linux - How to programmatically set custom folder icon in ...
How to assign special folder icons in XFCE? - Unix & Linux ...
If you need help or you're New to roms and emulation these are some tips
First thing first You need an Emulator i suggest RetroArch is a Newbie Friendly good all in one emulator this is a video to how to setup and use ReTrOaRcH OpenEmu FOR MAC USERS THAT WILL NOT USE RETRO ARCH BECAUSE IT'S NOT ENOUGH LOOKING LIKE MAC UI OR THEY HAVE AN OCD OR something like that it's good anyways ( i didn't use it bc i'm not a mac user ) 🕿︎♋︎◻︎◻︎●︎♏︎ ◻︎❒︎□︎♎︎◆︎♍︎⧫︎⬧︎ ♋︎❒︎♏︎ □︎❖︎♏︎❒︎◻︎❒︎♓︎♍︎♏︎♎︎✆︎ and a download Manger Jdownloader ( download the jar version ) A photo to explain what to download (don't download the .exe version it has an adware in it ) or idm u can trial reset with this a torrent clients (credits to Piracy wiki)
Transmission - Simple and lightweight open-source torrent client
qBittorrent - Open-source torrent client. Has a built-in search feature that searches popular public trackers. Consistently updated
second you need sources to download roms these are the best sites + some tips sites : ziperto No intro romset ( you can download it directly without a torrent you CAN FROM HERE ) (If you don't want to download the whole romset for the system press view content ) AlvRo's Collection Vimm's Lair The Eye GamesTorrents ( of course if u can torrent ) MEGA-ROM N(itro)blog THE MEGATHREAD RomsUniverse MOBAsuite IDK?? A WIKI FOR ROMpacks????? The Old Megathread idk why u need it A guy who uploaded some roms but he didn't get attention ROMstorge ( idk how to use this site ) Roms WIKI Another ROMs site Edgeemu EmulatorGames ( the name is baaaaaaaad ) ROMsDownload WoW Roms cdROMance Startgame ( wtf is this name ) Retrostic ROMulation If u Want to Check if the site is safe go to here and comment ur site url Tips : Tip #1 : If you're in a country that hate piracy like USA or Germany ( i think Germany have dmca or something ?? idk ) etc. stay away from torrent and stay away from http sites ( download Https Everywhere extension and enable encrypt all sites eligible option by pressing on the icon of https everywhere ) even if your browser included with it . because it will warn you if the site is http... Tip #2 : FBI will not raid your house ( because fbi will not waste there time on you ) Tip #3 : https is your best friend because it's encrypted that means if you go to a https roms site your isp will see (random numbers and letters) .com/.net/.org/.to/.site etc. Tip #4 : install an adblock i suggest Ublock Origin Tip #5 : install a pop-up blocker if you have a chromium based browser like Brave, Chrome, New Edge etc. i suggest this ( if you know a better one please give me the link ) poperblocker Tip #6 The MegaThread is your OTHER BEST FRIEND if you want an rom head to the megathread and press ctrl + F and search ;) Tip #7 DON'T DO NOT OPEN ANY ANY ANY .MSI .EXE/.DMG/.DEB or ANY OTHER FILE THAT you CAN OPEN WITHOUT AN EMULATOR THE FILE IT'S 2000% A VIRUS ( EXCEPT WHEN you DOWNLOAD RETRO ARCH [ or any other emulator OF COURSE ] ) AND DON'T OPEN .BAT FILES IT CAN DELETE SYSTEM32 FILE AND IT'S ONE OF THE MOST IMPORTANT FILES IN WINDOWS Tip #8 Emulating is Legal but Downloading ROMs is ILEGAL ( OF COURSE IF you're LIVING IN A COUNTRY THAT DMCA IS A HOLY THING ) ;-) Tip #9 If you're suspicious of a file u can scan it on VirusTotal or Hybird Analysis ( you need to upload the file because it will open it on a vm in there sever ). Tip #10 I recommend using a controller if you have a xbox controller just connect it to your pc and you're good to go BUT if you have a dualshock controller (ps controller ) use DS4 Windows ( if you have a windows pc ) ( I Know it's the fork bc the og creator stopped working on it in 2016 or somthing like that ) or any other controller . Tip #11 If you download a rom and it came in .rar .zip .7z .r001( if the rom came with multiple files like .r001 .r002 .r003... you need to extract just a one file) etc. you can use 7-ZIP or Winrar ( don't worry 40 days trial doesn't end ). Tip #12 if the rom came in this order rom.rar.exe don't think to open it and if you hide the extension file from showing from the file name it will show like rom.rar but it's actually a .exe or .dmg etc. Tip #13 if you have a linux pc or a mac that doesn't mean you will not get infected even Temple OS have malwares ( if you don't what's a malware is just search ). Tip #14 if u tired of link shorters and etc. use universal Bypass Tip #15 Some good emulators : Dolphin a wii and gamecube emulator ( check the compatibility list to check if the game work ) Citra 3DS emulator ( check the compatibility list to check if the game work ) BSNES HD beta if u want to play snes games on HD PCSX2 the best ps2 emulator EPSXE a little bit old but it's good (ps1) DON'T use zsnes ( i guy on the comments said that ) RPCS3 PS3 ( check the compatibility list to check if the game work ) Xenia Xbox 360 ( check the compatibility list to check if the game work ) Cemu WiiU Emulator ( check the compatibility list to check if the game work ) a Decryptor for 3ds games if citra won't open the rom HERE DS DeSmuME (OLD) ( if u have a good ds emulator give me the link pls ) Project64 N64 DOSBox DOS emulator ( check the compatibility list to check if the game work ) IF U HAVE any other emulator pls link it in the comments <3 Tip #16 Romsmania CoolRoms etc. are NOT SAFE if you have any other tips share it =)
Storage space: I am using an 8 GB microSD card for the OS, and a 128 GB USB drive for data. Minimums I would recommend: 8GB SD card and 32 GB USB drive.
Reddcoin Core client version: v220.127.116.11-a8767ba-beta (most recent version at this moment). ↳ Screenshot
You need the OS; Lubuntu. Download Lubuntu (707 MB) for the Raspberry Pi: https://ubuntu-pi-flavour-maker.org/download/. It's a .torrent download, so you will need a BitTorrent client. Message me or post in this thread if you need help with this.
You need software to write the OS to the SD card. I use Etcher. Download Etcher: https://etcher.io/.
Select image: select the lubuntu-16.04.2-desktop-armhf-raspberry-pi.img.xz file.
Select drive: select your microSD card.
Plug the SD card into your Raspberry Pi and power it up.
Lubuntu should boot up.
Set up Lubuntu, connect to the internet (wired or wireless). ↳ As username, I chose "rpi3b". You will see this username throughout this whole tutorial.
Make sure date and time are correct ([Menu] > System Tools > Time and Date). ↳ Click on Unlock to make changes. I personally change Configuration to "Keep synchronized with Internet servers". ↳ Screenshot
Reboot ([Menu] > Logout > Reboot). I am connected to wifi, but have issues getting wifi to work on initial boot. A reboot solves this issue.
Make sure system is up-to-date, install never versions.
Open LXTerminal ([Menu] > System Tools > LXTerminal). ↳ Screenshot
Enter the following in LXTerminal: sudo apt update && sudo apt upgrade ↳ Screenshot
You will be asked if you really want to continue. Enter Y (yes).
Updates are being installed! Wait until it's finished.
Install programs that will be used in this tutorial.
GParted: to partition the USB drive.
Htop: to see the amount of memory (RAM) and swap that is in use.
Enter the following in LXTerminal to install these 2 programs. sudo apt install gparted && sudo apt install htop ↳ Screenshot
Create 2 partitions on the USB drive: 1) Swap partition 2) data partition (for the Reddcoin blockchain) The swap partition is necessary: The Reddcoin wallet can be memory intensive. To prevent any crashes or freezes, add 2 GB of 'virtual' memory by creating a swap partition.
Important: Backup your USB drive if needed. The USB drive will be formatted, so the data on the USB drive will be wiped.
Please use the USB drive solely for this purpose, do not combine it with other stuff.
Keep your USB drive plugged in, do not (randomly) plug it out.
Plug your USB drive in.
GParted will be used to create the partititons. Start GParted via LXTerminal: sudo gparted ↳ Screenshot
Apply the changes. Click on the check mark or select Edit > Apply All Operations. ↳ Screenshot ↳ Screenshot
Important: The name of the swap partition is needed later, so please write it down. Mine is /dev/sda1 (first partition on first drive (drive 'a')). ↳ Screenshot
Reboot. After the reboot, the data partition you just created should be visible on your desktop. ↳ Screenshot
The swap partition is created, so now we can enable and use it.
The swap in use can be monitored with the program Htop. Open Htop ([Menu] > System Tools > Htop) to see the 'Swp' (swap) in use. ↳ Screenshot By default, swap is not used, so 0K. ↳ Screenshot You can leave Htop open.
To enable the swap partition, open LXTerminal and enter the following commands: (Assuming /dev/sda1 is your swap partition.)
Unpack the file (large file, takes around 15 minutes to unpack): sudo xz -d bootstrap.dat.xz ↳ Screenshot
After a successful unpack, your will find the file bootstrap.dat in your USB root folder. ↳ Screenshot
On the first run of the Reddcoin Core client, it will ask for a data directory to store the blockchain and wallet data.
Start the Reddcoin Core client: sudo /media/rpi3b/usb/reddcoin/src/qt/reddcoin-qt ↳ Screenshot
The welcome screen will appear and ask you about the data directory. I suggest a new folder on your USB drive, I picked blockchain. The directory will be created with all the necessary files. ↳ Screenshot
Click on the three dots (...) on the right. ↳ Screenshot
Click on Create Folder at the upper right corner. Type and enter in the folder name. (In my case: blockchain.) Click on Open. ↳ Screenshot ↳ Screenshot ↳ Screenshot
After selecting the directory, the Reddcoin Core client will start. Wait till it's fully loaded and close it.
Move the bootstrap.dat file to your data directory you selected in the previous step. By doing this, Reddcoin Core will use the bootstrap.dat file to import the blockchain, which speeds up syncing. sudo mv bootstrap.dat /media/rpi3b/usb/blockchain/ (Assuming blockchain as data directory.) ↳ Screenshot
The Reddcoin Core client set up is completed, but you still have to sync fully with the blockchain before you can send, receive and stake.
Keep the client running until it's fully synchronized. It will use the bootstrap file first, and download the rest of the blockchain to complete the sync. This can take some time (it took 2 days for me). Syncing the blockchain uses a lot of resources, so the software may react slow.
You can see the progress in the debug window (Help > Debug window). ↳ Screenshot
When the synchronization is completed, the red (out of sync) will disappear on the Overview screen! ↳ Screenshot
When synchronization is complete, you can start staking your Reddcoins.
You can write down your private key or copy and save it in a document. Make sure you save it somewhere only you can access it.
To import later: Debug window -> Console -> importprivkey [label] [label] is optional. ↳ Screenshot (without a label) ↳ Screenshot (with a label)
Boot with only 1 USB drive plugged in: Make sure only the USB drive (with the swap partition and data partition) is plugged in when you boot up your Raspberry Pi. This to make sure the swap partition (/dev/sda1) is recognized correctly. If you boot up with multiple USB drives, Lubuntu might see the USB drive with the swap partition as the second drive (instead of the first drive), and ignore the 2 GB swap partition. If this happens, starting Reddcoin can render the Raspberry Pi unresponsive.
Start Reddcoin Core easier Run a shell script (.sh file), so you can start Reddcoin just by double clicking on an icon on your Desktop.
Right Click on your Desktop and select Create New -> Empty File. ↳ Screenshot
Enter a file name, make sure it ends with .sh, and click on OK. I've chosen for Reddcoin.sh. ↳ Screenshot The file will be created on your Desktop. ↳ Screenshot
Add the command to start Reddcoin to the file.
Right click on the file, select Leafpad (to open the file in a text editor). ↳ Screenshot
Add the following to the file and save the file: sudo /media/rpi3b/usb/reddcoin/src/qt/reddcoin-qt ↳ Screenshot
To be able to execute the shell script (.sh), it has to have 'execute permissions'.
Right click on the file, and select Properties. ↳ Screenshot
Click on the Permissions tab.
For Execute, select Anyone, and click on OK. ↳ Screenshot
To start Reddcoin Core, double click on the file. A new window will pop-up, asking you what you want. Execute in Terminal is what we want, so you can click on enter. ↳ Screenshot Reddcoin Core will now start. Do not close the Terminal window, you can minimize it if needed.
Minimization options Adjust minimization options, so you can safely press on the X button (the close/exit button on the upper right corner).
Activate 'Minimize on close'. Settings -> Options... -> Window (tab) -> Minimize on close. ↳ Screenshot Reddcoin will still run when you click on the X button. To close/exit Reddcoin, right click on the Reddcoin icon in the system tray (bottom right corner). ↳ Screenshot
RealVNC VNC Viewer (client) and VNC Connect (server): To remote connect to the Raspberry Pi, I use VNC Viewer ad VNC Connect from RealVNC.
After your download is finished, open the file and click Install Package. ↳ Screenshot
To run the VNC Connect once:
Open [Menu] > Run, and enter: vncserver-x11 ↳ Screenshot
To auto run on startup:
Open Default applications for LXSession ([Menu] > Preferences > Default applications for LXSession). ↳ Screenshot
In LXSessions configuration, select Autostart in the menu left.
Under Manual autostarted applications, enter vncserver-x11 and click on + Add. ↳ Screenshot ↳ Screenshot
Reboot your Raspberry Pi and check if VNC Connect is started automatically after the reboot.
When VNC Connect is running, you'll see a VNC icon on the right bottom corner. Double click the icon to open VNC Connect and to see the IP address you need to enter to connect to your Raspberry Pi. ↳ Screenshot
Disk Digger Pro Apk || DiskDigger Importance || Recover Lost Files
In the Present scenario, Technology is growing too fast and we all are experiencing that our smartphone, PC, and Laptops carrying various files with the help of SD cards and internal memory. We will think that our files are in very secure places but if any file deleted unexpectedly then what you will do?. Don't worry, I already told you that tech is growing as fast as it can. Here I'm going to discuss the bestdata recovery services aka (DiskDigger) which are a perfect example of it. Let's go down to get more details of DiskDigger(Deep file recovery from any drive). DiskDigger is a tool which can recover deleted files like photos, documents, music, video and much more. DiskDigger Features: DiskDigger can recover lost files from most types of media that your computer can read: hard disks, USB flash drives, memory cards, CDs, DVDs, and floppy disks. (Note: Make sure that you have to connect your device with a USB port to recover lost data from Android and IOS devices ). And one more important thing is you have to download the diskdigger app on your android phone to recover lost files. Suppose if your Android device uses a microSD card for saving the data, please remove the card and connect it directly to your PC using a card reader, so that you can scan it directly using DiskDigger for Windows.) DiskDigger has two processes which you have to choose every time while scanning a disk. These methods are named as “dig deep” and “dig deeper“. Dig Deep:
Undelete files from FAT (FAT12, FAT16, FAT32), NTFS, and exFAT partitions.
Recover any type of file.
Filter recoverable files by name and size.
Sort recoverable files by name, size, date, and directory.
Scan (carve) entire disk for traces of specific file types.
View recoverable files as a list, or as thumbnail previews.
Thumbnails will show previews of image files, album art from MP3 and WMA files, and icons from executable files!
Selecting a recoverable file brings up a full preview of the file (insofar as possible). For image files, it will show the image (with pan and zoom). For document files, it will show a text-only preview of the document. For certain audio files, it will allow you to play back the sound.
Previews of JPG and TIFF files will show EXIF information (camera model, date taken, sensor settings, etc.).
Previews of MP3 files will show ID3 information (artist, album, genre, etc.).
Previews of ZIP files will show a list of files contained in the archive.
Able to scan virtual disk image files:
E01 and EWF files (Expert Witness Format)
VMDK files (VMware disk image)
VHD files (Microsoft Virtual Hard Disk)
VDI files (VirtualBox disk image)
Direct binary disk images (acquired with dd or similar tools)
When digging deeper, ability to start scanning from a specific location on the disk.
When previewing files, the program optionally shows the first 4K bytes of the file as a hex dump.
In the past month, we, the team at The HempCoin have been making some huge changes, both internally and business development wise. We have added 3 new roles to the team: Community Outreach Manager, Business Development Manager, and Brand Ambassadors. Thanks to this, we have had many new developments which have shifted our timeframe a little as you may have seen. That being said, we are committed to ensuring our community is kept as up-to-date as possible and provided with as many support materials as we can create. We've spent the better half of two weeks writing up this guide and the tools included in it, in hopes that it will help answer many of the common questions we have been seeing and even some of the less common ones.
Masternode Calculator: Ever since we have announced that we will be forking into a masternode coin, we have been asked for the details and specifics of the reward payout for a node. Seeing this, we have created a Spreadsheet that is editable by the community. It will calculate the rewards for any number of nodes, and also tell you the expected payout in USD based on a price the user can input. You can find the link to the sheet here.
Fork Preparedness Guide: This guide will ensure you will be completely prepared for the upcoming fork. We have been seeing many questions about the fork which is understandable, and hopefully, this will alleviate many of those by ensuring all of our investors know how to make sure they are prepared, no matter their platform. Windows: Currently there are two options for coin storage on windows. Bittrex, the exchange that THC is currently traded on, or our official wallet. the safest and most secure option would be to store your coins in the private wallet, however, Bittrex has also confirmed with us that they will be supporting our fork. If you are planning on storing your coins there, all you need to do is purchase the THC and leave it be, once we fork, you will get the new coin from bittrex automatically and that is all. If you intend on using our private wallet, you can download the most up-to-date version from our GitHub here. Once you install it, you will need to let it run to synchronize, this has been known to take a very long time (due to having to sync all blocks since 2014). Once we fork, we will ensure this is alleviated, however, for now, you can follow the tutorial that was written here which will help you go from needing about 2 weeks to sync to about 3 hours at max. Either of these coin storage options will ensure you are completely supported during our fork. Mac: At the moment, our current wallet only supports the Windows platform. Once we complete our fork there will be a wallet available for all platforms including mac an Linux. So, if you do not have access to a Windows PC your best option for securely storing your coins during our fork is to store them on Bittrex. They have confirmed with the team that they will be supporting the fork so your coins will be safe with them. Linux: As you may have read above, our wallet currently only officially supports the Windows platform at the moment, however, there have been users who have reported that they have been successful in installing the wallet on Linux. However, at the time, we do not officially support the platform. Our advice would be the same as provided to the Mac users, storing your coins on bittrex would be the best option until our Linux wallet is available. Android: Currently, the only wallet we know of that will support THC on android is Coinomi. The community has been asking on their support forum if they will be supporting the fork and the reply that was received was somewhat unsure. They stated that no coins will be lost, but never confirmed if they would be adapting to the new algo and giving out any new coins. As the team, we have not heard whether or not they will be supporting the fork so the best plan for android users would be to either transfer your coins to a windows wallet, or to bittrex to ensure you are supported. We are not saying coinomi will not support the fork, however, it is an unknown, and we would prefer to ensure that there is 100% support.
Mining Guide: Lately, we have seen quite a few inquiries about the possibility of mining THC. Currently, there is only one pool that we are aware of which is hosted on the mining-dutch.nl. The tutorial written below will cover how to get started mining with an NVIDIA GPU using the mining-dutch servers, on a Windows-based PC. AMD GPU's have a very similar process, the main difference will be that you need to swap out the program CCMiner for a program which supports the AMD architecture. To start mining you'll need a few things:
A decent GPU (as many as possible really, these are the brains of the operation).
A fairly well-ventilated PC case(if you're just mining with your gaming PC)
Instead of a PC case a lot of big-time miners just use shelves and build the multi-GPU rigs on those.
A mining program (For this tutorial we will be using CCMiner but there are plenty of great alternatives out there too)
A pool to mine from (Think of this as a meeting place for all the GPUs to team up and mine faster)
Now that we know what we need to mine, let's get started on setting it up:
You may need to install a program to open 7z files such as WinRar.
Extract these files to somewhere like C:\Program Files, or at least somewhere you won't forget about them.
You should see an api folder, a program called ccminer.exe (sometimes ccminer-x64.exe) and a few other small files. What you want to look for is ccminer.conf, this is your config file. You use this to tell your program what pool to mine from.
Open up ccminer.conf with notepad or notepad++ if you have it installed (or really any other coding software) and now we can get to the file editing.
When you open ccminer.conf you should see something that looks like this. (excuse the pastebin link, reddit doesnt seem to like code in lists.)
Next, go to the mining-dutch link and setup an account. (Direct link to signup page)\
(These next links will likely only work once you register and sign in)
Proceed to the workers page (Normally found under My Account>My Workers)
A worker is essentially telling the pool what machine is working for you. Create a new worker by entering in "Workername" "Password" and check the monitor box. Now just hit create.
Now, go back to the ccminer.conf file that we opened earlier. If you follow this link you should see something that looks very much like your file, however, it also has labels, #1, #2, #3.
On your file, fill in #1 with "stratum+tcp://mining-dutch.nl:3435" (this can be found on the mining dutch website, its just hidden. In the top right, click the cloud with the blue icon (getting started) then scroll down to the Vardiff address for Hempcoin)
#2, enter your "loginname.workername" Login name being your username to login to mining-dutch, then workername being what you just named the worker we created.
#3 can be filled with anything, they don't use passwords.
This should really be all you need. Now save the ccminer.conf and then just run ccminer.exe
If all of this was done correctly you should see a command-prompt window pop up and your machine start to mine. It takes some time to get going so that is not unheard of, and also, if you look at the dashboard you may not see your worker show up for a while. This is normal, it uses averages over time to tell you what performance it is getting so it won't have a proper value for a few minutes.
We are always working on advancing all of our roadmap goals, however, lately, we have been focusing on a few key projects which are listed below (in no specific order).
Putting the finishing touches on the new wallet.
Ensuring bittrex is ready for the fork.
Our mobile app
Graphics that will better represent the new THC.
A brand new website (launching soon!).
Connecting with many different owners/affiliates/partners to businesses which would like to use THC locally.
Implementing the ambassador program
Internal organization to ensure everyone is on the same page at all times.
Social Platform Links
One of the larger changes we have made is to bring a community outreach manager onboard to work on communication. We may have had missteps in the past, however that is in the past, we have changed and want to ensure we show you that change! Keeping in line with that, we have heard your cries for a more community-oriented social stance, so, we have created an official discord chatroom where anyone can come and chat with some of the devs, or the rest of the community to stay in the loop. We have also created a telegram more recently, which as of the date of typing this, has over 1000 members already, and it was only released less than a week ago. We do ask that everyone who joins reads over the rules that are posted in both locations and abides by them so we can have a clean and organized community. We are always looking to expand and if you have any more suggestions feel free to let us know!
Q: I transferred X amount of THC to my wallet, but it's missing? A: The first step to ensuring you never lose any THC is to confirm the wallet address. Always, always, always double and triple-check that the address you input is the same as your address. If there are ANY typos at all, you will not receive your coins. If you have checked and are sure that the address is correct, check your wallet. If you have just installed it, chances are you are still syncing with the blockchain; you will need to wait until you are caught up to see the THC. It's best practice to sync your wallet before you make any transfers. To check the status of your synchronization, check the debug menu in the wallet, it will show you the exact date you are synced to. Lastly, if you are for sure synced, and you have used the correct address, check the transaction ID on the block explorer. This will show what happened with the transaction and allow you to follow where it went. It could also still just be in progress, sometimes it can take up to an hour if there are service delays with the exchange or even just your internet connection. Q: Why have there been so many delays with THC? You have been around forever! A: Although THC was one of the first 30 cryptocurrencies mined in 2014, the unfortunate truth is that before April 2017, there was no active full-time team. Since then, the original THC FoundeDeveloper and current CEO Tim has worked hard to add incredible new developers, a business outreach team, an entire marketing team, and the brand ambassadorship program. It has taken us a little time to organize, but we are finally in sync as a team and prepared to unleash this business on the world. Q: When is the fork? A: As many of you have noticed, our whitepaper says fork will occur by Q2, while we previously announced Feb. 23rd. We did this not to provide our community with doubts, but to allow ourselves an added bit of time for our dev team which, like the rest of our team, has added new members in recent months. Due to this, we are far further along with our HempPay platform than we thought possible; as such we will be hiring 3rd party code auditor to audit our code to ensure we run as smoothly as possible. We would much rather delay a fork than risk any of our investor's privacy or security and fork too early. We also want to reiterate that we have a direct line with Bittrex and they will 100% support our fork. We do appreciate everyone’s patience with this transition into the future of THC; we’re working hard to ensure that we fork as early as possible. Q: Will Bittrex be supporting the fork? A: We have seen this question come up many times now and the answer is, and will always be, yes. Bittrex is well aware of our plans and they know exactly where we stand regarding the fork date. Bittrex has also asked requested our community stop creating support tickets just to confirm the fork. They have been overwhelmed this week with the same question over and over. The final answer here is yes, Bittrex will be supporting the fork and we are in constant contact with them to ensure everything is going as planned. Q: Will purchases with a credit card to HempPay count as cash advances? A: We are still in the middle stages of building HempPay and finalizing the format for operation and contractual agreements. We intend to partner with exchanges and use their API to make the purchases, so buying THC through our app will have the same effect as using your card to purchase straight from an exchange. Please note that HempPay is still in development so exact details may be subject to change. Q: What is the cost for a masternode? Some say 10,000 others say 20,000 THC is required. A: To run a masternode, 20,000 THC will be required. We do acknowledge that during our transition, we had originally stated 20,000 and then our team announced 10,000 THC will be required. We have since readjusted our plan, realizing that the low requirement would sink MN profits and lower incentive. Instead, we returned the requirement to 20,000 THC and increased the node reward by 66%. For more information please check the masternode calculator in the Tools section. Q: I heard Bittrex may delist THC. What?? A: Short answer: No and not even close. Long answer: This rumour was started over a year ago, it was based on a Bittrex Support post from January 27th, 2017. The only post we appear in is the one mentioned above. You will also see that we only appear due to being listed as a potential for removal, due to a lack of volume as most altcoins saw at that time. You will note the size of the list of altcoins here. We are now in direct communication with Bittrex daily and we unequivocally state that there is no need to worry about us being removed at all.
Ultimate Software Verification Gude - Never get Hacked or Phished again!
Due to the amounts of scams and phishing websites and malwared softwares, I made this quick easy to understand tutorial how to verify that the Bitcoin Cash software that you use is legitimate. The core concept is that you should not rely on any 3rd party to prove the authenticity of files, not even this text, because any website can get potentially hacked so just do all the verification by yourself, as much as you can. It might be a longer work every time you update the software but it's worth it, since the alternative is being a victim of theft.
There are 3 ways to verify the authenticity of the software you download:
Verifying the authenticity of the website (EASY)
Verifying the authenticity of the software (MODERATE)
Compiling the software from source and comparing it against the downloaded authentic software (HARD)
The easy way only protects you against MITM attacks and assumes that the webmaster keeps it's website secure, doesn't have malware on it's website or the server hosting is also secure and the connection is encrypted with TLS (HTTPS protocol). This way in most cases it is safe to download from the website, but hackers sometimes go out of their way so it might not be enough if you really want to be safe.
The moderate way verifies the software independently and regardless of the website being compromized, you can be sure whether the software is genuine or not. This assumes that the developer is honest to begin with and the compiled software matched the source code deterministically.
The hard way totally proves that the software is genuine beyond the shadow of a doubt, and it's totally trustless, independent of whether the developers are honest or the website is honest itself.
Both ways assume that your computer is secure to begin with. If your OS is already compromised, then you have a much bigger problem to deal with already.
In case your IP address is specifically targeted it's advised to have a VPN connection at hand too, and do the verification both on your VPN and on your clearnet IP. I am using Firefox for this example and you should too. This method can be used to verify any website you want by cross-examining their authenticity against eachother relying on 3-4 more or less trusted authority figures. What you would do is just use 3-4 different search engines that you more or less trust: DuckDuckGo.com, startpage.com, bing.com, wikipedia.org. Open each search engine in a different tab in your browser, and enter in each one of them the software you search for, in this example "Bitcoin Cash". In the first search results you will see a link to the supposed bitcoin cash official website (on wikipedia you will just see the link at the right side of the article about bitcoin cash), click on that link from each tab and you will have the official website opened in 4 different tabs. Now the websites might look the same, but they might not be the same websites, since the connection could be hijacked so you could be on a fake website. In order to determine the authenticity of the website, click on the green lock icon in Firefox before the HTTPS mark, click on More Information, and click on View Certificate, then you will see there a SHA256 fingerprint, paste that into a text file. Now go to the other tabs you have opened the website in, and put that SHA256 fingerpring in the text file itself. Now see if all 4 of them match in the text file by pressing a CTRL+F and copying it in the search box. If they are the same, then you are very likely on the official website, assuming that all search engines remove phishing websites quickly and wikipedia is not hacked. You might also want to redo this verification from a different IP address in case you think a hacker is speficially targeting your IP address. Now just download the software from the genuine official website and you are ready to go. (Note I am not giving you the fingerprint I got from my verification so that you don't have to rely on my authority, you should do the verification yourself!)
You have to know how to use GnuPG software. I would use a Linux machine for verification since it's very easy to do it there. You can always burn a quick Live Linux DVD and boot that up to do the verification. Just watch some videos to learn how to do that, I assume you already know how to do that. Now regardless of whether the website is hacked or not, we only care about the software itself here, and if the verification is done properly, any discrepancy can be detected regardless of the website itself. A website can be far easier hacked than an offline private key used to sign softwares, so this method is much more secure. Every Bitcoin Cash software is usually signed with a GPG key. The issue here is to verify the authenticity of the key itself, once you have that, you can verify any package with that, regardless of source, assuming the developer is honest, so it's not fullproof, but good enough. Going with the example above you download the Bitcoin Cash software or Electron Cash or whatever, and you grab the software file, the GPG signature file and the GPG Public Key. Then import the GPG key gpg --import keyfilename.txt for example. The only thing you need to do is to verify the GPG Public Key itself. Let's go with Electron Cash in this example. Fyookball (the lead developer)'s official key is allegedly 0x4FD06489EFF1DDE1. We don't know if this is true or not, we can either e-mail him directly, but then who knows his e-mail could be hacked or whatnot, so we need are more extensive verification here. Each GPG key has a fingerprint which is your main point of reference, so the fingerprint you got for the downloaded key, which you can see in SeaHorse or by entering gpg --fingerprint 0x4FD06489EFF1DDE1 in a linux console after you have imported the key. You need to create a web of trust, enough reputable people vouching that this is indeed his genuine key, usually relying on people who have either met him or has extensively verified his identity. So we look the key up like in a phone address book, on the MIT server: https://pgp.mit.edu/pks/lookup?op=vindex&search=0x4FD06489EFF1DDE1 Also it's recommended to install Gnome Seahorse, a gui interface to manage GPG keys: sudo apt-get install seahorse It appears to be signed only by 2 people, I don't know them, but if you do and you have their keys too, then you can rely on their authority to confirm the authenticity of the key. If by the time you read this, the key will be signed by a trustworthy person from the broader Bitcoin Cash development team or some other well known entity, then what you would do is grab their key (and verify it) and in SeaHorse set their key to Trusted. Then automatically in Fyookball's key, the other people's signatures will show up, proving that other trusted entities who's keys you have already verified have signed this key, so on their authority you could trust Fyookball's key too. For example in Bitcoin ABC and other softwares, this is the case, unfortunately not for Electron Cash yet. So the only thing you can do is grab and verify fyookball's e-mail address, and message him and ask him his GPG key's signature. I have already done that so based on my authority his key fingerprint is: D56C 110F 4555 F371 AEEF CB25 4FD0 6489 EFF1 DDE1 The only other place that has the key referenced is Github, so you have to rely on their authority to host the genuine key and not get hacked in the process. There is only 1 electron cash repository which is a fork of the original electrum software: https://github.com/fyookball/electrum, again you could verify the authenticity of Github.com based on the previous method, but there is only 1 repository for Electron Cash so it's not hard to find it. There you can see the public keys in a separate branch: https://github.com/fyookball/keys-n-hashes It's not a lot of evidence, so I hope in the future more people will vouch for it, but for now this is all we have, for other softwares you can find a more extensive web of trust. So after you established the legitimacy of the key, just save it or write down the fingerprint on a piece of paper and put it in a safe, and from then on you can verify any new Electron Cash release against that. Simply just verify the signature file for example for the latest release: gpg --verify ElectronCash-3.2.tar.gz.sig And it should give back the fingerprint of it, if the fingerprint matches the one of your verified key, then the software is genuine. But again this relies on the assumption that fyookball is honest, which in my opinion he is, he is a trustworthy developer.
The ultimate way to verify the trustworthyness of a software is to:
Download and inspect the source code yourself
Compile the software from source
Verify the output against the downloaded package (verified by the previous step)
This is very complex, but if you want to have a fullproof guarantee that the software is genuine and untampered then this has to be done. It might be a bit paranoid but dozens of malware clients come out each day, most of them have sneaky code in them that sends out your private key like in this example:
If the developer is both shady and the source code doesn't match the binary, then you can easily get hacked and lose all your money. What you need to do to be fully secure in a fully trustless verification model is the following:
1) Do the previous step for verifying the signed package with the developer's genuine public key, all verified. So now you have an output package that is tied to the developer that is allegedly derived from the source code securely, assuming the developer is honest, and is compiling it securely. So in this case the risk is limited only developer malice or negligence. 2) Download the source code, from the main website, it should be correctly downloaded, so just download it multiple times to verify that the package was downloaded correctly. 3) Inspect the source code yourself or pay a programmer to do it. Especially watch out for the sensitive parts of the code, like the part that does the encryption and the part that does the communication. You should make sure that the private keys are never sent out. You could also use a network inspector software and test whether the private key is sent out. Now if you have verified that the source code is genuine, then assuming that Github is honest, many other developers will verify this too, so we can establish that the source code does exactly what it meant to do, with no backdoors. 4) Now you need to compile the source code and make it identical to the package you have just verified previously. Determinism is crucial, the package must match the source code 1:1. Now there may be some config files or cache files that will not but that is not an issue, the Electron Cash software is very messy so there will be a few files that will not match but usually it should. Open the README.rst file in the Electron Cash source code to see the instructions how to compile it for different OS's. By default I recommend Linux because it's easier to work on. 5) Now that you have a compiled source code folder, every single file in it should match the signed output package you have verified it earlier. Now you can write a quick code to parse through each file and check for discrepancies. You are lucky because I have already did it:
Download my script, unpack both archives in the same directory and put the script there too and make sure the root directory ElectronCash-3.2 is where the files are, sometimes it might be ElectronCash-3.2/ElectronCash-3.2 depending on how you unpack it with the archive manager. Now run the python script, and it will show you exactly which files don't match and which files are missing. Ignore the missing files, in fact just delete them from the other package where they are, since they are surplus files. The script verifies the untrusted package (the one you verified previously, yet untrusted because we don't know whether it's derived from the source yet) The missing files can't cause problem because they are just extra files put in the output package, if they don't exist in the source, then they are harmless. So just delete the missing files and you are left to deal with the corrupt files. Also do a search for .pyc extension files and delete all of those too, these are just cache files that get recompiled every time you run Electron Cash, so they can't be malware. And there are the corrupt files which are modified. Now this could be due to some discrepancies the way the compiler worked or it could be a backdoor we don't know, so we need to verify each corrupt file 1 by 1. 6) Now we need to verify each corrupt file one by one and see the discrepancy. Get diffuse, which is a simple tool to look for differences in the code: sudo apt-get install diffuse Open both of the same named files in it and check out in each pair the differences. Usually it will just be a few misc stuffs so in that case just copy 1 difference over to the other and make them identical. Do this for every corrupt file pair, and check whether any malicious code was added. After you are done run the script again and it should give out Packages are Identical! If you get that, you have now verified beyond the reasonable doubt that:
The source code is genuine and secure
The package file is certainly created by the developer and based on his reputation it's secure
Your compilation is secure
Your compilation mathes deterministically the source code
Your compilation matches the package file provided by the developer
Therefore the softare is secure and genuine and hasn't been tampered with. I have verified the ElectronCash-3.2.tar.gz file with the HARD WAY and based on my verification the SHA256 checksum da355ac3d198750e01acb8f1ada82c4d481036bee36fd9d3e2fdff972d9fc082 is genuine. But don't rely on my authority, verify it all yourself. That is the whole point of the trustless setup.
Summary I) INTRODUCTION II) SOFTWARES & LINKS III) ENCRYPTION USING TRUECRYPT IV) CREATION OF A VIRTUAL MACHINE USING VBOX V) TWEAKS TO VBOX VI) INSTALLING AND SETTING UP LINUX VII) INSTALLING TOR VIII) SHORT INTRODUCTION TO PGP VIA TERMINAL IX) ADDITIONAL THOUGHTS I) INTRODUCTION First of all, I'm no security expert. The following guide will be nothing but technical instructions to securing your machine to make digital information storage and transmission secure. Your security is divided in 3 parts. Also remember your security (as in lowering chances to get caught) is only as strong and your weakest link. Those 3 parts are : a) Money You can (and will) get caught if you aren't careful with how you move money. Banks and LE work hand-in-hand to trace money. I won't cover that aspect but you need a bulletproof way of buying (if you are a buyer) and/or selling (if you are a seller) your bitcoins. b) Drugs Yes, you'll get caught if you don't handle drugs in a secure fashion, ldo. It includes shipping, stealthing, receiving packages, storing. You get the idea. c) Information Here is the part I'll develop in this guide. How to handle information (mostly digital information) to not get caught and be as stealthy as possible. II) SOFTWARES USED AND LINKS All the following softwares are : 1) Free - you don't have (and shouldn't, as sad as it sounds for security reasons) to pay anything to fully use them 2) Open source - Anyone with knowledge can see what the programs are made of. Def a security plus. We will need (In order of use) : a) a good anti-virus Before even starting the job, we need to make sure we're working in a safe environnement. If you have a keylogger installed on your computer then all futur steps will be for NOTHING. So if you don't have an updated AV installed yet, get one. I personally use AVG. Here is the link but it's recommended you search it yourself using google, after all, I could be a hacker myself. http://free.avg.com/ b) a password manager You'll need to save at least 5 complex passwords. I strongly recommend using a password manager (with passwords creation) such as KeePass. It's multi plateform (windows/linux/android). http://keepass.info/ c) TrueCrypt Very powerful piece of software which allows you to encrypt files/folder or even full system partition using bulletproof algorythm such as AES. http://www.truecrypt.org/ d) VirtualBox Very powerful software which allows you to run a completely autonom virtual machine inside your physical machine. https://www.virtualbox.org e) Ubuntu 13.04 Free OS. Very safe. Not so user friendly but you'll only use it to browse SilkRoad and use PGP (more on that later). http://www.ubuntu.com/ d) Tor Browser Bundle (TBB) A package of pre-configured software to use TOR. Awesome. https://www.torproject.org/projects/torbrowser.html.en III) ENCRYPTION USING TRUECRYPT I assume you already installed the antivirus and ran a minutious scan on your system. Your system was clean already ? Great, you can read what's next. So first, we want to create an encrypted folder so that we can install a complete different OS in it. It'll be 100% safe and impossible (without the passphrase ldo) to know what it is you are putting in the folder. a) Click on "Create Volume" b) Select "Create an encrypted file container" c) Select "Standard TrueCrypt volume" note : Do your research on which option you want to use. d) For Volume Location, select where you want to save the file. Type in a random name and click "save" then "Next" !! Note : You can select a USB pendrive (with at least 10GB and USB 3.0 strongly recommended) so that you have a portable, encrypted OS. Very useful since that you can physically hide it from LE in case of a search at your place) !! e) Encryption Options I advise to use AES. The technology is old which, in security, is a good thing since it means it has been tested by many security experts. I don't know about Hash Algorithm. I think I use RIPEMD-160 but it's up to you to do your godamn research on which option you want to use. f) Volume Size Pick at least 10gb, (no more than 15GB really). Note : TrueCrypt will encrypt the whole 10GB no matter what it is you put in, even empty space. So consider the number you type in (10GB here) as gone once you click "Next". g) Volume Password Open KeePass (!!!!!!!! with a strong masterpassword !!!!!!!!) and generate a random passphrase using at least 15 (25+ advised) characters (with lowercase, uppercase, numbers, symbols, space everything checked). Save it carefully, and copy paste it twice in TryeCrypt. h) Large Files Select "Yes" i) Volume Format Move your mouse randomly (to create randomness in the Key) a few seconds then click "Format", wait. Congratulation, you now are the owner of an encrypted file container. IV) CREATION OF A VIRTUAL MACHINE USING VIRTUALBOX First, you need to mount the encrypted folder you just created. For this, open TrueCrypt, and click on random letter (remember it and always use the same to avoid corruption). I personally use R: (don't ask me why, I guess I used it the first time and it stuck). Then, click on "Select File" and browse to your newly created folder, click on "Open". Then, click on "Mount", it'll ask for your passphrase. Open it with KeePass and copy past it. Click "OK". If everything went well, you can know access your encrypted folder using Windows Explorer in computer. Truecrypt created a virtual partition. Okay, so now, off to creating a Virtual Machine. You must have downloaded Ubuntu 13.04 (700MO or so). Good, save the .iso file somwhere. a) Open VirtualBox, click on "New". In name, type in Ubuntu, it'll automatically select the type and version needed. Click "Next". b) Memory Size. It's the amount of RAM you want to allocate to your virtual machine. I personally have 12GB of RAM and I allocated 4096MO to my VM (virtual machine). Note : Consider that the amount of RAM you give to your VM gone from your physical machine. Even if you don't run anything on your VM, the amount given (4096MO) won't be usable by your physical machine until you shutdown your VM. Click "Next". c) Hard-Drive. Select "Create a virtual hard drive now", click "Create". d) Type of hard drive file Select "VDI (Image disk VirtualBox)" Click "Next". e) Select "Fixed Size", click "Next". f) File location and size For location, click the yellow folder and go to the letter you mounted the file in TrueCrypt (for me R:\the-name-of-your-VM.vdi) In size, pick whatever the amount of GB you allocated to the crypted folder MINUS 1.5GB. !! Note : very important. For exemple, if your crypted folder is 10GB, you must pick 8,50 Gio. !! Click "Create" and wait a minute or two for VBox to create your VM. V) TWEAKS TO VBOX Here are the settings I use for my SilkRoad Machine. To access settings, in VirtualBox, select your newly created VM and click "Configuration". Go to the onglet "System" => "Proc", select a reasonnable Value (where the green and red meets is generally ok). Type in 90% in allocated ressources. Go to the onglet "Display" => "Video", select a reasonnable Value (where the green and red meets is generally ok). Number of screen, 1 by default. You can use more screens if you have more than one. Vbox supports it beautifully. Click "OK". VI) INSTALLING AND SETTING UP LINUX a) Open VBox, select your virtual machine in the left and click "Start" at the top. You now are running your virtual machine. Now you must install Linux on it. A window will pop up and ask you to select a booting disk. Click the yellow folder and browse to the Ubuntu.iso file you previously downloaded. Click on "Start". You VM will now boot using Ubuntu. Install it, check "Download updated while installing", leave everything else as is. Select "Erase disk and install Ubuntu". File in the settings needed. In name, type whatever you want (note : I usually just type in the same letter I used to mount the folder with TrueCrypt). Pick a password (a new fresh password, that one isn't necessarily important but make sure you remember it). Select "Require my password to log in", you don't mind extra lawyers of security. Click "Continue". Now, wait, the installation can take up to an hour or two. When done, click on "Restart Now". When rebooting, you will be asked to if you want to boot using the installation, DON'T anything and wait. Now you have a beautiful orange/purple page asking you for your password. Type in the password you wrote during the installation process and press Enter. Welcome to Ubuntu. b) You need to setup a few things. First, you can go fullscreen pressing Right CTRL + F (the CTRL next to the arrows on the right of your keyboard). Better, right ? You'll notice those black borders onto the sides. That's ugly and bad for your eyes. To remediate, you need to install a pack of drivers especially made for Virtual machines. To do so, put your cursor to the very bottom center of your screen (if you are in fullscreen mode, else you have access to the options at the very top of the window). Click on "Peripheric", Click on "Install Guest Additions". An autorun window will open up, select "Run Software" and click "OK". Enter your Ubuntu password. Click "Authenticate". An ugly purple window will open with ugly white characters, it's the terminal. We'll use it later for different stuff. Wait a minute or two until you have the terminal says this "Press Return to close this window...". Press Return on your keyboard (above Enter) to close the window, ldo. Reboot the virtual machine by going to the very top right of your screen. Now to go the options, on the left, you'll see a dock of icons, click the Gear with the Red hammer or whatever you call it in english (I know it's not a hammer). Double click on "Displays", pick your favorite resolution. Click "Apply" then "Keep that resolution". Much better, cierto ? You will notice the OS seems slow and laggy, even more so if you installed your VM on a USB pendrive. To remediate, follow those steps. Run the terminal (push ALT + F2 and type in "Terminal", double click to open it. Copy past that command : /uslib/nux/unity_support_test -p The following should appear : Not software rendered: no Not blacklisted: yes GLX fbconfig: yes GLX texture from pixmap: yes GL npot or rect textures: yes GL vertex program: yes GL fragment program: yes GL vertex buffer object: yes GL framebuffer object: yes GL version is 1.4+: yes Unity 3D supported: no As you can see, 3D acceleration isn't activated. To activate it, return to terminal and copy past that command, enter password when asked. When "asked to continue [Y/n] ?", type in Y then press enter. sudo bash -c 'echo vboxvideo >> /etc/modules' Shutdown the virtual machine (you can do it manually inside the VM or press Right CTRL + Q and select "Send extinction signal". Go back to VirtualBox and go to configuration => display. Check Activate 3D acceleration. Boot your VM, open terminal and type /uslib/nux/unity_support_test -p You should now see that Unity 3D is supported and your OS is fluid. Don't expect native performances tho, it's still an emulated OS. VII) INSTALLING TOR Run your VM. Open a firefox window and go to https://www.torproject.org/projects/torbrowser.html.en Select the Linux version and download it. Close Firefox. We want to use that machine on the clearweb as little as possible. Unpack (or drag&drop) the tor-browser_en-US folder in the folder "Home" or desktop or whervere you want. Open the folder and double click on "start-tor-browser". It will open a weird text editor with gibberish stuff in it. Close it. We need to activate an option first. Push ALT, in that window, type "dconf-editor" and press Enter. In dconfg-editor go to: org => gnome => nautilus =>preferences Click on "executable-text-activation" and from drop down menu select: "launch: to launch scripts as programs." Close dconf-editor. You can now launch TOR. and browse anonymously the road. I strongly advise you to install KeePass for linux by going to Ubuntu Software Center to save passwords for Silkroad as well as your PGP passphrase. VIII) SHORT INTRODUCTION TO PGP VIA THE LINUX TERMINAL PGP is a powerful protocal that allows you to encrypt and decrypt messages and files. It has been used for over 15 years and is the standard all over the world for industry and governement communications. So first, we must create our own set of keys. A) Creating your own keys To do so, open the terminal and type GPG. It will reply : gpg: Go ahead and type your message ... Ok, you've got GPG installed already, perfect. To create your key, type : gpg --gen-key Type 1 then hit Enter You'll be asked to chose between 1024 and 4096 bits. Chose 4096 (the most secure), hit Enter. Next window, type 0, press Enter, then type Y, press Enter. You are now asked to enter your name, it's important you don't type in your Real Name obviously but it's also important to chose something that identifies you. I chose my Silkroad name so that my contacts know the key is mine. Email adress : [email protected] or whatever you want, shouldn't be real. Comment : none, press Enter Type in "O" to confirm, press Enter Enter passphrase, very important to chose something very secure. As usual, open up KeePass and generate a strong passphrase, there is no limitation AFAIK. Then you'll be asked to do random stuff on your computer to generate bytes to ensure randomness in your key pool. Do stuff, open a random file and type in stuff for exemple. Once it's done (it can take a few minutes), you now have your own set of keys. What we want to do know is to export the public key so that you can share it with your sellers/buyers. Type : gpg --armor --export your-email-adress-used-before Copy paste the public key in a .txt file on your desktop and share it whenever you buy/sell. B) Importing a public key To send a message to someone, you must important its key. To do so, create a document and copy paste the key there, close & save it. Now, open seahorse (hit ALT and type in Seahorse, open the program called "Passwords and keys". Put your cursor in the very top left of your screen and click file => import, select the file you saved the key in. Done. C) Encrypting a message Open the terminal and type : gpg -ear name-or-email-of-your-contact < Press Enter Type your message Press Enter, finish by typing "end" and press Enter again. You'll have your encrypted message. Something that looks like that : -----BEGIN PGP MESSAGE----- Version: GnuPG v1.4.12 (GNU/Linux) hQIMA7eD31/5BBRZAQ/9Hq1r1gpOIf2r06zSIL8Ww0tUCC9PlNiMpemPwhpZsccB vO4MOMrnV41BHToTQNfh0xiZdXFxO/T6ow4oatP2Ap/BvZtipcAAjJKowP6aaTOJ Wgd7nC4FTJvRUjgkW/p3imlQsdTVb3+2dNzCPp0yrr8NocW77+4Ka/+4aoql0UmI 3mKLjo0+eof8qAnQd5jOaAcWTszhIwBd99rXVbRCjNa/jMsSQ9Vnn7L+WqYGHuAI MMdOCU3peifV/7zA6A0bMKzStWc1JIa84wus91/mmErkRcNZHqThCje8eulinzRm RthaH0yi7ty65F3IuSqbq/qdpdE9UXvwjySbFE7ANCPpnkP4jv+oL95UezyjbO2x ra1Il7XKbYvaf0oXJAz5xKsLfeHKB3kCR+Kxzt9NmdRZ4rPZ4ZjSN5WI9YeOL0t/ W7oaCyBcFD/6/m/63VNYZTrwrqBGqsWhXVFpoHalvd+09CffsdQjwDIMy9u3TtRk j+FDSGuukKrS/7exWSoajSDhTK+koSS8CIFvyocZ81EkGhnUjd4kxlIAu4UCXmG6 LiJXXo7X5PK7knGtlzZXstrtrrttr8FFeAbSHsZ0+ihdxtNSvx1EPewl TtLSKoUT9ickUrxFoPm2z1vqBwN/087EaCU6BSX8uwZ8GrxMwSKgVmQKfVyfgMDS RAGGtmuRwgfyhthrertwF0KV8nTajDnSqoGiMAgK7y+e320OEFnYXOKIXlue l7FvOHwi9jZbBAR4HHAfhgJIj78P =OT60 -----END PGP MESSAGE----- You can now send the encrypted message to your contact. D) Decrypting messages Open the terminal and type : gpg -da < Press enter, then copy paste the message you received. Press Enter, finish by tiping end then press Enter again. You will be asked to enter the passphrase to decrypt it. Open KeePass and copy paste it. The result will be like this : You need a passphrase to unlock the secret key for user: "abcd [email protected]" 4096-bit RSA key, ID xx, created 2013-05-08 (main key ID xxx) gpg: encrypted with 4096-bit RSA key, ID xxx, created 2013-05-08 "abcd [email protected]" ENCRYPTED MESSAGE TO THE SILK ROAD HERE You can now safely converse with your vendors. IX) ADDITIONAL THOUGHTS I hope everything worked well. Finally, the most important security advice someone can give is to use your brain. Don't do anything stupid and you should be fine. Feel free to discuss issues you may have encontered here or by PM, I'll gladly help you getting setup. Remember also that your security is only as good as your contacts security. For exemple, if your seller is stupid and keeps detailed informations of his buyers on file, then there isn't much you can do in case he gets caught. I could have sold this tutorial but I chose not to because my personnal security is guaranteed only if yours is aswell. You get my point. MUST BE ANONYMOUS -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.12 (GNU/Linux) mQENBFGIAIUBCAC75V2SJ50dU6+gUY7jdrHxJKmdjXjlOxWjE+CTuti+Pq8NveTK aPXWHmFZpsEtW+v7tHmPPT/cjEKlmo/B9Wxl9daFis+6gFQHnaKNRCFVmOSt9GL8 7qBxrxC/HZTeBgdE8dWf4RPSc911PRb2+iCCrdgj+5ILwp3fcM5EHoRqKiFDpb3A fybrw3prvpPx8dyt1H/p73S6Gfk+Iuwcq2+iIAMJUJQUc+CwMFFCplQ1BUeiD+nn 5o24FXF9Krcbw8w5lZCfPVPSh0GYTvNMaj1VWjEQFU4j0rCOiJ+UVckpgJ4MRrxI MbKJ8srGLSJRnCHM2syQC0Zq/2iwRuZY7zWXABEBAAG0EVdoYXRzdXA1NiA8YUBi LmM+iQE4BBMBAgAiBQJRiACFAhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAK CRBioWhoc3JRsCrhB/9M2AptCTjyitpQR1ZnqwFop/NDdOIY1DtERkyQKfbHftzK 5I/LI3wxP5rhts2NY/EMVl8ziJVZ7h0J9japkoia8uOYX9Un6aMasHM0PH7Mln2K 936BeoZDQbPQV8NOCyNT4lMNt7Ajd+6GJcmAIduPmUi6xjgge716MhQlTBg5HG 94ZJT3Xm7W9tuIiJh8H9Dkr60F9UuwtIPfKPEeXyxUI25fZAQ+nyVz39ap2fjyeW EYMB6y90zxWjFPiFfpx+BfcWOmzHaXkps/bG6kSbOcVn9UJS32C0JyIFmfa96N6H +tSmk+WW98u5dSBzhIoYYiXxWPihJDOjTCUYkFC9uQENBFGIAIUBCADrkKs31LOL 4MQ6fdzhw2MvTI8zDad2bJZCd/+Gf8yGTNKhagJIHo8KEuCDINydQXHCt+aNKZZ7 d/QG09nABaybZJfqf1ffOiD5L1PivcKJMdJNozNuIhWxc4E35A7c/wCPJdDOBV0v eqf57illUo+yz7CKfyO088BYMGTrBRi/ifqmPyMuYzzC4SZcx1MJFU1mzONYU1r0 ZYj0eeKdRrbHPfJUAWQUr6MteMvJp5g8JfyYC+Th+zASEYRRfs3I52rsLb1hpxoi 87xUK89xoXdg4uLysz1Iy/PhGjmtbi61sZCv1oh+o9biNsy9zIjqwhCW7oMPwmJ6 Szh2nNTMCuNFABEBAAGJAR8EGAECAAkFAlGIAIUCGwwACgkQYqFoaHNyUbBKWAf5 AbYVbQVRNYVw5pR6+NDLw1qxlafGz/7j6YnApif0vuVzBEE9aFOUdxfKyIy+Ka8l NYjoAItym2mDTsRZqJwEm1FPbmVFu7WPAnnmn1ECyHBSV0vnJjCL5qkoMx9d/EHs WBW7htnRVtbuJEzVZzzSfddjWEYXGqYcqocebBwQpNgdfuQrHadAbkSmDwLfz+KD r17m1i9sUej8hiFLr64XGau7nl2l+iRMR2vTcVpNZDTJa/t4JlrwMINR95ORo3ze bRVKbedZIn3ifeSzyWDTsScvkNVAe4dovATaHWU/+tkNgL4ECI1UNS8XYsGqWe+r pbfj19eRRPAc4lbNfLlUKQ== =aq6t -----END PGP PUBLIC KEY BLOCK----- edit : Fixed a few typos.Reorganized chapters using roman letters.
Note: In ~/.biblepaycore/biblepay.conf add daemon=1 and txindex=1 Note: > /dev/null 2>&1 will capture both STDOUT (1) and STDERR (2) and send them to /dev/null Auto Remove index.pid if indexing is complete
#!/bin/bash fname="/home/biblepay/exploretmp/index.pid" if [[ -f "$fname" ]]; then pid=$( /dev/null r=$? echo $r if [ $r -eq 0 ]; then exit 1 else rm $fname fi fi
Bitcoin URI Whitelisting, I/O Agenda Hints, a Dedicated Voice Input Key, Tweaks to the Screenshot Notifications, an Extended Changelog for the Beta Channel, and some Bookmark Bubble Polish.
Hey all, It's time for round two. This post includes my latest round of findings over the past two days. Just like last time, I'll share the summaries here and include a link for more information. Bitcoin is an increasingly popular digital currency. Recently the Bitcoin URI Scheme was officially whitelisted in the HTML5 spec, which puts it on stage with other schemes like "mailto", "irc", and "webcal". A patch has been submitted to officially sync the approval with Chrome and Blink as a registerProtocolHandler. [Read the full post here.] This was first noticed by Dinsan Francis of Chrome Story, and François Beaufort also covered it here. The Google I/O Agenda was made available, and I highlighted the Chrome sessions that might be of interest to you. [Read the full post here.] The forthcoming Chrome OS virtual keyboard will have a dedicated voice input key. It appears to use the Web Speech API (called via webkitSpeechRecognition in common.js) which is well known for recognized text appearing almost immediately while speaking (instead of waiting for you to finish speaking, then generating the text). [Read the full post with pretty icons here.] The new screenshot notification seems to be pretty popular with users, but not everyone wants or needs a notification. As a result of user feedback there have recently been two core changes to the new screenshot notification: the ability to disable the notification and a change to how notifications are stacked. [Read the full post here.] Extended Changelog: May 1, 2013 - Beta Channel Update Spoiler: There's nothing interesting. Seriously, there's all of 3 things worth mentioning and they're all related to bug fixes. [Read the full post here.] Not all changes are major overhauls of a primary app's interface, sometimes it can as subtle as adding a separator on a single menu. This Chrome OS and Linux/Gtk specific change only adds a small separating line to the bookmark bubble. It separates the "Other bookmarks" selection from the "Choose another folder" selection. [Read the full post with screenshots here.] That's all for today. Any thoughts on how my titles can be made less complex and ugly?
/usr/share/icons/ typically contains pre-installed themes (shared by all users) ~/.icons/ typically contains folders with the themes installed by the user. Also, many applications have their icons in /usr/share/pixmaps/ or in the folder with the same name as the application under /usr/share/... How to assign special folder icons in XFCE? Ask Question Asked 8 years ago. Active 7 years, 2 months ago. Viewed 7k times 5. I inadvertently deleted my Pictures folder on my linux box running XFCE / Thunar and, after restoring from the trash bin, the folder icon ... OS X will open a Finder window for you to drag Bitcoin Core to your Applications folder. Bitcoin Core GUI. The first time running Bitcoin Core, Max OS X will ask you to confirm that you want to run it: You will be prompted to choose a directory to store the Bitcoin block chain and your wallet. Unless you have a separate partition or drive you want to use, click Ok to use the default. Bitcoin ... Bitcoin 2 integration/staging tree. Contribute to BITC2/bitcoin2 development by creating an account on GitHub. Skip to content. Sign up ... new bug introduced in v.2.3 that caused some users to be unable to sync from scratch past the genesis block on at least Linux 64-bit systems with the v.2.3 wallet and just reported a segmentation fault when trying to launch it on a fresh installation ... Enjoy endless creative control of your icons in SVG, webfont, and raster formats.
In this video, I'm going to show you how to start mining Bitcoin on Linux/Debian based operating systems. https://bitcoinminingsoftware2019.com/bitcoin-minin... Ubuntu -2 Setting up .bitcoin folder Commands, cd ~/ mkdir .bitcoin cd .bitcoin nano bitcoin.conf server=1 daemon=1 testnet=0 rpcuser=UNIQUE_RPC_USERNAME rpcpassword=UNIQUE_RPC_PASSWORD. Then you're gonna want to open the litecoin-0.8.7.2-linux folder 4. Click on bin, then chose 32 or 64 (depending on your computer) 5. Click on litecoin-qt, That's it! Your LTC wallet should appear ... How to change what folders look like. This video is unavailable. Watch Queue Queue YouTube Recommends Bitcoin Linux Scam? ----- Watch out! Keep you eyes peeled for YouTube channels that try to scam you, they can look very convincing! I visited the website so don't have to and it ...