Author

Topic: NXT :: descendant of Bitcoin - Updated Information - page 2010. (Read 2761645 times)

full member
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
just added a way to get information on an alias:

http://22k.io/ALIAS/info

For example: http://22k.io/acct22k/info

Once I get all the aliases and accounts indexed, I'll be able to show what account owns an alias. From there, if the same account registers an alias containing contact info using a standardized tag, theoretically it could work like whois.



full member
Activity: 126
Merit: 100
From my IT guy:

DDoS Deflate is a  bash shell script which purpose is blocking a denial of service attack.

the following installation guide is about cent os .

How to install

1. Login to Cent OS as root
2. run terminal
3. run the following commands
a. "wget http://www.inetbase.com/scripts/ddos/install.sh"
b. "chmod 0700 install.sh"
c. "./install.sh"


Configure

After installing the script the following directories and files
will be created

program directory =/usr/local/ddos
program =/usr/local/ddos/ddos.sh
ignore_ip_list=/usr/local/ddos/ignore.ip.list
cron (scheduller) =/etc/cron.d/ddos.cron
apf ( advanced policy firewall) =/etc/apf/apf
ipt (iptables) =/sbin/iptables

edit configuration file

run the following command on terminal
cd /usr/local/ddos
vi ddos.conf
( to edit the file with vi editor just type "i" , when finished  press escape then ":" "w" "q" and enter )

Configuration file settings

Freq= ( how often the script is executed in minutes )
Ddos - cron ( cron sceduller update )
No_of_connections ( number of connections received before an IP is blocked )
Apf_ban ( 1 means that it will use apf , 0 it will use iptables )
Ban_period ( time in seconds to block an IP )
Email_to ( address to send an email when an IP is blocked )
Kill ( when value is 0 no IP is banned )


In case you get blank IP edit the main script ddos.sh and replace

"netstat -ntu | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort -nr > $BAD_IP_LIST"

with this one

"netstat -ntu | grep ‘:’ | awk ‘{print $5}’ | sed ‘s/::ffff://’ | cut -f1 -d ‘:’ | sort | uniq -c | sort -nr > $BAD_IP_LIST"
( be sure to keep the command in a single line )


Uninstall  DDos Deflate

1. Login to Cent OS as root
2. run terminal
3. run the following commands
a. "wget http://www.inetbase.com/scripts/ddos/uninstall.sh"
b. "chmod 0700 uninstall.sh"
c. "./uninstall.sh"


can you verify with your IT guy how that DDOS prevention works?  Cause Im not certain yet if that will help us, as I thought the DDOS we were seeing was a specialized protocol that worked well above OSI layers 4/5.  I thought the DDOS attacks we were seeing were well into the cient protocol operation.  IF that is the case then Im not sure this DDOS thing you have will help.

Can an expert who has analyzed the DDoS attacks comment here?  Please let us know what your IT guy says.  If this is viable then we all really need to go figure out how to make this work on our particular distros on our VPSs

Yes I would like to know this as well. If if does, I can deploy it on my VPSs
sr. member
Activity: 952
Merit: 253
Just got this sending a transaction - transaction appears ok in my list so hope it gets confirmed - but here is the error list I got when I posted it.

2013-12-30 17:18:59.443:WARN:oejs.ServletHandler:qtp1596783631-1809: /nxt
java.lang.IllegalStateException: WRITER
   at org.eclipse.jetty.server.Response.getOutputStream(Response.java:931)
   at Nxt.doGet(Unknown Source)
   at javax.servlet.http.HttpServlet.service(HttpServlet.java:687)
   at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
   at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:696)
   at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1568)
   at org.eclipse.jetty.servlets.DoSFilter.doFilterChain(DoSFilter.java:457)
   at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:326)
   at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:299)
   at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1539)
   at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:524)
   at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:143)
   at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:568)
   at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:221)
   at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1110)
   at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:453)
   at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:183)
   at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1044)
   at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141)
   at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:199)
   at org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:109)
   at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:97)
   at org.eclipse.jetty.server.Server.handle(Server.java:459)
   at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:280)
   at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:229)
   at org.eclipse.jetty.io.AbstractConnection$1.run(AbstractConnection.java:505)
   at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:607)
   at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:536)
   at java.lang.Thread.run(Thread.java:744)

newbie
Activity: 29
Merit: 0
Does anyone know if we're still set to gain additional features at block 30,000?
full member
Activity: 238
Merit: 100
From my IT guy:

DDoS Deflate is a  bash shell script which purpose is blocking a denial of service attack.

the following installation guide is about cent os .

How to install

1. Login to Cent OS as root
2. run terminal
3. run the following commands
a. "wget http://www.inetbase.com/scripts/ddos/install.sh"
b. "chmod 0700 install.sh"
c. "./install.sh"


Configure

After installing the script the following directories and files
will be created

program directory =/usr/local/ddos
program =/usr/local/ddos/ddos.sh
ignore_ip_list=/usr/local/ddos/ignore.ip.list
cron (scheduller) =/etc/cron.d/ddos.cron
apf ( advanced policy firewall) =/etc/apf/apf
ipt (iptables) =/sbin/iptables

edit configuration file

run the following command on terminal
cd /usr/local/ddos
vi ddos.conf
( to edit the file with vi editor just type "i" , when finished  press escape then ":" "w" "q" and enter )

Configuration file settings

Freq= ( how often the script is executed in minutes )
Ddos - cron ( cron sceduller update )
No_of_connections ( number of connections received before an IP is blocked )
Apf_ban ( 1 means that it will use apf , 0 it will use iptables )
Ban_period ( time in seconds to block an IP )
Email_to ( address to send an email when an IP is blocked )
Kill ( when value is 0 no IP is banned )


In case you get blank IP edit the main script ddos.sh and replace

"netstat -ntu | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort -nr > $BAD_IP_LIST"

with this one

"netstat -ntu | grep ‘:’ | awk ‘{print $5}’ | sed ‘s/::ffff://’ | cut -f1 -d ‘:’ | sort | uniq -c | sort -nr > $BAD_IP_LIST"
( be sure to keep the command in a single line )


Uninstall  DDos Deflate

1. Login to Cent OS as root
2. run terminal
3. run the following commands
a. "wget http://www.inetbase.com/scripts/ddos/uninstall.sh"
b. "chmod 0700 uninstall.sh"
c. "./uninstall.sh"


can you verify with your IT guy how that DDOS prevention works?  Cause Im not certain yet if that will help us, as I thought the DDOS we were seeing was a specialized protocol that worked well above OSI layers 4/5.  I thought the DDOS attacks we were seeing were well into the cient protocol operation.  IF that is the case then Im not sure this DDOS thing you have will help.

Can an expert who has analyzed the DDoS attacks comment here?  Please let us know what your IT guy says.  If this is viable then we all really need to go figure out how to make this work on our particular distros on our VPSs
legendary
Activity: 1540
Merit: 1016
can someone explain why my online wallet not syncing, its syncing to the latest block when i open it but when i leave it open for like 3h it is still at same block???

 can someone plz help me i have read several different guides but it is still not working
Do u use 0.4.7e?
legendary
Activity: 1190
Merit: 1001
I think for the whole system to work, there has to be a tax against money not put into circulation. Cfb , is it possible to design such a scheme?

Not after Mixing is implemented.

You won't get any results with this. You can just move your funds to another account you own.

I think the right direction is lowering fees nearly 0, so if someone wants to hoard is ok, but he won't see his stack grow significally.

In my opinion protecting the network is enough reward for all of us holding NxT, no need of extra fees.
full member
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
Code:
[2013-12-30 16:56:13.621] 15: java.lang.NullPointerException

Getting loads of these.... ideas for debugging?
full member
Activity: 238
Merit: 100
Hey CfB, regarding that account# 100000 sitting there with 10M NXT in it... It seems to me that since that account doesn't yet have a public key floating around for it, then my thinking is that to crack it,  the keyspace to crack for is not 2^256, but merely 2^64, right?  Dont we only have to construct a passphrase that ends up having zeros in only the first 64bits of the long form 256bit account ID?Huh

BRB gonna fire up my vanity account generator.....

Right. But there are only 100K, not 10M. Though when u manage to find the key it will be worth billions of USD, so JUST DO IT!

Please pm me the account number. I will crack it.
http://localhost:7874/nxt?requestType=getBalance&account=100000 and you only need to crack for the 1st 14 digits of a candidate shortform/visible account ID to be zeros.

But I think I may have been wrong on the keyspace part.  Is it 2^64 or is it 2^(256-64) I cant think right now.

Regardless of all that, can someone explain how the first 64bits of a 256bit long account# is translated into the "shortform" or visible ID we see as 20digits?  I cant figure out that math in my head either.  Is it some kind of weird BCD?
sr. member
Activity: 569
Merit: 250
can someone explain why my online wallet not syncing, its syncing to the latest block when i open it but when i leave it open for like 3h it is still at same block???

 can someone plz help me i have read several different guides but it is still not working
full member
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
That weird format:  https:\/\/vircurex.com\/welcome\/index?referral_id=667-22323 is OK - there's no error here. This is JSON format.

I tried nxt:vircurex in firefox and it works as it should, what output do you get?

It will not forward me to the URL. It just stays at nxt:vircurex and the webpage opens up all messed up.

If your add-on is working, then it is ALL GOOD!!!   Grin  ...I wanted to give you a heads up just in case...

Test works: http://22k.io/vircurex
legendary
Activity: 1498
Merit: 1000
From my IT guy:

DDoS Deflate is a  bash shell script which purpose is blocking a denial of service attack.

the following installation guide is about cent os .

How to install

1. Login to Cent OS as root
2. run terminal
3. run the following commands
a. "wget http://www.inetbase.com/scripts/ddos/install.sh"
b. "chmod 0700 install.sh"
c. "./install.sh"


Configure

After installing the script the following directories and files
will be created

program directory =/usr/local/ddos
program =/usr/local/ddos/ddos.sh
ignore_ip_list=/usr/local/ddos/ignore.ip.list
cron (scheduller) =/etc/cron.d/ddos.cron
apf ( advanced policy firewall) =/etc/apf/apf
ipt (iptables) =/sbin/iptables

edit configuration file

run the following command on terminal
cd /usr/local/ddos
vi ddos.conf
( to edit the file with vi editor just type "i" , when finished  press escape then ":" "w" "q" and enter )

Configuration file settings

Freq= ( how often the script is executed in minutes )
Ddos - cron ( cron sceduller update )
No_of_connections ( number of connections received before an IP is blocked )
Apf_ban ( 1 means that it will use apf , 0 it will use iptables )
Ban_period ( time in seconds to block an IP )
Email_to ( address to send an email when an IP is blocked )
Kill ( when value is 0 no IP is banned )


In case you get blank IP edit the main script ddos.sh and replace

"netstat -ntu | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort -nr > $BAD_IP_LIST"

with this one

"netstat -ntu | grep ‘:’ | awk ‘{print $5}’ | sed ‘s/::ffff://’ | cut -f1 -d ‘:’ | sort | uniq -c | sort -nr > $BAD_IP_LIST"
( be sure to keep the command in a single line )


Uninstall  DDos Deflate

1. Login to Cent OS as root
2. run terminal
3. run the following commands
a. "wget http://www.inetbase.com/scripts/ddos/uninstall.sh"
b. "chmod 0700 uninstall.sh"
c. "./uninstall.sh"

sr. member
Activity: 308
Merit: 250
That weird format:  https:\/\/vircurex.com\/welcome\/index?referral_id=667-22323 is OK - there's no error here. This is JSON format.

I tried nxt:vircurex in firefox and it works as it should, what output do you get?

It will not forward me to the URL. It just stays at nxt:vircurex and the webpage opens up all messed up.

If your add-on is working, then it is ALL GOOD!!!   Grin  ...I wanted to give you a heads up just in case...

The web page opens up though? And it's not an issue with your webpage? How is it supposed to look like?
sr. member
Activity: 336
Merit: 250
AKA jefdiesel
Hey CfB

 how about some thoughts on blocks not forging? I have 280k and have attempted to keep myself logged in for the last two weeks. there have been overnight crashes and freezes, but my countdown timer keeps ticking, but never gets to zero. I have forged two blocks in two weeks, when according to my calculations it should be every 4000 minutes, but it never happens.
 I'm showing a week since I earned a fee 7213693579568855752 my account is 15436509232181115695
 I understand it's not going to make me rich, but I wonder if there is something I can do to improve this

thanks
rb2
newbie
Activity: 28
Merit: 0
Is it correct that the password to access an account is limited to 100 characters?
I have an account password with more than 100 characters, does it mean only the 100 first chars are used?
hero member
Activity: 644
Merit: 500

Hey pal. Why don't you try to earn an honest living, instead of trying to steal bitcoins with this hoax?

let him be....we need jokers around at times  Cheesy
Hahaha, exactly. Every thread needs pocket troll.
hero member
Activity: 910
Merit: 1000
Just a quick suggestion / reminder (https://nextcoin.org/index.php/topic,840.msg6875.html#msg6875) for marketing purposes:

Wouldn't it be useful and naturally understandable, if we would use the following wording pattern for Nxt:

- Nxt
- Nxt coins
- Nxt messaging
- Nxt ...


Colored coins are called "NXT colored coins". Is this a temporary name for it or why do we call it "NXT colored coins" but normal coins just "NXT"?
sr. member
Activity: 308
Merit: 250
For those that use Firefox, please install this extension and test it out:

http://nxtra.org/alias/NxtAliasSystem.xpi (don't bother downloading if you are not using firefox).

This extension enables nxt aliases in the firefox browser.

You will be able to type nxt:google and be redirected to google.

This is the real-world application of the Nxt alias sytem.

I'm trying to do something similar for Chrome too.

Please let me know if this is working for you.

Donations appreciated: 3209075099254042753

Does anyone have any idea why...

https://vircurex.com/welcome/index?referral_id=667-22323 was changed to...

https:\/\/vircurex.com\/welcome\/index?referral_id=667-22323 when I assigned the alias Vircurex?   Huh

http://en.wikipedia.org/wiki/Escape_sequences


Hey wesleyh... you should look into the issue above.

I tried the alias Vircurex with the other two proposed methods and your Chrome version and it is taking me to the correct URL.

For some reason your Firefox add-on probably does not read the weird format of the assigned URI and will create problems for those that are trying to use it.
`
That weird format:  https:\/\/vircurex.com\/welcome\/index?referral_id=667-22323 is OK - there's no error here. This is JSON format.

I tried nxt:vircurex in firefox and it works as it should, what output do you get?
full member
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
Cfb,
when connect to a publicly accessible node

node.ip:7875/nxt?requestType=getState

doesn't work - I get

{"errorCode":7,"errorDescription":"Not allowed"}

even if i log in with a passphrase..

Is this by design or am I doing something wrong?
Ian


That node doesn't allow outside connections. You try http://22k.io/publicnode.
legendary
Activity: 1092
Merit: 1010
Jump to: