Bitcoin Forum
January 07, 2026, 10:48:12 AM *
News: Due to a wallet-migration bug, you should not upgrade Bitcoin Core. But if you already did, there's no need to downgrade.
 
   Home   Help Search Login Register More  
Pages: « 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 [173] 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 ... 293 »
  Print  
Author Topic: ★★ [ANN] ECCoin (ECC) ★★★ ECCoin - Green Future FORK FIXED UPGRADE NEEDED  (Read 342510 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
bumblebee33
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
April 16, 2014, 05:56:08 AM
 #3441


I recommend going with The Poolest ECC Pool or ipominer.com ECC Direct Mining Port.

You won't have any problems with Lost Coins, Consistent Payments, or Scams.

The Poolest ECC Pool was down a few times the last few days, but other than that they pay out in time, and have a nice interface.
copychicken
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1000

Pools Of Honor


View Profile
April 16, 2014, 05:56:22 AM
 #3442

we dont need him.. giving him a second chance? for what?? the moment you get hacked.. of something like that..
just tweet it... and dont turn the hashing power of the pool in doge or ltc or whatever...

And i dont think someone sane..would use tha same password on a pool...
I am trying for two weeks to make a pool just for fun and i cant managed it... i always get stuck at the beggining (wallet installing)
But the funny thing is that most of the times the whole proccess ask you for big strong random code streams...
Even for the database.. so i dont think someone would use the same password..

if people where allowed to vote they would totally dismiss him..

and he wants 120 million?? ahahahah!! nice joked... it made my gpus chill abit...


 
 
 
 
██████████████████████████████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████▄▄▄███████████████████████
███████████████████████████████████████████████████████████████████████▀▀▀████████████████████████
██████████████████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████████████████████████████████
 
 



...INTRODUCING WAVES........
...ULTIMATE ASSET/CUSTOM TOKEN BLOCKCHAIN PLATFORM...






ficklepickle
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile WWW
April 16, 2014, 06:00:58 AM
 #3443

At this stage in altcoin history no one knows what is going to happen but one thing I know is that a strong community will be the foundation of any successful cryptocurrency.

In these final days of POW mining let's make sure we don't destroy the community over a single individual.   

copychicken
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1000

Pools Of Honor


View Profile
April 16, 2014, 06:11:57 AM
 #3444

https://i.imgur.com/35JGgUJ.jpg

this is my transaction list fron coins4everyone... the site is laggy sometimes.. but so far i dont think anything happened.


 
 
 
 
██████████████████████████████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████▄▄▄███████████████████████
███████████████████████████████████████████████████████████████████████▀▀▀████████████████████████
██████████████████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████████████████████████████████
 
 



...INTRODUCING WAVES........
...ULTIMATE ASSET/CUSTOM TOKEN BLOCKCHAIN PLATFORM...






xref
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
April 16, 2014, 06:25:22 AM
 #3445

This is not a healthy conversation.
and its will only harm the coin
hostmaster (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile WWW
April 16, 2014, 06:34:21 AM
Last edit: April 16, 2014, 06:46:15 AM by hostmaster
 #3446

If any pool has a current problem report me so i can update OP.

hostmaster (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile WWW
April 16, 2014, 06:51:58 AM
 #3447

Only left 4 days to PoS Kicks in.
goldmaxx
Hero Member
*****
Offline Offline

Activity: 894
Merit: 1000



View Profile
April 16, 2014, 07:12:14 AM
 #3448

Please read this little article i wrote...

https://asktom.cf/index.php?topic=572787.0

Good luck guys, it's time to get ready for some action  Smiley

matoy
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile WWW
April 16, 2014, 07:26:35 AM
 #3449

yesterday succesfully setup okaypool. Get any emails, still getting payments in my wallet. All working good. This pool is NOT A SCAM

coins4everyone. I mined on this pool two weeks from beggining and don't have any problem with it.

Hi,

I can confirm that our frontend at coins4everyone is being DDOS for more than 24hours now.
Our frontend is very laggy; we tried many tweaks, our mitigation system can't beat the attack so i guess we just have to wait for the sucker stopping his bloody attack.

anyway, the good news is that i can certify to all of our (loyal) miners:
if you are mining at our pool and have a wallet address and autopayout set, everything is working fine. Your earned coins are send to your personnal wallet as usual.
if you did not set autopayout, just wait for the end of the ddos so our frontend is available and you'll be able to do the manual payout without any problem.

it's just our frontend which encounters DDOS problems, the stratum is working like a charming (strictly 0 interruption since EC Coin launch).

I'm not really aware of the current EC situation with some scam pools and ddos to multiple pools, anyway this situation is quite funny since our pool's hashrate has been multiplied by 3 even being DDOSed (150MH/s currently).


Hash with us and mine fresh coins @ http://www.coins4everyone.com
matoy
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile WWW
April 16, 2014, 07:28:40 AM
 #3450

https://i.imgur.com/35JGgUJ.jpg

this is my transaction list fron coins4everyone... the site is laggy sometimes.. but so far i dont think anything happened.

i confirm!
True: our frontend is being DDOSed
But more important stratum and payouts are still working perfectly and never ceased to.

Happy mining.

Hash with us and mine fresh coins @ http://www.coins4everyone.com
matoy
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile WWW
April 16, 2014, 07:33:58 AM
 #3451

yeah, did that too, a couple of times…entered pin to allow edits, entered pin (later) to initiate manual payment, entered pin (later) to change pin.  All options indicated that an email to complete the authorization was triggered, with nothing.  Also, I initiated 3 emails to "contact" indicating issues, with nothing sent back?

I have mined many other pools, and no the drill…have successfully done this a dozen times.

Something is not right with OKAYPOOL :-(

okaypool autopayment is working fine for me.  I just set it up this morning.


Unfortunately, for me, it's not.  I have to move off, leaving my half a million coins behind?! 

Does anyone have another pool they can recommend?

Thx

I will tell you to AVOID coins4everyone pool.
that pool will give you gray hair!

what a very constructive and well explained reply...

I'm very interested to know which pool's stratum has been up 100% of the time since launch... and sure our pool is in that list!
The frontend getting ddosed by some sucker is not so dramatic: people having autopayout are getting their coins and the others will do manual payouts when the attack is finished.

happy mining.

Hash with us and mine fresh coins @ http://www.coins4everyone.com
coinmixerr
Newbie
*
Offline Offline

Activity: 23
Merit: 0


View Profile
April 16, 2014, 07:47:19 AM
 #3452

Hello. Got some problems with changing withdraw adress on okaypool - no email on my mail to confirm.
Sent 2 mails to devs, no answer. Any ideas?
Ivy-Team
Member
**
Offline Offline

Activity: 82
Merit: 10


View Profile
April 16, 2014, 07:52:59 AM
 #3453

are there some  free give away coins to get?

Free Distribution 50,000,000 VPNCOIN !!! Vv5pnQGbErbMAE8AovDsyN6tKzyaTmcjeu[/color]
hostmaster (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile WWW
April 16, 2014, 07:56:25 AM
 #3454

are there some  free give away coins to get?
http://ecoiner.org/ecc/facebook-giveaway-2-000-000-ecc-win-1602/ 5000 ECC
hostmaster (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile WWW
April 16, 2014, 07:59:46 AM
Last edit: April 16, 2014, 08:18:31 AM by hostmaster
 #3455

for the pools under ddos, i share with you some tricks

Use cloudflare's "I'm under attack mode"

This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache)
When cloudflare cache it's zero effect on your servers.

You can dedect attacked urls in google analytics, live stats :-)

I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.

Longest attacks last 4.5 days in records in very rare situations. So no worry much.
matoy
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile WWW
April 16, 2014, 08:26:15 AM
 #3456

for the pools under ddos, i share with you some tricks

Use cloudflare's "I'm under attack mode"

This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache)
When cloudflare cache it's zero effect on your servers.

You can dedect attacked urls in google analytics, live stats :-)

I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.

Longest attacks last 4.5 days in records in very rare situations. So no worry much.

hi. thanks for the feedback.
does the cloudflare free plan is enough?
because the free plan doesn't seem to support mitigation attacks protection; this is what we would need Sad

Hash with us and mine fresh coins @ http://www.coins4everyone.com
hostmaster (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile WWW
April 16, 2014, 08:31:18 AM
 #3457

for the pools under ddos, i share with you some tricks

Use cloudflare's "I'm under attack mode"

This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache)
When cloudflare cache it's zero effect on your servers.

You can dedect attacked urls in google analytics, live stats :-)

I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.

Longest attacks last 4.5 days in records in very rare situations. So no worry much.

hi. thanks for the feedback.
does the cloudflare free plan is enough?
because the free plan doesn't seem to support mitigation attacks protection; this is what we would need Sad
Free plan has "i am under attack mode". All you need to open it. Also you have 3 page rules limit to put so you can full cache attacked urls.  if attacker attacks more than 3 urls at port:80 and at the same time then you will need 20 dollars plan which goes up to 20 page rules. In most case free plan will be more than enough. :-)

To make attack influence even less, just learn first the attacked url(s) from google analytics, then put simple html file there and let cloudflare cache it.

Also nginx is much resistance to attacks then apache. you can block with nginx attackers traffics (those mainly has no user agent) so you put rule in nginx to deny bad visits without correct user agent.
matoy
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile WWW
April 16, 2014, 09:00:37 AM
 #3458

for the pools under ddos, i share with you some tricks

Use cloudflare's "I'm under attack mode"

This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache)
When cloudflare cache it's zero effect on your servers.

You can dedect attacked urls in google analytics, live stats :-)

I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.

Longest attacks last 4.5 days in records in very rare situations. So no worry much.

hi. thanks for the feedback.
does the cloudflare free plan is enough?
because the free plan doesn't seem to support mitigation attacks protection; this is what we would need Sad
Free plan has "i am under attack mode". All you need to open it. Also you have 3 page rules limit to put so you can full cache attacked urls.  if attacker attacks more than 3 urls at port:80 and at the same time then you will need 20 dollars plan which goes up to 20 page rules. In most case free plan will be more than enough. :-)

To make attack influence even less, just learn first the attacked url(s) from google analytics, then put simple html file there and let cloudflare cache it.

Also nginx is much resistance to attacks then apache. you can block with nginx attackers traffics (those mainly has no user agent) so you put rule in nginx to deny bad visits without correct user agent.

wow you are a life saver!! Smiley
i never configured the "page rules" settings in cloudflare and thought the free plan was a crap.
i just added a page rule according to the requests made by the attackers and cloudflare seems to do his work well from now on.

-> our frontend is now accessible again Smiley
-> http://ecc.coins4everyone.com

if only we had this solution at the beginning of the attack and better when we've been DDOS a few days after launch, for sure we'll have been one of the biggest EC pool.

thank you anyway!!!

Hash with us and mine fresh coins @ http://www.coins4everyone.com
matoy
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile WWW
April 16, 2014, 09:08:54 AM
 #3459


-> Come on to http://ecc.coins4everyone.com!


Our pool is UP and RUNNING
Our stratum has been up 100% of the time since launch!


To get plenty of EC Coins, just point your miners to:
Stratum: stratum+tcp://ecc.eu.stratum.coins4everyone.com
Port: 3469
Algorithm: scrypt
Username: Weblogin.Worker
Password: Worker Password
and then relax... We take care of the rest!

Benefits of Mining @ coins4everyone.com:
* based in Europe
* incredible uptime
* fast dedicated servers w/redundancy, tripple layer DDoS protection
* only 1% fee
* pplns
* nice & caring support
* trustworthy & skilled admins

Come on, we need more hash power, point your miners to our pool and let’s spread hashrate! ;-)

Hash with us and mine fresh coins @ http://www.coins4everyone.com
hostmaster (OP)
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250


View Profile WWW
April 16, 2014, 09:13:11 AM
 #3460

for the pools under ddos, i share with you some tricks

Use cloudflare's "I'm under attack mode"

This does'not help over 30k botnets then you full cache the attackers url. (use cloudflare full cache)
When cloudflare cache it's zero effect on your servers.

You can dedect attacked urls in google analytics, live stats :-)

I had to deal in the past so many ddoser... Port 80 attackers is a piece of cake.

Longest attacks last 4.5 days in records in very rare situations. So no worry much.

hi. thanks for the feedback.
does the cloudflare free plan is enough?
because the free plan doesn't seem to support mitigation attacks protection; this is what we would need Sad
Free plan has "i am under attack mode". All you need to open it. Also you have 3 page rules limit to put so you can full cache attacked urls.  if attacker attacks more than 3 urls at port:80 and at the same time then you will need 20 dollars plan which goes up to 20 page rules. In most case free plan will be more than enough. :-)

To make attack influence even less, just learn first the attacked url(s) from google analytics, then put simple html file there and let cloudflare cache it.

Also nginx is much resistance to attacks then apache. you can block with nginx attackers traffics (those mainly has no user agent) so you put rule in nginx to deny bad visits without correct user agent.

wow you are a life saver!! Smiley
i never configured the "page rules" settings in cloudflare and thought the free plan was a crap.
i just added a page rule according to the requests made by the attackers and cloudflare seems to do his work well from now on.

-> our frontend is now accessible again Smiley
-> http://ecc.coins4everyone.com

if only we had this solution at the beginning of the attack and better when we've been DDOS a few days after launch, for sure we'll have been one of the biggest EC pool.

thank you anyway!!!
Ok enjoy, If you buy 20 dollars plan you can update full cached page every 20 minutes (more often) so it'll be more live page...
Pages: « 1 ... 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 [173] 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 ... 293 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!