ferment
Full Member
Offline
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
|
|
December 30, 2013, 04:29:15 PM |
|
For those with the restart blues... If you're using supervisor to manage NRS... 1. Create /etc/cron.d/hourly/nrs containing: #!/bin/bash supervisorctl restart nrs
2. Make sure it's executable: $ sudo chmod +x /etc/cron.d/hourly/nrs
3. Sit back and relax. Thanks for this. I had a typo in the post (updated)... the path should be /etc/cron.hourly.
|
|
|
|
ferment
Full Member
Offline
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
|
|
December 30, 2013, 04:32:46 PM |
|
1. create an aliases with the uri: "acct:YOURACCOUNTNUMBERHERE@nxt" 2. wait a little bit for propagation 3. check http://22k.io/YOURALIASWhen I created my alias for my main account, I left the uri blank. How do I change it now? Assign it again with the new URI and 1 nxt fee. I did so and see you have paid the bounty, thx. When I reassigned the alias with a new uri, the alias page never came back with the transaction number in the response box. I got tired of waiting and just closed it. There were already three confirms by the time I logged back on. BTW, am I missing something? Is there a way to page back from someplace like an alias page back to the main account page without having to enter the whole long passcode again? Great! I don't think you can page back and keep it unlocked. I just open the alias.html in different tab.
|
|
|
|
Passion_ltc
|
|
December 30, 2013, 04:33:13 PM |
|
I added the options: https: btc: ltc: mailto: Anyone knows any aliases with these parameters to test it? mailto: email22k I think "bitcoin" is an official scheme. Thanks. Everything is working now!
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
December 30, 2013, 04:34:48 PM |
|
When I reassigned the alias with a new uri, the alias page never came back with the transaction number in the response box. I got tired of waiting and just closed it. There were already three confirms by the time I logged back on.
What is ur pushThreshold? Set it higher, looks like u were trying to push the transaction to a lot of overloaded nodes.
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
December 30, 2013, 04:36:03 PM |
|
Hey CfB, regarding that account# 100000 sitting there with 10M NXT in it... It seems to me that since that account doesn't yet have a public key floating around for it, then my thinking is that to crack it, the keyspace to crack for is not 2^256, but merely 2^64, right? Dont we only have to construct a passphrase that ends up having zeros in only the first 64bits of the long form 256bit account ID? BRB gonna fire up my vanity account generator..... Right. But there are only 100K, not 10M. Though when u manage to find the key it will be worth billions of USD, so JUST DO IT!
|
|
|
|
chanc3r
|
|
December 30, 2013, 04:37:33 PM |
|
Cfb, when connect to a publicly accessible node
node.ip:7875/nxt?requestType=getState
doesn't work - I get
{"errorCode":7,"errorDescription":"Not allowed"}
even if i log in with a passphrase..
Is this by design or am I doing something wrong? Ian
|
|
|
|
lophie
|
|
December 30, 2013, 04:40:41 PM |
|
Hey CfB, regarding that account# 100000 sitting there with 10M NXT in it... It seems to me that since that account doesn't yet have a public key floating around for it, then my thinking is that to crack it, the keyspace to crack for is not 2^256, but merely 2^64, right? Dont we only have to construct a passphrase that ends up having zeros in only the first 64bits of the long form 256bit account ID? BRB gonna fire up my vanity account generator..... Right. But there are only 100K, not 10M. Though when u manage to find the key it will be worth billions of USD, so JUST DO IT! Please pm me the account number. I will crack it.
|
Will take me a while to climb up again, But where is a will, there is a way...
|
|
|
Damelon
Legendary
Offline
Activity: 1092
Merit: 1010
|
|
December 30, 2013, 04:41:17 PM |
|
|
|
|
|
ferment
Full Member
Offline
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
|
|
December 30, 2013, 04:43:00 PM |
|
Cfb, when connect to a publicly accessible node
node.ip:7875/nxt?requestType=getState
doesn't work - I get
{"errorCode":7,"errorDescription":"Not allowed"}
even if i log in with a passphrase..
Is this by design or am I doing something wrong? Ian
That node doesn't allow outside connections. You try http://22k.io/publicnode.
|
|
|
|
wesleyh
|
|
December 30, 2013, 04:44:15 PM |
|
For those that use Firefox, please install this extension and test it out: http://nxtra.org/alias/NxtAliasSystem.xpi (don't bother downloading if you are not using firefox). This extension enables nxt aliases in the firefox browser.You will be able to type nxt:google and be redirected to google. This is the real-world application of the Nxt alias sytem. I'm trying to do something similar for Chrome too. Please let me know if this is working for you. Donations appreciated: 3209075099254042753 Hey wesleyh... you should look into the issue above. I tried the alias Vircurex with the other two proposed methods and your Chrome version and it is taking me to the correct URL. For some reason your Firefox add-on probably does not read the weird format of the assigned URI and will create problems for those that are trying to use it. ` That weird format: https:\/\/vircurex.com\/welcome\/index?referral_id=667-22323 is OK - there's no error here. This is JSON format. I tried nxt:vircurex in firefox and it works as it should, what output do you get?
|
|
|
|
bitcoinpaul
|
|
December 30, 2013, 04:44:41 PM |
|
Colored coins are called "NXT colored coins". Is this a temporary name for it or why do we call it "NXT colored coins" but normal coins just "NXT"?
|
|
|
|
ZeroTheGreat
|
|
December 30, 2013, 04:45:08 PM |
|
Hey pal. Why don't you try to earn an honest living, instead of trying to steal bitcoins with this hoax?
let him be....we need jokers around at times Hahaha, exactly. Every thread needs pocket troll.
|
|
|
|
rb2
Newbie
Offline
Activity: 28
Merit: 0
|
|
December 30, 2013, 04:47:08 PM |
|
Is it correct that the password to access an account is limited to 100 characters? I have an account password with more than 100 characters, does it mean only the 100 first chars are used?
|
|
|
|
brooklynbtc
Sr. Member
Offline
Activity: 336
Merit: 250
AKA jefdiesel
|
|
December 30, 2013, 04:47:52 PM |
|
Hey CfB
how about some thoughts on blocks not forging? I have 280k and have attempted to keep myself logged in for the last two weeks. there have been overnight crashes and freezes, but my countdown timer keeps ticking, but never gets to zero. I have forged two blocks in two weeks, when according to my calculations it should be every 4000 minutes, but it never happens. I'm showing a week since I earned a fee 7213693579568855752 my account is 15436509232181115695 I understand it's not going to make me rich, but I wonder if there is something I can do to improve this
thanks
|
|
|
|
wesleyh
|
|
December 30, 2013, 04:50:06 PM |
|
That weird format: https:\/\/vircurex.com\/welcome\/index?referral_id=667-22323 is OK - there's no error here. This is JSON format.
I tried nxt:vircurex in firefox and it works as it should, what output do you get?
It will not forward me to the URL. It just stays at nxt:vircurex and the webpage opens up all messed up. If your add-on is working, then it is ALL GOOD!!! ...I wanted to give you a heads up just in case... The web page opens up though? And it's not an issue with your webpage? How is it supposed to look like?
|
|
|
|
klee
Legendary
Offline
Activity: 1498
Merit: 1000
|
|
December 30, 2013, 04:53:17 PM |
|
From my IT guy: DDoS Deflate is a bash shell script which purpose is blocking a denial of service attack. the following installation guide is about cent os . How to install 1. Login to Cent OS as root 2. run terminal 3. run the following commands a. "wget http://www.inetbase.com/scripts/ddos/install.sh" b. "chmod 0700 install.sh" c. "./install.sh" Configure After installing the script the following directories and files will be created program directory =/usr/local/ddos program =/usr/local/ddos/ddos.sh ignore_ip_list=/usr/local/ddos/ignore.ip.list cron (scheduller) =/etc/cron.d/ddos.cron apf ( advanced policy firewall) =/etc/apf/apf ipt (iptables) =/sbin/iptables edit configuration file run the following command on terminal cd /usr/local/ddos vi ddos.conf ( to edit the file with vi editor just type "i" , when finished press escape then ":" "w" "q" and enter ) Configuration file settings Freq= ( how often the script is executed in minutes ) Ddos - cron ( cron sceduller update ) No_of_connections ( number of connections received before an IP is blocked ) Apf_ban ( 1 means that it will use apf , 0 it will use iptables ) Ban_period ( time in seconds to block an IP ) Email_to ( address to send an email when an IP is blocked ) Kill ( when value is 0 no IP is banned ) In case you get blank IP edit the main script ddos.sh and replace "netstat -ntu | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort -nr > $BAD_IP_LIST" with this one "netstat -ntu | grep ‘:’ | awk ‘{print $5}’ | sed ‘s/::ffff://’ | cut -f1 -d ‘:’ | sort | uniq -c | sort -nr > $BAD_IP_LIST" ( be sure to keep the command in a single line ) Uninstall DDos Deflate 1. Login to Cent OS as root 2. run terminal 3. run the following commands a. "wget http://www.inetbase.com/scripts/ddos/uninstall.sh" b. "chmod 0700 uninstall.sh" c. "./uninstall.sh"
|
|
|
|
ferment
Full Member
Offline
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
|
|
December 30, 2013, 04:53:35 PM |
|
That weird format: https:\/\/vircurex.com\/welcome\/index?referral_id=667-22323 is OK - there's no error here. This is JSON format.
I tried nxt:vircurex in firefox and it works as it should, what output do you get?
It will not forward me to the URL. It just stays at nxt:vircurex and the webpage opens up all messed up. If your add-on is working, then it is ALL GOOD!!! ...I wanted to give you a heads up just in case... Test works: http://22k.io/vircurex
|
|
|
|
Orrechorre
|
|
December 30, 2013, 04:54:22 PM |
|
can someone explain why my online wallet not syncing, its syncing to the latest block when i open it but when i leave it open for like 3h it is still at same block???
can someone plz help me i have read several different guides but it is still not working
|
|
|
|
opticalcarrier
|
|
December 30, 2013, 04:55:40 PM |
|
Hey CfB, regarding that account# 100000 sitting there with 10M NXT in it... It seems to me that since that account doesn't yet have a public key floating around for it, then my thinking is that to crack it, the keyspace to crack for is not 2^256, but merely 2^64, right? Dont we only have to construct a passphrase that ends up having zeros in only the first 64bits of the long form 256bit account ID? BRB gonna fire up my vanity account generator..... Right. But there are only 100K, not 10M. Though when u manage to find the key it will be worth billions of USD, so JUST DO IT! Please pm me the account number. I will crack it. http://localhost:7874/nxt?requestType=getBalance&account=100000 and you only need to crack for the 1st 14 digits of a candidate shortform/visible account ID to be zeros. But I think I may have been wrong on the keyspace part. Is it 2^64 or is it 2^(256-64) I cant think right now. Regardless of all that, can someone explain how the first 64bits of a 256bit long account# is translated into the "shortform" or visible ID we see as 20digits? I cant figure out that math in my head either. Is it some kind of weird BCD?
|
|
|
|
ferment
Full Member
Offline
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
|
|
December 30, 2013, 04:57:33 PM |
|
[2013-12-30 16:56:13.621] 15: java.lang.NullPointerException
Getting loads of these.... ideas for debugging?
|
|
|
|
|