Jump to content

buzzkillb

Moderators
  • Content Count

    453
  • Joined

  • Last visited

  • Days Won

    89
  • Feedback

    N/A
  • BF$

    1,180 [ Donate ]

Everything posted by buzzkillb

  1. An example of why running an FS is worthwhile. Someone staked some longterm FortunaStake collateral, and a lucky FS received 199 D in one shot. Lucky lucky and why you want these always running. https://chainz.cryptoid.info/d/block.dws?3462533
  2. A bit curious about how these guys do it. What's GPC?
  3. How to update keepkey firmware in Windows. If you don't have a keepkey, use Carsen's referral link and go buy one https://amzn.to/2CUvQvk Download the updater - https://beta.shapeshift.com/updater-download# Run and wait for No Device Connected screen. Plug in keepkey, click Update Now. Select your option. Mine is new so This Keeykey is New. Unplug the keeykep, plug it back in while holding down the button. Hold down the button. Looks like this on device. Hold the button down until that arrow on the keepkey itself turns into a checkmark. On reconnect the bootloader will update. Hold down button and reconnect. Now time to update firmware. Click Update Now. Hold down the button again and wait for the checkmark, do not unplug yet. Unplug the keeykep and plug back in. And now its all updated. Reconnect while holding the button down to check firmware. All done.
  4. In this example the idea is to run Iquidus Block Explorer with the daemon and traefik for reverse proxy all using a single docker-compose. Hopeful if anyone else tries this they come up with some better configs for the whole thing. I am going to use Ubuntu 20.04 as the example since its latest and greatest. We will be using Denarius docker daemon - https://github.com/buzzkillb/denariusDocker/tree/iquidus Iquidus D-Explorer - https://github.com/buzzkillb/D-explorer Iquidus Docker - https://github.com/buzzkillb/iquidusdocker Install Docker and Docker Compose #Install Docker sudo apt install docker.io sudo systemctl enable --now docker sudo usermod -aG docker SOMEUSERNAME docker --version #Install docker-compose sudo apt install docker-compose docker-compose version I would reboot at this step and make sure docker is still working. 20.04 has been a bit glitchy for me. If docker stops running, this fixed it. rm /etc/docker/daemon.json service docker restart systemctl status docker.service If you are using cloudflare, my traefik isn't setup correctly to use Cloudflare proxy and get the letsencrypt TLS certs once proxied. Will update once I get that config working. Make your .conf file in ~/.denarius/denarius.conf (switch this for your coin, the guide is tailored to Denarius, but should be an easy swap). denarius.conf (note daemon=0 for the docker daemon I built) - based on the docker hub image https://hub.docker.com/r/buzzkillb/denariusd iquidus branch/tag. rpcuser=rpcuser rpcpassword=aLongPasswordLikeThis rpcport=32369 port=33369 daemon=0 listen=1 server=1 txindex=1 rpcallowip=* At the your home folder clone the explorer. cd ~ git clone https://github.com/buzzkillb/iquidusdocker explorer cd explorer 2 things to change, go to your explorer folder inside explorer and switch logo.png to your coin logo, and edit settings.json to your coin. That's it. sample settings.json /* This file must be valid JSON. But comments are allowed Please edit settings.json, not settings.json.template */ { // name your instance! "title": "D-Explorer", "address": "https://explorer.example.com", // coin name "coin": "Denarius", // coin symbol "symbol": "D", // logo "logo": "/images/logo.png", // favicon "favicon": "public/favicon.ico", // Uses bootswatch themes (http://bootswatch.com/) // Valid options: // Cerulean, Cosmo, Cyborg, Darkly, Flatly, Journal, Lumen, Paper, // Readable, Sandstone, Simplex, Slate, Spacelab, Superhero, United, Yeti // theme (see /public/themes for available themes) "theme": "Cyborg", // port to listen for requests on. "port" : 3001, // database settings (MongoDB) "dbsettings": { "user": "", "password": "", "database": "explorerdb", "address": "mongodb", "port": 27017 }, //update script settings "update_timeout": 10, "check_timeout": 250, "block_parallel_tasks": 1, // wallet settings "use_rpc": true, "wallet": { "host": "denarius", "port": 32369, "username": "rpcuser", "password": "aLongPasswordLikeThis" }, // confirmations "confirmations": 10, // language settings "locale": "locale/en.json", // menu settings "display": { "api": true, "markets": true, "richlist": true, "twitter": true, "facebook": false, "googleplus": false, "youtube": false, "search": true, "movement": true, "network": true }, // index page (valid options for difficulty are POW, POS or Hybrid) "index": { "show_hashrate": true, // Show Market Cap in header "show_market_cap": false, // Show Market Cap in place of price box "show_market_cap_over_price": false, "difficulty": "Hybrid", "last_txs": 100, "txs_per_page": 10 }, // ensure links on API page are valid "api": { "blockindex": 1337, "blockhash": "000000000661c86bf89e652eb142093bd9123006f3085595dee183bfe1c24570", "txhash": "776684cfd496890268805a1d86d3fd00f4097c1dbffecc3acd79101c15216594", "address": "DABQj7yoQuvfxVVWMf2mqWhoHLDMUqUJsc" }, // market settings //supported markets: bittrex, poloniex, yobit, empoex, bleutrade, cryptopia, ccex //default market is loaded by default and determines last price in header "markets": { "coin": "D", "exchange": "BTC", "enabled": ["tradeogre"], "tradeogre_id": "BTC-D", "default": "tradeogre" }, // richlist/top100 settings "richlist": { "distribution": true, "received": true, "balance": true }, // movement page settings // min amount: show transactions greater than this value // low flag: greater than this value flagged yellow // high flag: greater than this value flagged red "movement": { "min_amount": 100, "low_flag": 1000, "high_flag": 5000 }, // twitter, facebook, googleplus, youtube "twitter": "denariuscoin", "facebook": "yourfacebookpage", "googleplus": "yourgooglepluspage", "youtube": "youryoutubechannel", //genesis "genesis_tx": "c6d8e8f56c25cac33567e571a3497bfc97f715140fcfe16d971333b38e4ee0f2", "genesis_block": "00000d5dbbda01621cfc16bbc1f9bf3264d641a5dbf0de89fd0182c2c4828fcd", //heavy (enable/disable additional heavy features) "heavy": false, //disable saving blocks & TXs via API during indexing. "lock_during_index": false, //amount of txs to index per address (stores latest n txs) "txcount": 100, "txcount_per_page": 50, //show total sent & received on address page (set false if PoS) "show_sent_received": true, // how to calculate current coin supply // COINBASE : total sent from coinbase (PoW) // GETINFO : retreive from getinfo api call (PoS) // HEAVY: retreive from heavys getsupply api call // BALANCES : total of all address balances // TXOUTSET : retreive from gettxoutsetinfo api call "supply": "GETINFO", // how to acquire network hashrate // getnetworkhashps: uses getnetworkhashps api call, returns in GH/s // netmhashps: uses getmininginfo.netmhashpsm returns in MH/s "nethash": "netmhashps", // nethash unitd: sets nethash API return units // valid options: "P" (PH/s), "T" (TH/s), "G" (GH/s), "M" (MH/s), "K" (KH/s) "nethash_units": "G", // Address labels // example : "JhbrvAmM7kNpwA6wD5KoAsbtikLWWMNPcM": {"label": "This is a burn address", "type":"danger", "url":"http://example.com"} // label (required) = test to display // type (optional) = class of label, valid types: default, primary, warning, danger, success // url (optional) = url to link to for more information "labels": { // "DDD6SzCwXSEcTPHmNwEQX6xbUs2Rf3svNX": {"label": "Cryptopia address", "type":"primary", "url":"http://disney.com"}, // "JSWVXHWeYNknPdG9uDrcBoZHztKMFCsndw": {"label": "Cryptsy"} } } Go back to the main explorer directory and edit docker-compose.yml version: "3" services: traefik: image: "traefik:v2.2" command: #- "--log.level=DEBUG" - "--api.insecure=true" #change to false in production - "--api.dashboard=true" #change to false in production - "--providers.docker.exposedbydefault=false" - "--entrypoints.web.address=:80" - "--entrypoints.websecure.address=:443" - "--certificatesresolvers.myresolver.acme.tlschallenge=true" #- "--certificatesresolvers.myresolver.acme.caserver=https://acme-staging-v02.api.letsencrypt.org/directory" - "[email protected]com" - "--certificatesresolvers.myresolver.acme.storage=/letsencrypt/acme.json" ports: - "80:80" - "443:443" - "8080:8080" volumes: - "./letsencrypt:/letsencrypt" - "/var/run/docker.sock:/var/run/docker.sock:ro" restart: always denarius: image: buzzkillb/denariusd:iquidus volumes: - ~/.denarius:/data ports: - 33369:33369 - 32369:32369 restart: unless-stopped explorer: build: ./explorer stdin_open: true tty: true ports: - 3001:3001 links: - mongodb - denarius depends_on: - mongodb - denarius command: /bin/bash -c "service cron start && cd /opt/iquidus && npm start" labels: - "traefik.enable=true" - "traefik.http.routers.explorer.rule=Host(`explorer.example.com`)" - "traefik.http.routers.explorer.entrypoints=websecure" - "traefik.http.routers.explorer.tls.certresolver=myresolver" - "traefik.http.services.explorer.loadbalancer.server.port=3001" - "traefik.http.middlewares.explorer_redirect.redirectscheme.scheme=https" - "traefik.http.routers.explorer_insecure.rule=Host(`explorer.example.com`)" - "traefik.http.routers.explorer_insecure.entrypoints=web" - "traef[email protected]docker" mongodb: image: mongo:latest container_name: "mongodb" environment: - MONGO_DATA_DIR=/data/db - MONGO_LOG_DIR=/dev/null volumes: - ./data/db:/data/db ports: - 27017:27017 command: mongod --bind_ip 0.0.0.0 --logpath=/dev/null --quiet --wiredTigerCacheSizeGB 2 restart: unless-stopped Now run docker-compose cd ~/explorer docker-compose up -d And that's about it. Check 127.0.0.1:3001 or your domain. Traefik reverse proxy will automatically pull in letsencrypt TLS certs for you, will also redirect http to https, and generally keep everything up. Traefik once setup is much more clean than using an Nginx reverse proxy. Plus the letsencrypt TLS certs are taken care of automagically so no more certbot cronjobs. This example also shows how to send traffic to port 3001. This block explorer runs heavy, so I doubt this will work on a typical single CPU, 2gb VPS. Anytime you make a change to settings.json, rebuild like this cd ~/explorer docker-compose down rerun docker-compose build docker-compose up -d Build this locally first in a VM, and check it works. Also 127.0.0.1:8080 is the traefik dashboard. I would turn this off in the main docker-compose.yml on the VPS/server itself once ready to setup. While waiting for the full sync, the whole thing starts to go wild using up memory. Quick bash script to restart every 30min to cut down on potential crashing. saveram.sh #!/bin/bash while true; do docker-compose down && docker-compose up -d sleep 1800 done Example site I am syncing before I move to a VPS and different domain. https://explorer.denarius.guide/
  5. How to boot from Raspberry Pi4 USB 3.0 SSD. This is a lot easier than it looks, just read through one time to see. I am bypassing installing the OS on an SDCARD to purely update the eeprom, seems like a huge waste of time when it can just be flashed in seconds from a basically blank SDCARD. For this you need, pi4, sdcard, ssd drive, connector for usb 3.0. What I used: Raspberry Pi4 4gb (handy with the hdmi adapter, proper plug, and case/fan) Samsung (MB-ME32GA/AM) 32GB 95MB/s (U1) microSDHC EVO Select Memory Card with Full-Size Adapter (something cheap if you don't have 1, only to flash firmware) Kingston 240GB A400 SATA 3 2.5" Internal SSD SA400S37/240G - HDD Replacement for Increase Performance StarTech.com SATA to USB Cable - USB 3.0 to 2.5? SATA III Hard Drive Adapter - External Converter for SSD/HDD Data Transfer (USB3S2SAT3CB), Black First I am using Windows 10 for this, the steps are basically same for whatever OS. Format your SDCARD to fat32, get bootloader and unzip the files to that drive. bootloader here -> https://github.com/raspberrypi/rpi-eeprom/blob/master/releases.md Under USB MSD Boot find latest, for this guide its this one https://github.com/raspberrypi/rpi-eeprom/files/4781199/rpi-boot-eeprom-recovery-2020-06-15-vl805-000137ad-BETA.zip Unzip that to the root directory of the fresh formatted SDCARD. Insert SDCARD into pi4, and wait a bit for the green light to flash, about 10-15 seconds, powered back on hooked to monitor and it just worked. That's the first part which now makes the PI4 able to boot from the blue USB 3.0 ports. Now hook up your SSD Drive and SATA adapter to your PC. Get Raspberry Pi Imager - https://www.raspberrypi.org/downloads/ Windows - https://downloads.raspberrypi.org/imager/imager.exe macOS - https://downloads.raspberrypi.org/imager/imager.dmg Ubuntu - https://downloads.raspberrypi.org/imager/imager_amd64.deb Run this and select 32-bit and write. To run Headless: Remove the drive and insert back in. Click into the drive and stick a blank ssh file in. For wifi you want to put a wpa_supplicant.conf file in there. wpa_supplicant.conf country=US ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev update_config=1 network={ ssid="NETWORK-NAME" psk="NETWORK-PASSWORD" } Looks like this when done. With or without headless: The next step is to get the latest .elf and .dat files into the root directory of the SSD drive. So make sure after flashing the SSD to unplug and plug back in for Windows to see the new filesystem. https://github.com/raspberrypi/firmware Click clone, then download zip. Double click that downloaded zip and go to the boot directory. Copy the .elf and .dat files to your SSD root directory. At the time of this guide that's 16 files you end up replacing. Now put your SSD/SATA into the pi4 USB 3.0 (blue port) and boot up. The first part will show resizing the drive, the pi4 will then reboot again and go into the OS. The ssh file will allow us to SSH into the headless unit, wpa_supplicant.conf should allow wifi if you aren't using an ethernet cable. Tips: I used a split side by side 4k monitor for this, don't do that as if the pi4 detects weird resolutions, it won't work right. 64-bit Raspberry Pi OS VNC server does not work at the moment, use 32-bit for now. After installed run benchmarks. Nench - Overall Benchmarks https://github.com/n-st/nench (wget -qO- wget.racing/nench.sh | bash; wget -qO- wget.racing/nench.sh | bash) 2>&1 | tee nench.log Raspberry Pi Diagnostics - SD Card Speed Test Click Pi (top left corner) -> Accessories -> Raspberry Pi Diagnostics -> Run Tests After the test runs -> Show Log Test : SD Card Speed Test Run 1 prepare-file;0;0;304818;595 seq-write;0;0;319687;624 rand-4k-write;0;0;71859;17964 rand-4k-read;54979;13744;0;0 Sequential write speed 319687 KB/sec (target 10000) - PASS Random write speed 17964 IOPS (target 500) - PASS Random read speed 13744 IOPS (target 1500) - PASS Test PASS
  6. Stranger Things 3: The Game free until July 2, 2020. https://www.epicgames.com/store/en-US/product/stranger-things-3-the-game/home
  7. AER Memories of Old free until July 2, 2020. https://www.epicgames.com/store/en-US/product/aer-memories-of-old/home
  8. To make the user passwordless like typical, not sure when this changed. Use this https://www.reddit.com/r/Qubes/comments/e39r8l/ubuntu_1804_lts_template_password/ dom0 terminal (change xenial desktop and newpassword) qvm-run -a --user root xenial-desktop "echo \"user:newpassword\"|chpasswd" dom0 terminal qvm-run -a --user root xenial-desktop "sudo usermod -a -G sudo user" shutdown your xenial-desktop and now try sudo apt update
  9. To use sudo https://www.qubes-os.org/doc/templates/minimal/ example in dom0 qvm-run -u root <vm-name> xterm like qvm-run -u root denarius-crypto xterm
  10. Stalling out on make qubes-vm? make: *** [Makefile:227: app-linux-pdf-converter-vm] Error 1 I had an issue with this package not working so I removed it like this. https://github.com/QubesOS/qubes-app-linux-pdf-converter cd qubes-src rm -rf app-linux-pdf-converter cd .. make qubes-vm make template
  11. 2GB of ram is not enough to run this. What ends up happening is the daemon and electrumx server go into swap and start glitching out heavily. Contabo at 5 euro with 4 cores, 8gb ram is a great test VPS for this.
  12. Say you see a coin's promotional materials for an ICO and want to archive that as they change their specs on the fly, leading up to their mainnet release. How would someone go about this? Denarius has a great feature built into the wallet called Proof of Data which will hash the file. Along with this a user can upload that file directly to IPFS for archiving purposes. The POD then would act as showing that uploaded file is the same unchanged file. Lets begin with an example of how to do this. https://www.ghostbymcafee.com/ It's been a while since I have seen a countdown timer on a mainnet release, so I was curious what they are offering. Reading both PDF's being offered shows something isn't right. What are the odds they change this after they got everyones' money upfront before the timer counts down to release? Who knows, so lets archive now and find out later. https://www.ghostbymcafee.com/pdfs/Ghost_by_McAfee_Litepaper_v1.0.1.pdf First I download the Lite Paper. Then I go to the proof of data tab in the QT wallet, Select File, enter narration and then click Create Timestamp. On success we get a Denarius address as the POD file hash. D address: DHe18hHTHtQKbe5h8vTZ1xpPMZvx7zfYL8 tx hash: bc574da851172857377146c9cfcd4ebb5cb5ea1508e678bc67587a7cba42a585 Then go over to the Jupiter Tab and select the same file. I want to POD the IPFS upload as that timestamps when I archived this into IPFS itself. After paying a small fee we get all the rest of the information. IPFS CID/Hash: QmSJeCZdffCqyG133MHt3JGqRrn2pSV4YraYfw6DU4SFqe Denarius Jupiter POD Address: DH9Gr5HxHDgvsJc4dhVsaNnSEkTRXwS535 Denarius Jupiter POD Transaction ID: 8a2b52571140b5cccdfacb48f5bb12d0a718a0966213695b02c2e702a3aa58c7 Can then click on View Upload file on Infura to get the Link, pretty neat. https://ipfs.infura.io/ipfs/QmSJeCZdffCqyG133MHt3JGqRrn2pSV4YraYfw6DU4SFqe Let me add the details from the 2nd PDF. https://www.ghostbymcafee.com/pdfs/Ghost_by_McAfee_Whitepaper.pdf D address: DJAzjVvgfHyaP3UAHS4SA6eWGkeYFqWeUW tx hash: e2f878428ee5217b4020de39961b5da0882155b9293720439b99d809dfd27f67 IPFS CID/Hash: QmR8FpPLzTZzYcbpyHL7nsiyLdp5dLJj8Z9t5Caf5zE2Dm Denarius Jupiter POD Address: D89F1AjQDTtgSs8HU3e5fmxLGwsGfzRPBb Denarius Jupiter POD Transaction ID: 1661258c6c85536168828cce7aa73bcbc682f52e17b31e10474ce61cbc62fcbe https://ipfs.infura.io/ipfs/QmR8FpPLzTZzYcbpyHL7nsiyLdp5dLJj8Z9t5Caf5zE2Dm I will leave it up to the user why I am showing this and comparing to 2 pieces of ICO material together showing different coins.
  13. I still do not understand how 1 container can be used and also compact the database. When electrumx is stopped, the container shuts down. If anyone knows please let me know. How to getinfo from the command line outside of the docker container. docker exec -it electrumx /electrumx/electrumx_rpc getinfo Or get into the container itself and run commands. docker exec -it electrumx sh Add a peer docker exec -it electrumx /electrumx/electrumx_rpc add_peer "electrumx1.denarius.pro v1.15 s110 t"
  14. I really like this guide I found so just rewriting pieces of it and adding some more stuff. Very good blog so check it out. https://tech.aufomm.com/2020/04/16/deploy-wordpress-with-docker-and-traefik-2/ Install Docker and docker-compose. Then we want to generate a hashed password for the traefik panel. sudo apt-get install apache2-utils then we get the user:hashedpassword like this htpasswd -nbB <USER> "<PASSWORD>" example for the above htpasswd -nbB admin "StrongPasswordHere" Copy somewhere to use for setting up traefik shortly. Start setting up the system. touch docker-compose.yml mkdir data mkdir data/configurations touch data/traefik.yml touch data/acme.json touch data/configurations/dynamic.yml chmod 600 data/acme.json ~/docker-compose.yml edit traefik.yourdomain to whatever subdomain you want to use to access the control panel like traefik.example.com version: '3.3' services: traefik: image: traefik:latest container_name: traefik restart: always security_opt: - no-new-privileges:true ports: - 80:80 - 443:443 volumes: - /etc/localtime:/etc/localtime:ro - /var/run/docker.sock:/var/run/docker.sock:ro - ./data/traefik.yml:/traefik.yml:ro - ./data/acme.json:/acme.json # Add folder with dynamic configuration yml - ./data/configurations:/configurations networks: - proxy labels: - "traefik.enable=true" - "traefik.docker.network=proxy" - "traefik.http.routers.traefik-secure.entrypoints=https" - "traefik.http.routers.traefik-secure.rule=Host(`traefik.yourdomain`)" - "[email protected]" - "[email protected]" networks: proxy: external: true ~/data/traefik.yml update your email address below. api: dashboard: true entryPoints: http: address: ":80" http: redirections: entryPoint: to: https https: address: ":443" http: middlewares: - [email protected] tls: certResolver: letsencrypt providers: docker: endpoint: "unix:///var/run/docker.sock" exposedByDefault: false file: filename: /configurations/dynamic.yml certificatesResolvers: letsencrypt: acme: email: [email protected] storage: acme.json keyType: EC384 httpChallenge: entryPoint: http buypass: acme: email: [email protected] storage: acme.json caServer: https://api.buypass.com/acme/directory keyType: EC256 httpChallenge: entryPoint: http ~/data/configurations/dynamic.yml in the users: line change to your user:hashedpassword copied earlier # Dynamic configuration http: middlewares: secureHeaders: headers: frameDeny: true sslRedirect: true browserXssFilter: true contentTypeNosniff: true forceSTSHeader: true stsIncludeSubdomains: true stsPreload: true stsSeconds: 31536000 user-auth: basicAuth: users: - "admin:$apr1$tm53ra6x$FntXd6jcvxYM/YH0P2hcc1" tls: options: default: cipherSuites: - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 minVersion: VersionTLS12 Now make a directory like ~/blog or ~/wordpressblog or something where your wordpress data folder will be stored. I will use ~/blog since that's pretty simple to type. ~/blog/docker-compose.yml version: '3.7' services: db: image: mariadb container_name: wp-db volumes: - db-data:/var/lib/mysql networks: - default restart: always environment: MYSQL_ROOT_PASSWORD: supersecretpassword MYSQL_DATABASE: db MYSQL_USER: dbuser MYSQL_PASSWORD: dbpassword wordpress: depends_on: - db image: wordpress:latest container_name: wordpress environment: WORDPRESS_DB_HOST: db:3306 WORDPRESS_DB_NAME: db WORDPRESS_DB_USER: dbuser WORDPRESS_DB_PASSWORD: dbpassword volumes: - ./wp-data:/var/www/html networks: - proxy - default restart: always labels: - "traefik.enable=true" - "traefik.docker.network=proxy" - "traefik.http.routers.wordpress-secure.entrypoints=https" - "traefik.http.routers.wordpress-secure.rule=Host(`blog.yourdomain`)" # - "traefik.http.routers.wordpress-secure.service=wordpress-service" # - "traefik.http.services.wordpress-service.loadbalancer.server.port=80" volumes: db-data: name: wp-db-data networks: proxy: external: true Change the passwords and usernames to whatever you want. And also change blog.yourdomain to example -> blog.example.com The above will store your wordpress data folder in the same docker-compose.yml folder. The trick to adding a second wordpress is make another folder like ~/blog2 and stick the same docker-compose.yml in. Then modify the container names, user, passwords, the volumes: / db-data: / name to the new container name. And then modify this line per wordpress. - "traefik.http.routers.wordpress-blog2-secure.rule=Host(`blog2.example.com`)" Now to spin everything up. Go back to your ~/ directory and type docker-compose up -d We get a network error like this. docker-compose up -d ERROR: Network proxy declared as external, but could not be found. Please create the network manually using `docker network create proxy` and try again. Start the network. docker network create proxy Run docker-compose again to start traefik. docker-compose up -d Now try your traefik subdomain. Then spin up your docker-compose.yml in the blog folder. docker-compose up -d And that's it.
  15. Pathway free until June 25, 2020. https://www.epicgames.com/store/en-US/product/pathway/home "Explore the strange unknown with Pathway, a strategy adventure set in the 1930s great wilderness. Unravel long-forgotten mysteries of the occult, raid ancient tombs and outwit your foes in turn-based squad combat!"
  16. To see the coinage, which is an estimate of how much a FortunaStake would get from staking I setup this site. https://pos.watch/coinage/ A user can input their address and find what they can stake.
  17. Anyone who is running a FortunaStake or who is thinking of buying 5000 Denarius coins should look into some other mechanisms built into the coin. Mainly being able to stop the FortunaStake from running whenever the user wants, and can immediately stake the 5000 Denarius coins. In this example I will use 180 days of running 1 FortunaStake. https://pos.watch/ is a site that shows some quick stats on Staking and FortunaStake rewards. Inputting 5000 into the top box shows under the Staker how much the 5000 Denarius coins will make off of a stake if the user was to stake daily, monthly or yearly. Monthly this becomes quite a bit. But staking daily, the user misses out on the FortunaStake rewards themselves. Also if say I stake 5000 D, the user FortunaStake has a chance of getting the FortunaStake reward above. If I was to stake my 5000 Denarius coins once a month, someone on the FortunaStake list running their masternode would have a chance at getting 8.25 Denarius coins. Lets look at the second box down. This breaks it out a bit more for someone running a FortunaStake, 5000 Denarius coins collateral. Input 1 into the box for ONE FortunaStake (masternode). Daily rewards at first glimpse look small, but we can also take the Stake FortunaStake (6% APR) into this. If the user was to break their collateral every 30 days, they would get 16.52 extra Denarius coins monthly, on top of the Daily D rewards. To better show why the user would want to break their Fortunastake to stake every once in a while throughout the year, I created a mermaid chart and flow chart to show how the rewards work over time. https://denarius.wiki/staking/table/ and https://denarius.wiki/staking/workflow/ The chart above shows if the user was to stake one time over 365 days, or 2 times over 365 days. With all of this in mind, how does the user Stake their FortunaStake collateral? This is very easy. Go to your hot wallet, which is your wallet holding the 5000 Denarius coins. Always backup any files you change into a .bak or something easy to remember. Open up fortunastake.conf that was setup, and delete the single line you want to stake. Stop and start the wallet, and the 5000 Denarius coins will stake after a few minutes if the 5000 D has been running for a few days. Give it some time so that stake has 30 confirms, then send 5000 D to a new address and redo the deleted line, and change the TXID and index in fortunastake.conf. Save, restart wallet, and start-alias after 500 confirms. And the user now has a lot of extra Denarius coins, which can also now stake. This becomes very easy and quick to do after doing this monthly.
  18. Was getting back into mining, and looking through the ann's constantly for anything interesting to mine. Came across Denarius which had a lot of people attacking it and became intrigued. Went into the Gitter at the time and saw some big names of crypto in chat. A community like that days into release is something to always follow. 3 years!! DNkF6hSqAJw2egmcACyQ6maSvgPU6RZJYD
  19. Ark: Survival Evolved free until June 18, 2020 on Epic Games. https://www.epicgames.com/store/en-US/product/ark/home
  20. Decided to try out Pfsense to compare to the Ubiquiti USG with VLAN's. Pfsense seems a bit easier, but a few more steps to setup. With that in mind I wanted to see how to VLAN a Proxmox Container. I am using a small celeron - 2 Intel NIC mini PC for Pfsense, a Ubiquiti Edgeswitch 24, and for Proxmox - Threadripper 16core on an x399 motherboard with 2 Intel NICS. I think you want 2 NICS for Proxmox, and a managed switch. First setup the VLAN on Pfsense. I am calling mine DockerProxmox and using vlanid 600. Go to Interfaces -> VLANs click Add and change to something like below Parent Interface is your LAN, VLAN tag is 600, Description Docker Proxmox. LAN is important and the rest is up to you. Go to Interfaces -> Assignments and find the one at the bottom, your new VLAN and click Add. Then Click OPT or whatever the Description is. Once you click Description change the fields below. Pick an IPv4 address for the new subnet, I chose 192.168.60.1 Go to Services -> DHCP Server and find your new VLAN at the top and click that. We now want an IP range to hand out. I like to choose between 100-200 like below. Go to Firewall -> Rules. A quick firewall rule to to allow traffic and also block traffic to the rest of the network which will look like this. Allow All Rule Block LAN Rule Then go into your Switch to configure the Tag Port, this is going to vary but here's an example on my Port 20. So you already have Proxmox setup with a static IP on one of the NICS. Now lets use the 2nd NIC to bring the VLANs through. The above shows I have my management Proxmox port on 19, and the 2nd VM NIC will be in Port 20. This is the goal of what we are about to change. enp4s0 is plugged into port 19 like normal and was setup through Proxmox as vmbr0 when I setup the server. So then I would click create Linux Bridge and make a vmbr1 with VLAN aware and bridge port of the other NIC, enp6s0 like this. Now create a container using vmbr1 and use VLAN ID of 600 or whatever number you used and the container will get the new IP range from DHCP and can't ping any other IP's outside of the range. On the Container creation, it would look like this for Network tab. For DNS tab, I am using my pihole IP address which I made 2 separate rules for, otherwise I could not get out to the internet because of the above rules and basically blocking my pfsense IP. Looks like this below. Eventually would tune everything down to correct ports only, so I am not passing everything to the pihole. Or just use 8.8.8.8 or whatever you use in the DNS tab. And a successful ping to google.com so big brother knows we are here, but can't ping internal network. Good enough for a somewhat quick Pfsense VLAN into a Proxmox Container to start locking things down.
  21. Download Thaiphoon Burner freeware edition, its basically free for this. http://www.softnology.biz/files.html Download DRAM Calculator https://www.techpowerup.com/download/ryzen-dram-calculator/ Open Thaiphoon Burner and click Read, then select one of your RAM slots. Pick one of your ram slots here. After you read the slot, then select Report. In Report, scroll all the way down and click Show delays in nanoseconds. Then click Export. Click Complete HTML Report, and save this somewhere easy to find. Open up DRAM Calculator and Import XMP using that Complete HTML Report file. With the RAM settings imported, now click Calculate SAFE or Calculate FAST. I am selecting SAFE. Now I have a good starting point for my BIOS, as I am currently having issues getting 3200 4x16GB working on my x570 Asus TUF Wifi motherboard.
  22. Installed QubesOS on my Surface Pro 2017 to an external hard drive. Was able to use the stock Debian 10 template with snap enabled inside the template, and then run dPi in an AppVM. Takes a few extra steps,as Qubes is ram heavy and Surface is ram limited, but basically works.
  23. Overcooked free on Epic Games until June 11, 2020. https://www.epicgames.com/store/en-US/product/overcooked/home
  24. How to whitelist and blacklist domains using wildcards to pick up their subdomain using https://pi-hole.net/ An example blacklisting a basic twitter.com and subdomains. And you get this. also blocking giphy for their GIF tracking. Whitelist blockforums.org And you get this
×
×
  • Create New...