hostmaster (OP)
|
|
April 16, 2014, 05:18:45 AM |
|
if you hacked open the server logs, publish on your website and let us more data how this happened, you can make err, or anything else. Instead arguing lets give a lesson to others who doing pool business.
1 Now you should explain what happened 2 Open your pool up make it %0 fee until end mining
So we know you take responsiblity of your hacked.
And you give domain when poW ends to me and FREE!!
And when ecc multipool is online i give %0 rate for some time to miners from your database. (you give their wallets to me i make them %0 fee) We lower the losses together.
So you can be still one of us.
see?
Please read this. I think it's workable plan.
|
|
|
|
andakinas
Newbie
Offline
Activity: 55
Merit: 0
|
|
April 16, 2014, 05:25:29 AM |
|
It's a great plan...If only he could be trusted to host a pool without people losing coins and inadvertently mining dogecoin for someone else...
|
|
|
|
hostmaster (OP)
|
|
April 16, 2014, 05:26:42 AM |
|
It's a great plan...If only he could be trusted to host a pool without people losing coins and inadvertently mining dogecoin for someone else...
we can ask help from other pools.
|
|
|
|
bumblebee33
|
|
April 16, 2014, 05:56:08 AM |
|
I recommend going with The Poolest ECC Pool or ipominer.com ECC Direct Mining Port.
You won't have any problems with Lost Coins, Consistent Payments, or Scams.
The Poolest ECC Pool was down a few times the last few days, but other than that they pay out in time, and have a nice interface.
|
|
|
|
copychicken
|
|
April 16, 2014, 05:56:22 AM |
|
we dont need him.. giving him a second chance? for what?? the moment you get hacked.. of something like that.. just tweet it... and dont turn the hashing power of the pool in doge or ltc or whatever...
And i dont think someone sane..would use tha same password on a pool... I am trying for two weeks to make a pool just for fun and i cant managed it... i always get stuck at the beggining (wallet installing) But the funny thing is that most of the times the whole proccess ask you for big strong random code streams... Even for the database.. so i dont think someone would use the same password..
if people where allowed to vote they would totally dismiss him..
and he wants 120 million?? ahahahah!! nice joked... it made my gpus chill abit...
|
|
|
|
ficklepickle
|
|
April 16, 2014, 06:00:58 AM |
|
At this stage in altcoin history no one knows what is going to happen but one thing I know is that a strong community will be the foundation of any successful cryptocurrency.
In these final days of POW mining let's make sure we don't destroy the community over a single individual.
|
|
|
|
|
xref
Newbie
Offline
Activity: 50
Merit: 0
|
|
April 16, 2014, 06:25:22 AM |
|
This is not a healthy conversation. and its will only harm the coin
|
|
|
|
hostmaster (OP)
|
|
April 16, 2014, 06:34:21 AM Last edit: April 16, 2014, 06:46:15 AM by hostmaster |
|
If any pool has a current problem report me so i can update OP.
|
|
|
|
hostmaster (OP)
|
|
April 16, 2014, 06:51:58 AM |
|
Only left 4 days to PoS Kicks in.
|
|
|
|
|
matoy
|
|
April 16, 2014, 07:26:35 AM |
|
yesterday succesfully setup okaypool. Get any emails, still getting payments in my wallet. All working good. This pool is NOT A SCAM
coins4everyone. I mined on this pool two weeks from beggining and don't have any problem with it.
Hi, I can confirm that our frontend at coins4everyone is being DDOS for more than 24hours now. Our frontend is very laggy; we tried many tweaks, our mitigation system can't beat the attack so i guess we just have to wait for the sucker stopping his bloody attack. anyway, the good news is that i can certify to all of our (loyal) miners:if you are mining at our pool and have a wallet address and autopayout set, everything is working fine. Your earned coins are send to your personnal wallet as usual. if you did not set autopayout, just wait for the end of the ddos so our frontend is available and you'll be able to do the manual payout without any problem. it's just our frontend which encounters DDOS problems, the stratum is working like a charming (strictly 0 interruption since EC Coin launch).I'm not really aware of the current EC situation with some scam pools and ddos to multiple pools, anyway this situation is quite funny since our pool's hashrate has been multiplied by 3 even being DDOSed (150MH/s currently).
|
|
|
|
matoy
|
|
April 16, 2014, 07:28:40 AM |
|
i confirm! True: our frontend is being DDOSed But more important stratum and payouts are still working perfectly and never ceased to. Happy mining.
|
|
|
|
matoy
|
|
April 16, 2014, 07:33:58 AM |
|
yeah, did that too, a couple of times…entered pin to allow edits, entered pin (later) to initiate manual payment, entered pin (later) to change pin. All options indicated that an email to complete the authorization was triggered, with nothing. Also, I initiated 3 emails to "contact" indicating issues, with nothing sent back?
I have mined many other pools, and no the drill…have successfully done this a dozen times.
Something is not right with OKAYPOOL :-(
okaypool autopayment is working fine for me. I just set it up this morning. Unfortunately, for me, it's not. I have to move off, leaving my half a million coins behind?! Does anyone have another pool they can recommend? Thx I will tell you to AVOID coins4everyone pool. that pool will give you gray hair! what a very constructive and well explained reply... I'm very interested to know which pool's stratum has been up 100% of the time since launch... and sure our pool is in that list! The frontend getting ddosed by some sucker is not so dramatic: people having autopayout are getting their coins and the others will do manual payouts when the attack is finished. happy mining.
|
|
|
|
coinmixerr
Newbie
Offline
Activity: 23
Merit: 0
|
|
April 16, 2014, 07:47:19 AM |
|
Hello. Got some problems with changing withdraw adress on okaypool - no email on my mail to confirm. Sent 2 mails to devs, no answer. Any ideas?
|
|
|
|
Ivy-Team
Member
Offline
Activity: 82
Merit: 10
|
|
April 16, 2014, 07:52:59 AM |
|
are there some free give away coins to get?
|
|
|
|
|
hostmaster (OP)
|
|
April 16, 2014, 07:59:46 AM Last edit: April 16, 2014, 08:18:31 AM by hostmaster |
|
for the pools under ddos, i share with you some tricks
Use cloudflare's "I'm under attack mode"
This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache) When cloudflare cache it's zero effect on your servers.
You can dedect attacked urls in google analytics, live stats :-)
I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.
Longest attacks last 4.5 days in records in very rare situations. So no worry much.
|
|
|
|
matoy
|
|
April 16, 2014, 08:26:15 AM |
|
for the pools under ddos, i share with you some tricks
Use cloudflare's "I'm under attack mode"
This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache) When cloudflare cache it's zero effect on your servers.
You can dedect attacked urls in google analytics, live stats :-)
I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.
Longest attacks last 4.5 days in records in very rare situations. So no worry much.
hi. thanks for the feedback. does the cloudflare free plan is enough? because the free plan doesn't seem to support mitigation attacks protection; this is what we would need
|
|
|
|
hostmaster (OP)
|
|
April 16, 2014, 08:31:18 AM |
|
for the pools under ddos, i share with you some tricks
Use cloudflare's "I'm under attack mode"
This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache) When cloudflare cache it's zero effect on your servers.
You can dedect attacked urls in google analytics, live stats :-)
I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.
Longest attacks last 4.5 days in records in very rare situations. So no worry much.
hi. thanks for the feedback. does the cloudflare free plan is enough? because the free plan doesn't seem to support mitigation attacks protection; this is what we would need Free plan has "i am under attack mode". All you need to open it. Also you have 3 page rules limit to put so you can full cache attacked urls. if attacker attacks more than 3 urls at port:80 and at the same time then you will need 20 dollars plan which goes up to 20 page rules. In most case free plan will be more than enough. :-) To make attack influence even less, just learn first the attacked url(s) from google analytics, then put simple html file there and let cloudflare cache it. Also nginx is much resistance to attacks then apache. you can block with nginx attackers traffics (those mainly has no user agent) so you put rule in nginx to deny bad visits without correct user agent.
|
|
|
|
|