anti-scam
Sr. Member
Offline
Activity: 476
Merit: 251
COINECT
|
|
October 08, 2017, 05:19:46 PM |
|
I joined Levelnet Facebook & Twitter Bounty of this awesome project. Wish you all the best to all participant
You will not regret joining the levelnet, I see dev is very active in providing information. He is very serious about this project.
|
|
|
|
LevelNet
Full Member
Offline
Activity: 308
Merit: 100
LevelNet Official
|
|
October 08, 2017, 11:55:08 PM |
|
I joined Levelnet Facebook & Twitter Bounty of this awesome project. Wish you all the best to all participant
You will not regret joining the levelnet, I see dev is very active in providing information. He is very serious about this project. Thanks guys. Seriously about the project because the project was born before the ICO boom
|
|
|
|
LevelNet
Full Member
Offline
Activity: 308
Merit: 100
LevelNet Official
|
|
October 08, 2017, 11:57:17 PM |
|
Great article guys, love the idea of a buyback fund. Will this act as a wall on an exchange to buy back at the ICO level? What do you mean "as a wall on an exchange "?
|
|
|
|
Darkoth89
|
|
October 09, 2017, 06:55:52 AM |
|
Great article guys, love the idea of a buyback fund. Will this act as a wall on an exchange to buy back at the ICO level? What do you mean "as a wall on an exchange "? As in, you place a buy order at the ICO price on an exchange?
|
|
|
|
LevelNet
Full Member
Offline
Activity: 308
Merit: 100
LevelNet Official
|
|
October 09, 2017, 07:05:16 AM |
|
Great article guys, love the idea of a buyback fund. Will this act as a wall on an exchange to buy back at the ICO level? What do you mean "as a wall on an exchange "? As in, you place a buy order at the ICO price on an exchange? Yes correct. Smart contract places a market order (buy) for purchase volume on the exchange
|
|
|
|
Darkoth89
|
|
October 09, 2017, 07:23:14 AM |
|
Great article guys, love the idea of a buyback fund. Will this act as a wall on an exchange to buy back at the ICO level? What do you mean "as a wall on an exchange "? As in, you place a buy order at the ICO price on an exchange? Yes correct. Smart contract places a market order (buy) for purchase volume on the exchange Oh the contract does it? Awesome. Im just waiting for confirmation from hero that it's fine for me to leave early and still get paid (It says so in their rules but I want to confirm 10%) and i'll be swapping to your signature and avatar!
|
|
|
|
CryptoBeefy
|
|
October 09, 2017, 08:36:53 AM |
|
Hi guys,
Any confirmation from what you expect from each of the bounty campaigns? e.g. How many posts need to be made? etc etc
|
|
|
|
Darkoth89
|
|
October 09, 2017, 11:09:18 AM |
|
Right, all confirmed and signature and avatar updated!
|
|
|
|
CTO@MyBitMine
|
|
October 09, 2017, 04:00:40 PM |
|
Hello guys can I still join facebook bounty? Cant find link to register on bounty tread.
|
|
|
|
|
Mr.BiRoe
|
|
October 09, 2017, 04:31:08 PM |
|
Let me ask a question ever campaign started? What is the reward? I no see the exchange address wallet
|
|
|
|
|
Dissident991
|
|
October 09, 2017, 07:32:06 PM |
|
Maybe it is stupid question, but where i can create Levelnet personal account? Can't find on website, thanks.
|
|
|
|
LevelNet
Full Member
Offline
Activity: 308
Merit: 100
LevelNet Official
|
|
October 09, 2017, 09:02:32 PM |
|
Maybe it is stupid question, but where i can create Levelnet personal account? Can't find on website, thanks.
We are updating the site this week. Registration will be available from October 15
|
|
|
|
|
LevelNet
Full Member
Offline
Activity: 308
Merit: 100
LevelNet Official
|
|
October 10, 2017, 02:24:43 AM |
|
We got a good question from the next branch.
And what if a user from an already infected device connects to the system?
Good question!
Functions will be available in the second version of LevelNet. the treatment of active infection is highly dependent on malware. At the first stage of development, the main goal that faces LevelNet is a preventive measure, that is, Do not allow the device to be infected.
Option 1: Your system is infected with malware with a function (kernel level rootkit / self-defense module). antivirus or our solutions removed malware objects are installed by the malware protection module after uninstallation.
Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects. Solution B: Our solution proposes to install an antivirus package of the company that can heal the device. It installs it in a silent mode then initializes the function of treating infected objects or deleting them.
Option 2: Your system is infected with a malicious program without a rootkit or a user-level rootkit. Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects. Solution B: Similar to option 1
Option 3 *: Your system is infected with a malicious program that is executed in memory, i.e. Does not have objects on the disk and it is launched through shell code of exploit. Solution: suspend and kill processes, reboot the device.
* In fact, this threat is not removed by any antivirus package and they are all silent about this fact, or they kill the process in which there is malicious code. This is due to the fact that the projected code in memory is hard to update by signature.
|
|
|
|
sstercan
Member
Offline
Activity: 97
Merit: 10
|
|
October 10, 2017, 02:27:14 AM |
|
We got a good question from the next branch.
And what if a user from an already infected device connects to the system?
Good question!
Functions will be available in the second version of LevelNet. the treatment of active infection is highly dependent on malware. At the first stage of development, the main goal that faces LevelNet is a preventive measure, that is, Do not allow the device to be infected.
Option 1: Your system is infected with malware with a function (kernel level rootkit / self-defense module). antivirus or our solutions removed malware objects are installed by the malware protection module after uninstallation.
Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects. Solution B: Our solution proposes to install an antivirus package of the company that can heal the device. It installs it in a silent mode then initializes the function of treating infected objects or deleting them.
Option 2: Your system is infected with a malicious program without a rootkit or a user-level rootkit. Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects. Solution B: Similar to option 1
Option 3 *: Your system is infected with a malicious program that is executed in memory, i.e. Does not have objects on the disk and it is launched through shell code of exploit. Solution: suspend and kill processes, reboot the device.
* In fact, this threat is not removed by any antivirus package and they are all silent about this fact, or they kill the process in which there is malicious code. This is due to the fact that the projected code in memory is hard to update by signature.
did you have a working demo. it looks very promising
|
|
|
|
LevelNet
Full Member
Offline
Activity: 308
Merit: 100
LevelNet Official
|
|
October 10, 2017, 02:39:59 AM |
|
We got a good question from the next branch.
And what if a user from an already infected device connects to the system?
Good question!
Functions will be available in the second version of LevelNet. the treatment of active infection is highly dependent on malware. At the first stage of development, the main goal that faces LevelNet is a preventive measure, that is, Do not allow the device to be infected.
Option 1: Your system is infected with malware with a function (kernel level rootkit / self-defense module). antivirus or our solutions removed malware objects are installed by the malware protection module after uninstallation.
Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects. Solution B: Our solution proposes to install an antivirus package of the company that can heal the device. It installs it in a silent mode then initializes the function of treating infected objects or deleting them.
Option 2: Your system is infected with a malicious program without a rootkit or a user-level rootkit. Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects. Solution B: Similar to option 1
Option 3 *: Your system is infected with a malicious program that is executed in memory, i.e. Does not have objects on the disk and it is launched through shell code of exploit. Solution: suspend and kill processes, reboot the device.
* In fact, this threat is not removed by any antivirus package and they are all silent about this fact, or they kill the process in which there is malicious code. This is due to the fact that the projected code in memory is hard to update by signature.
did you have a working demo. it looks very promising Now we are at the stage of a functional prototype. During the year we tested various functionalities using Google Cloud and MS Azure. We can make you a private demonstration, because. the product is not ready for scaling. Watch the video so we will show it to you: https://www.youtube.com/watch?v=fDLfvA9EqNUWhen watching a video, imagine that each virtual machine is users in different parts of the world
|
|
|
|
|
Darkoth89
|
|
October 10, 2017, 08:35:14 AM |
|
Yeah, the demo looks great, and it looks like it's nearly instant that it updates the rest of the network to it being Malware/Virus.
|
|
|
|
|