Skip to main content

Posts

Showing posts from 2017

Bitcoin, Ethereum, Ripple, Litecoin, STEEM and other cryptocurrencies after six months of growth 2017

If you're investing in crypto currencies for the last six months, your portfolio might be in double, triple or maybe flat. Last June 15, 2017 the value of Bitcoin (BTC) is only $2385 per token and I thought it is too expensive to invest. The Ethereum (ETH) is at $328.22, Ripple (XRP) for $0.258851, NEM for $0.186179, Ethereum Classic (ETC) for $17.30, Litecoin (LTC) for $28.58, Dash for $155.37, IOTA $4.1e-07, BitShares for $0.302266, and Stratis (STRAT) for $7.41.

They are the Top 10 Cryptos at that time. See the chart below to see the rest of Top 20 crypto currencies.Fast forward December 1, 2017, we have a new Top 10 crypto currencies. The value of Bitcoin is $10,648.40 last time I checked, it also reached the $11K per token. Many became millionaire for year 2017 because of Bitcoin. The Ethereum (ETH) hold the second place for $459.58. The break away Bitcoin Cash (BCH) at 3rd place, $1,434.31 per token bumping down Ripple (XRP) for $0.254984 which is a flat investment so far. D…

All your wireless belong to us - Hacker

If you haven't read the news about all WPA2 protocol is vulnerable.

CERT Coordination Center (CERT/CC) has released information on Wi-Fi Protected Access II (WPA2) protocol vulnerabilities. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. The vulnerabilities are in the WPA2 protocol, not within individual WPA2 implementations, which means that all WPA2 wireless networking may be affected. Source: Vulnerability Note VU#228519

It is a vulnerability attacking all modern Wireless Access Point that use WPA2 protocol to exploit clients connected on the wireless network. Exploiting this vulnerability requires the following: Programming skills to run against the key reinstallation attacks (Kracks), currently the proof of concept script is not (yet) available to the public.The attacker needs to be close to the WAP, know the SSID which is broadcasting by default.Clone the wireless network and create a rouge channel.Forwarding traffic to the …

QUE.com - Equifax Data Breach. WTF?

My expectation for Equifax and other credit reporting bureaus is high to protect our personal information e.g. Names, Social Security Number, Birthdates, Addresses, and in some cases Drivers License. These information are very important and needed to open a credit card account, get a car loan, and obtain a mortgage. Guess what, those information are stolen about 143 Million Americans, almost half of US Population. This was discovered between mid May to July 29, but only announced last Thursday September 7, 2017.

This was acknowledged and announced by Rick Smith, Chairman and CEO of Equifax posted a video at their website https://www.equifaxsecurity2017.com.

How to check if your personal information is potentially impacted. If you're using a credit card, have a car loan or a mortgage most likely you're one of the 143 million Americans.

Visit their official Cybersecurity Incident consumer information website: https://www.equifaxsecurity2017.com.

Click on "CHECK POTENTIAL IM…

QUE.com Inforgraphic - History of Bitcoin

New to Bitcoin? You're lucky day, here's an infographic to easy learn about the History of Bitcoin.Infographic by Fried.com

In addition. On July 20, 2017, the bitcoin miners voted, 97% in favor, on the Bitcoin Improvement Proposal (BIP) 91. The proposal, by Bitmain Warranty engineer James Hilliard, was to activate Segregated Witness (SegWit). Some members of the bitcoin community felt that adopting BIP 91 without increasing the block-size limit would simply delay confronting the issue and that it favored people who wanted to treat bitcoin as a digital investment rather than as a transactional currency. They announced implementation of Bitcoin Cash as a hard fork for August 1. It inherited the transaction history of the bitcoin currency on that date, but all later transactions were separate. Block 478558 was the last common block and thus the first Bitcoin Cash block was 478559. Bitcoin Cash wallet started to reject BTC block and BTC transactions since 13:20 UTC, Aug 1st 2017 b…

HOWTO - Active Directory Services not needed in Windows 10 Pro?

We are using Office 365 Cloud services for at least 5 years and the benefits is no way close to compare managing your own services e.g. Active Directory (AD), Exchange Server, SharePoint and File Server. My Office 365 users are more secure thanks to the Multi-Factor Authentication feature, where you can use your smart phone to receive a six pin codes to complete your identification and authentication process. The latest version of Windows 10 Pro, also give you the option to login using your username and password you use with Office 365 or other business services from Microsoft e.g. Outlook.com, XBOX, etc. You still have an option to configure your workstation using the Active Directory. You will be able to see “Domain join instead” on the lower right corner of the screen. For this example, I will use my Office 365 username and password to setup my workstation. I enter my Office 365 username e.g. email address em@que.com, click Next to continue. The next page is to enter my password. …

EOS 1.86 Billion Estimated Market Cap but don’t offer any support. - QUE.com

If a company is a 1.86 Billion estimated market cap you expect some type of customer service but not EOS. Visiting their website Block.One and you will find their team members but you have no way to get in touch with any of them including the CEO Brendan Bluemer, Daniel Larimer, and others. They have a contact form but no feedback since I tried multiple times requesting for assistance.

I need assistance from any of them because I've sent all my EOS to their address.

I accidentally sent all my 569.399 EOS to their EOSCrowdsale Address (0xd0a6E6C54DbC68Db5db3A091B171A77407Ff7ccf) and requesting to send it back to me. I included the transaction information and the exact amount so they can verify it.

I've used the block.one contact form, and sent a twit to https://twitter.com/BrendanBlumer but still no reply to my request for assistance.

Where the hell are your customer support EOS or any of the management team? I'm looking forward to hear from any EOS team, if there is a team…

Block Media #2 Watch Litecoin LTC

This week open the crypto currency trades in positive lead by Litecoin at 10.01%, Dash 9.81% and Ethereum Classic 4.53% gain. Here's the Top 10 chart.
Update: June 20, 2017 Nothing special today except the trading price of Ripple $0.338896 with a 20.36% gain.

And the rest of crytocurrency trading.



Please continue at https://que.com/block-media-2-watch-litecoin-ltc/

QUE.com - My journey to Ethereum – Create your own Crypto Currency

Follow me. I'm learning Ethereum to build "unstoppable applications".
Let's have a basic understanding about Ethereum. What is a Ethereum or ether for short?. From the website "Ethereum is a decentralized platform that run smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third party interference.
These apps run on a custom built blockchain, an enormously powerful shared global infrastructure that can move value around and represent the ownership of property. This enables developers to create markets, store registries of debts or promises, move funds in accordance with instructions given long in the past (like a will or a futures contract) and many other things that have not been invented yet, all without a middle man or counterparty risk.
The project was bootstrapped via an ether pre-sale during August 2014 by fans all around the world. It is developed by the Ethereum Foundation, a Swiss nonprof…

QUE.com - The Value of Bitcoin Has Reached an All-Time High

The popular digital currency Bitcoin has been on the rise in terms of value and popularity over the last few years and it continues to gain popularity in the world of e-commerce. It’s not all rosy for Bitcoin owners right now though, as the popular digital currency has seen a massive drop in price over the last few days. Experts believe the sudden drop was because of a price correction and bitcoin owners will be hoping that’s the case so that it continues to rise in the future. However, other experts believe the drop would suggest there is a resistance in price and it’s not going to grow much in the future. The Value of Bitcoin Has Reached an All-Time High in Recent Weeks It was only two weeks back when Bitcoin was valued at over $2,700– giving it an all-time high in value. However, due to the price correction, Bitcoin has seen a drop in its value of more than $500 in just four days. Bitcoin Has Dropped in Value by Nearly $4 Billion In recent months, Bitcoin has seen a further surge in…

QUE.com - Credit Scores & Car Loans

Whether you’ve heard it once, twice, or a thousand times, the idea that your credit score affects what kind of car loan you can get is probably burned into your mind, somewhere. On the surface, it seems simple. Higher credit scores equate to better car loans, and lower ones will net you less attractive offerings. But what are the real credit score requirements for auto loans? It turns out there are some intricate factors at play, and while the conventional wisdom generally holds true, there’s some subtlety you should be aware of, especially if you’re concerned about your current score. Your Credit Score Let’s get this out the way right off the bat. Your credit score is an analysis of your credit history, represented numerically, that shows your “creditworthiness.” Lenders use this score to determine how likely you are to be able to repay your debts and whether or not they will offer you a loan. Without going too deep into the history, your credit score is based on factors like your pa…

Massive hack of another Ransomware cyber attack

WASHINGTON – The Department of Homeland Security is aware of reports of ransomware known as WannaCry affecting multiple global entities.  Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it.  Microsoft released a patch in March that addresses this specific vulnerability, and installing this patch will help secure your systems from the threat. Individual users are often the first line of defense against this and other threats, and we encourage all Americans to update your operating systems and implement vigorous cybersecurity practices at home, work, and school. These practices include:
- Update your systems to include the latest patches and software updates.
- Do not click on or download unfamiliar links or files in emails.
- Back up your data to prevent possible loss, whether you are at a family computer or company data. We are actively sharing information related to this event and stand ready to lend t…

Credit Tips: How to improve your credit score

Keys to a Higher Credit Score Credit scores provide a snapshot of your financial health. Your credit score can affect everything from credit card limits to loans to your ability to rent an apartment or buy a home. A high credit score can indicate to lenders that you are likely more credit worthy while a low credit score can suggest you may be a loan risk. How to improve your score There are a few things you can do to improve your credit score over time. Reducing your utilization percentage helps keep your credit score up. Always paying bills when they’re due, keeping a modest balance on your credit cards and paying more than the minimum due each month will help with your credit utilization. Build your score for the future | There are 4 key things you should do to grow your credit score for long term credit health. Sponsored byOutofCredit.com Credit Card Counseling 1. Pay your bills on time Paying your bills on time accounts for 35 percent of your credit score. Stay on top of your bills by…

Beware of Gmail Phishing Attack

Another day of Email Phishing Attack, this one for Gmail user’s account as the target. Last Tuesday May 3, an email phishing attack that was designed to trick users into giving up access to their Gmail accounts started showing up on target email inbox. The 1st captured image below is an example of Gmail Phishing attack email. When a user click on the “Open in Docs” link, the hacker will exploit the Gmail user’s account. But it did not stop there, this phishing attack also behave as a “worm” that also sent itself out to all the affected user’s contacts. The 2nd captured image is an example of email coming from @gsa.gov infected user’s contact. You might receive a similar email coming from different email addresses. Please note the recipient email address “hhhhhhhhhhh@mailnator.com, I hope this is enough reason not to open or read this message, delete it right away. If you clicked on the link and enter your Gmail credentials please continue to read on how to perform Google security ch…

Credit Report – Hard vs soft credit pull

I’m looking for a Mortgage Lending company to loan me money so I can purchase a small house. So, I checked LendingTree.com to give me some ideas. And one day, I received this email I guess one of their Newsletter regarding Credit Tips. “Some vital info about your credit score” and I think it is very useful to new home buyers like me. Soft pulls happen when you: Check your own score – you can do this often! It doesn’t affect your score!Get free loan offersReceive a loan pre-qualificationExperience an employer background checkReceive pre-approved credit card offers in the mailGet your LendingTree credit scoresWon’t – adversely affect your credit score Hard pulls happen when you apply for a: New credit cardHome mortgageAuto LoanRefinance of your home mortgageHome equity line of creditStore credit cardChecking or savings accountCan– lower your credit score by quite a few points What hurts your credit score the most. Multiple hard pulls over a long period Limit your hard pull credit inquiries.…

QUE.com - Decluttering Your Digital Life

I received this Friends Newsletter today from Department of Homeland Security and I think it is a very useful information to share. So here you go and I hope you find it useful as well. Start fresh this spring – online and offline. In addition to the traditional tasks on your spring cleaning list like tidying the closet and washing the windows, take time to create a “digital spring cleaning” list as well. What exactly does a “digital spring cleaning” entail? A digital spring cleaning means taking control of your digital life and the information that you share online. Similar to regular cleaning or tidying one’s home, it might seem like a daunting task at first. In reality, just a few simple steps can make a big difference in helping protect yourself online. The Department of Homeland Security recommends that you incorporate these cyber tips into your spring cleaning routine this year. Clean your machine.Update the security software on all of your devices that connect to the Internet. …

Professions Most Vulnerable to Cyber Hacks | QUE.com

Whenever you are in a profession that deals with highly confidential subject matter, you are going to be just as highly vulnerable to leaks and hacks. Sometimes, this is nefarious in nature as there are those out there who would like to be privy to the ‘secret’ details in someone else’s life and sometimes those leaks are just for the sheer fun of it by a sick mind. Anyone in the field of social work or mental health will be vulnerable to these kinds of attacks because of the very nature of what it is they do. They deal with the thoughts and emotions of other human beings who may have been victimized in the past. For this reason, the following professions should take extra precautions to guard any data entered or stored on their computers. First – A Bit of Cyber Security Advice Before talking about a few of the professions most vulnerable to cyber hacks, it might be wise to give a bit of advice on how to keep your computers as secure as possible. It is suggested that you password prote…

Vault 7: CIA Hacking Tools Revealed

If you're in Cyber Security business, you will be a lot busier for days to come securing your network and your customers. Wikileaks revealed CIA Hacking Tools. Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary co…

MutliPlayer Games - KING of Tanks

Welcome to KING of Tanks Multiplayer Game – Que.com latest game.  This will be our reference project for future KING of Tanks multiplayer game improvement. We hope you enjoy playing games with us. Keep in mind this game is FREE you don't have to pay to play. Things to remember, you can easily come back to this page by going to the following links for quick access. We want you bookmark this page :). https://que.com/tanks - Official Web Page for KING of Tanks Multiplayer Game.http://www.KINGofTanks.com - Official Domain Name donated by NeedName.comhttp://www.TankMultiplayer.com - Donated by Moscom.com continue reading at KING of Tanks Multiplayer Game web page for more information.

KING.NET Email Address

Manage your business, not your E-mail. We provides reliable uptime, global scalability, and world class security powered by Google Apps. Doing business in the computing cloud means you’re always current – no more maintenance, upgrades, security patches or hassles. You can re-allocate your in-house IT to other productive projects. Got your email @KING.NET? Please go to http://mail.king.net to login to your email address, password and your pin. For your email security, it is highly recommended that you enable the Two-Factor Authentication to access your email. Your email is accessible using the following: Any modern internet browser e.g. Internet Explorer (IE), Google Chrome, Mozilla Firefox, Safari and others.Smart Phones e.g. iPhone, Android, etc.Examples of Email Addresses to register: Please note email address @KING.NET is a premium identity for very important person like yourself. You can only get your own email @KING.NEt here. Some example of premium email address using @KING.NET Saud…

Enable 2Factor Authentication to protect your Email Account.

Retune.com - Email Security Your email address is the center of your security world. It is highly recommended that you enable Two-Factor Authentication to minimize risk of someone accessing your email through spear phishing attack, discover caches of passwords in your mailbox, and other related email attack. As an example, the attacker of DNC email uses a simple password reset request through spear phishing attack, was able to gain access to the email and password. If the Two-Factor Authentication is enabled, it will require another layer of security through verification code and stop it.


Two-Factor Authentication or 2-Step Verification adds an extra layer of security to your email account by requiring you to enter a verification code in addition to your username and password when signing into your email account. It help protect a user's account from unauthorized access should someone manage to obtain their password. Even if a password is cracked, guessed, or otherwise stolen, an at…