Monday, March 19, 2018

How to Participate in NEP-5 (Neo based ICOs/Tokensale)

Introduction


While ERC20/ERC223 (Ehereum Tokens) tokens dominate the current ICO regime. NEP-5 Neo based ICOs are catching up fast and there are quite a few good ICOs on NEO and many users struggle little bit initially on how to participate in these ICOs, I will do a small tutorial on how to get it done.


Steps



  • All you need is Neo wallet for participating, good one is neon wallet - Link


Thursday, March 15, 2018

How to Mine Safecoin - Equihash Algo

Introduction


I usually find these new coins from the bitcointalk.org and instamine potential and good coins before they go mainstream to masses (whattomine, top exchanges etc.,) likewise i have instamined Sumokoin, Signatum (scam but still got 1 BTC within a week), Denarius, Galactrum, Nihilio, LUX, FOLM...etc.,

This way you can make quick buck than falling behind ETH and fighting with increasing hashrates.

I would recommend using NVIDIA GPUs(not that i am against AMDs but ccminer usually supports nvidia and it takes time to get miners for new algo for AMDs).

There are different variants of ccminer by different developers, the top pick is ccminer by tpruvot

Tuesday, March 13, 2018

How to Add Custom Tokens to Myetherwallet (MEW)

Introduction

I am seeing lot of new users who gets into ICOs and buys tokens on DEX exchanges like idex.market, forkdelta, etherdelta were unable to find the tokens on the myetherwallet. That does not mean that tokens are not associated with your address but not configured in Myetherwallet.

Steps to Add tokens to myetherwallet


How to use Ledger Hardware wallet with Myetherwallet (MEW)


Introduction


Using hardware wallets to store your Crypto Currencies and Tokens in a harware is the safest way to manage and do the transactions since the private keys never ever leaves these devices. My top pics are (i am personally using Ledger Nano S, as the new firmware allows me to use 18 Apps :P)


Steps to access myetherwallet using Ledger


How to create Ethereum Address in Myetherwallet (MEW)

Recommendation


First of all, I would recommend using Ledger/Trezor hardware wallets for storing your Crypto Currencies and Tokens since the private keys never leave the hardware wallets

Introduction


Friday, January 30, 2015

GHost Vulnerability and its mitigation using RunDeck

At 8KMiles we always thrive to simplify the complex process and procedures, likewise we have come up with a simple solution to fix the GHost vulnerability which has affected millions of Linux systems across the globe. Applying patch to an single server is a cakewalk however consider patching hundreds and thousands of servers.

Monday, November 24, 2014

Mount CD | Create ISO | Mount ISO in Linux

I am posting after a long time, since i became busy with my tough work schedule but wanted to share something. So i am writing a small article which some may find boring but newbies to Linux need to know about this basic functionality. The below steps will work in most of the Linux distributions

- Mounting a CD in Linx
- Create ISO Image from the CD
- Mount the ISO Image in Linux


Monday, October 13, 2014

Apache as a Reverse Proxy for Tomcat and JBoss - Simple Steps

Article to explain how to configure Apache Web Server as a reverse proxy for a single or multiple application servers. I assume that Apache Tomcat or Jboss is already installed and serving on the port 8080 or any other port of your choice.




Thursday, October 09, 2014

Installing and Configuring SQUID Proxy in 5 Minutes

This article is based on RHEL/CentOS operating Systems, Squid Proxy Server can run on Ubuntu and Windows as well and the configurations are similar.

Ok! let get done in 5 minutes.....


Internet of Things: Experts predict first online murder before end of 2014

We are living in an era where most of the devices we interact with daily connect us to the world wide web. This has led many in the developed world to lives of convenience and ease. However, this very feature of devices being connected all the time, opens digital natives up to a whole plethora of cyber attacks.