" is much different than for a human.
So what you're saying is that robots will come self aware and develop a survival instinct? I would be interested in your musings about how this would come to be. http://en.wikipedia.org/wiki/Artificial_neural_networkhttp://en.wikipedia.org/wiki/HybrotMaybe someday hybrot will use human neuron to build their progeniture.
|
|
|
VPS from BitVPS, domain name from Domains4Bitcoins and some Casascius coins for personal collection/Christmas present.
|
|
|
Great I'm using an incognito window and it's working now. The address no longer appear when I log back to the wallet in online mode.
|
|
|
I'm trying to login in offline mode to create a paper wallet as recommended by this tutorial: https://blockchain.info/wallet/paper-tutorial There is no button. Without internet access I can still login and create a paper wallet but I can't delete the private key while the address is not synced. Is it possible to create a new address and then delete the private key without internet access?
|
|
|
Yes? Can you link something to evidence the frequent action pool operators take? Article or transcript from pool operators talking about it? I'm curious to learn about this.
To get accurate numbers, you would have to ask the question to Tycho. I was shown last week by a deepbit user when he logged in the banner "your account has been suspended due to illegal activity" (paraphrasing from memory here). He said it happens automaticly once you have more than 150 different IPs connect to the same worker. (as it happened before) There is a banner when you register that says "In case of illegal activity your account will be locked", https://deepbit.net/register.phpWith the amount of traffic deepbit sees, it would be hard to believe they have not automated some parts of the banning I'm not asking for accurate numbers, I'm asking for any confirmed botnet reports, and evidence as to them being GPU based, as you so casually stated that they were. What you are telling me is that because an automated system on deepbit, which admittedly catches many regular users (unless you are suggesting your friend is a botnetter) by its aggressive settings, is the only suggestion that botnets "might be out there". That is hardly conclusive evidence of the roving bands of GPU botnets you claim. CPU botnets are the most likely, and even those are not very likely, nor clearly are they being very successful. Maybe you missed those threads: https://bitcointalk.org/index.php?topic=81356.0;allhttps://bitcointalk.org/index.php?topic=67634.0http://www.reddit.com/r/IAmA/comments/sq7cy/iama_a_malware_coder_and_botnet_operator_ama/Q: How many botted machines do you typically gain per month or per campaign. A: about 500-1000 a day, weekends more. I'm thinking about just buying them in bulks and milking them for bitcoins. Asian installs are very cheap, 15$/1000 installs and have good GPUs. http://arstechnica.com/tech-policy/2011/08/symantec-spots-malware-that-uses-your-gpu-to-mine-bitcoins/In contrast, the newest Bitcoin malware takes full advantage of the computing power on each compromised machine—including its GPU. http://www.symantec.com/security_response/writeup.jsp?docid=2011-081115-5847-99&tabid=2The Trojan will then run one of the following Bitcoin mining programs: If a GPGPU-enabled graphics card is found, it runs Phoenix Miner. Otherwise it runs RPC Miner.
|
|
|
To date there have been 0 confirmed CPU botnets, 0 confirmed GPU botnets, and 0 confirmed FPGA botnets on bitcoin.
A smart GPU botnet would of course create a different account for each worker but that is sooooo much work, right? ;-) I think a smart GPU botnet would setup a Bitcoin mining proxy or a mining pool.
|
|
|
Maybe he's mining Litecoin.
|
|
|
CGminer has dynamic intensivity support.
|
|
|
I can't confirm if it's hackable or not, just not that many people bother. With all the su/sudo things that need to be run...I just don't see it happening. Of course, if you have a proof-of-concept way to hack Linux, please provide it to #linux on irc.freenode.net.
http://goo.gl/6ZByg
|
|
|
Most of the time when bitcoin price is rising, litecoin is falling.
|
|
|
A former political organizer for Mr. Tremblay’s party says the mayor was one of three people in a 2004 meeting where a Union Montréal official showed the two sets of books the party was keeping – clean records designed to fall within spending limits and satisfy the chief electoral officer, and an unofficial cash-only accounting that had the party spending double the $46,000 campaign limit. Mr. Dumont described how the money flowed from a dozen construction bosses, who the inquiry has heard had close connections to the mob. The bosses made dozens and dozens of visits to the offices of both the party and local politicians, usually with the blinds drawn, from 2004 to 2010. The bosses also bought tickets to fundraising events with little regard for spending limits, he said.
Mr. Dumont described several instances where cash flowed wildly. At one point, cash donations stuffed a party safe until it was impossible to close. At one event, chief fundraiser Bernard Trépanier could no longer button his coat, its pockets were so full of envelopes of cash. A student who was working as a receptionist for the summer complained to him that she had spent all day locked up in Mr. Trépanier’s office counting out $850,000 in cash. http://www.theglobeandmail.com/news/national/testimony-at-quebec-corruption-probe-directly-implicates-montreal-mayor/article4754334/
|
|
|
Please excuse me (instead of attack me) if I’m wrong but isn’t it illegal everywhere to deface money? You are all posting pictures with the money you have defaced. If some government had a pet peeve against Bitcoin they might want to come after you to set an example. Or do you guys just think this is so unlikely that you’re going to do it anyway?
Not illegal in Canada
|
|
|
Your ISP should lock ips coming from outside their allocated network, same should a server provider. Quite curious on how easy/hard it's to fake an ip source anyway.
With nmap that's just a switch so must be trivial with DDOS tools. -S <IP_Address> (Spoof source address) In some circumstances, Nmap may not be able to determine your source address (Nmap will tell you if this is the case). In this situation, use -S with the IP address of the interface you wish to send packets through.
Another possible use of this flag is to spoof the scan to make the targets think that someone else is scanning them. Imagine a company being repeatedly port scanned by a competitor! The -e option and -Pn are generally required for this sort of usage. Note that you usually won't receive reply packets back (they will be addressed to the IP you are spoofing), so Nmap won't produce useful reports. http://nmap.org/book/man-bypass-firewalls-ids.html
|
|
|
Routers are designed to reject these packets. It's a security flaw if that wouldn't happend.
Routers drop spoofed internal network address but I don't think they can filter spoofed WAN address. Some more interesting reading" Impersonation. In the DNS attacks, each attacking host uses the targeted name server's IP address as its source IP address rather than its own. The effect of spoofing IP addresses in this manner is that responses to DNS requests will be returned to the target rather than the spoofing hosts. http://www.watchguard.com/infocenter/editorial/41649.asp
|
|
|
|