command line - Change folder permissions and ownership

XinFin Network Presents One-Click Installer For Blockchain Node Setup

XinFin Network Presents One-Click Installer For Blockchain Node Setup
XinFin invites its existing as well as new global users to set-up masternode using one-click installer function, and make an impact in the world of decentralized trade and finance.
Blockchain is a revolutionary technology that is re-defining an inevitable component of our lives, finance. It has always been debated that the world’s financial system is due for a massive upgrade in terms of trust, transparency, accountability, and most importantly decentralization. Bitcoin, the earliest and the most successful chain supports over 8,000 nodes while Ethereum has about 25,000 nodes. Most of the nodes run by these ecosystems are mining nodes that participate in decentralization and distribution of the network.
Setting up Nodes
Nodes are a necessary component when it comes to becoming a part of the blockchain ecosystem and connecting to the world of decentralized finance, also maintaining the ownership of one’s own data and funds, at the same time.
For Blockchain to reach its full potential, it is necessary to make it simple so that any common person can understand it and can run his own node.This would enable the common men (without much technical knowledge) to control their own data and finances.
Considering that, in; not a very distant future, a household fridge will successfully track the available home food supplies and will make decisions automatically, interacting with the food supply chain, at the same time. It will automatically settle accounts and access external finance using its in-built wallet. It wouldn’t be wrong to say, we are heading towards a future of one blockchain node per household. Seeing the current scenario where every household has a minimum of one computer chip, one blockchain node per household isn’t much of an overwhelming prediction.
Scalability comes with innate simplicity and the purpose of this article is to make things so simple that someone with an average intelligence also finds it easy to set up a node.
At XinFin (eXchange inFinite), our vision is not to reinvent the wheel or compete with any other network (whether legacy, centralized or decentralized), but fine-tune the work already being done in the blockchain industry so that it finds its use in the real world on a day-to-day basis. At the same time, making it interoperable to achieve a use case that runs on the fundamentals of blockchain-something that is still not fully achieved. Yes, you guessed it right!! Decentralized trade and finance.
One-Click Installer from XinFin
XinFin developer community has been working tirelessly to make XinFin tech simpler and to make it easily accessible to masses. We are happy to present a multi-platform one-click installer that makes setting up a node seamlessly easy.
XinFin invites you to join the Bounty Program and run masternode on XinFin TestNet called apothem.network.
Let’s have a look at how to set up a XinFin one-click installer.
Setting up XinFin One-Click Installer
1) Download the one-click installer: https://xinfin.org/setup-masternode.php (This option is available for Windows and Linux O/s.)

https://preview.redd.it/nqp7ikh61ry21.png?width=800&format=png&auto=webp&s=a2c5291b73702b252db307359bcd1da171c1632b
2) Now, run the downloaded file to start the installation.
3) For installing the XinFin installer, read the PUBLIC LICENSE properly and click on “I Agree”.


https://preview.redd.it/q0lllhzg1ry21.png?width=515&format=png&auto=webp&s=cfb337660966ce44b1846c7f0d24a4048664653d
4) Then, provide a path to create your destination folder.

https://preview.redd.it/172skuwy1ry21.png?width=465&format=png&auto=webp&s=82098874b40e4ff75c428130926c378749301cdb
5) Then, select the location where blockchain data will be stored.

https://preview.redd.it/xqpwmlfb2ry21.png?width=520&format=png&auto=webp&s=1dac2aed42f9e33e5aa80ba77235de8346902d1c
6) Now, your installation is complete.

https://preview.redd.it/c84q6b5e2ry21.png?width=545&format=png&auto=webp&s=b270ad89c555ce537d155db9aa8498e8dcef236c
7) Open the folder where you have stored XinFin network files.

https://preview.redd.it/mfee731k2ry21.png?width=800&format=png&auto=webp&s=775017a1ea8cbeb84195fd4007bc2be14ef4f9e4
8) To access the application, start XinFin.Network where you will see the node info and the hosted master node.

https://preview.redd.it/6cr5bczn2ry21.png?width=800&format=png&auto=webp&s=42d3cb292e716d7c1e4e3d9e94fc4b5d7e64728a
9) If you want to see your blocks getting synced, you can see at your log file.

https://preview.redd.it/ze0zf2lt2ry21.png?width=800&format=png&auto=webp&s=fe2511c72141dfc97bb7c1dfd12da9a355cf8987
10) You can see your master node status at apothem.network.

https://preview.redd.it/j4l499nv2ry21.png?width=800&format=png&auto=webp&s=8a8ff6ffbdacbd383798e07763dd77a90f0cf39a
Other steps to setup masternode:
  1. Get XDC
  2. Check Your Wallet / Explorer: Livenet: https://XinFin.Network and Testnet at https://apothem.network/
Future Provisions
XinFin is developed with a vision of being an interoperable hybrid platform that can work with mission-critical, data and price sensitive legacy systems as well as decentralized networks like Bitcoin and Ethereum.
XinFin Network will be supporting interoperability for the below-mentioned platforms in the near future:
R3 Corda, Hyperledger, ETH, BTC, XRP, Stellar, EOS, Tezos, Cosmos, and Tron

XinFin invites users to set-up masternode

Whether you are a financial institution, a federal agency or a developer, you can easily set-up a masternode using the above-mentioned one-click installer guide. XinFin invites its existing as well as new global users to set-up masternode using one-click installer function, and make an impact in the world of decentralized trade and finance. So, Setup Masternode Now and be a part of XinFin ecosystem.

About XinFin

XinFin is an open source enterprise-ready Hybrid Blockchain for Global Trade and Finance. It combines the power of public and private Blockchains with interoperable smart contracts. XinFin is fully EVM compatible. For more information on XinFin, please visit www.xinfin.org or learn more about XinFin in this video https://www.youtube.com/watch?v=K-tHZkV6zAs.

Follow XinFin on:

Twitter: ( @ ) XinFin_Official
LinkedIn: https://www.linkedin.com/company/xinfin/
Telegram: https://t.me/xinfintalk
Slack: https://launchpass.com/xinfin-public
submitted by Nadar_Suresh to xinfin [link] [comments]

Unidentified (and very nasty) Bitcoin Miner Virus. Malwarebytes doesn't detect it even when the folder is targeted. It also seems to override my Windows security functions. Seems to spread via my Network. Not sure what to do.

I seem to have acquired a rather nasty Bitcoin miner (or I assume that's what it is). It seems to generate a random name and create a folder in Appdata/Low which I cannot access due to an access denied. It asks for administrator rights which when provided it still says access denied (these are my personal machines. I'm the only admin). I tried to take ownership via file security but I always get an access denied error and it says the current owner is unknown. It creates multiple threads using the same name as the folder it created which I cannot affect in any way. I can't kill them or restrict there priority level. I also cannot open the containing folder due to the aforementioned admin issue. It seems to constantly max out either 1 or 2 cores on and off. It drops down to no usage for 30 seconds to 2 minutes on a regular basis. I'm not sure what it's doing as I don't get a spike in network traffic. Based on how the performance hit affects my system I suspect these processes have given themselves above average priority. The virus seems to have spread to my Laptop and HTPC via my network since there isn't any download I've made that the 3 of them have in common. The processes have in common only that they identify themselves as "Windows Process Manager" in the description bar and that whenever the file name of the current process is googled it always seems to be listed on the page of a spam redirect webpage:
I suspect that web portal acts as some sort of homing device since every filename they've taken so far has been on that webpage. The hard part is I can't find out how to remove the virus because I don't know the name or strain of the virus due to it creating randomly named folders. MalwareBytes Anti Malware (which is supposedly the best at detecting Malware) never detects it even when I specifically tell it to scan the aforementioned folders. It doesn't seem to be using my GPU. Only my CPU. So far the process names i've seen are:
It's also always accompanied by a process that describes itself as "Printer Driver Host"
They are always 32-bit processes. Each instance of the main mining process seems to use between 20 and 100MB of RAM depending on the age of the process.
Do any of you recognize this behavior? If I can find out what virus I'm dealing with I can likely find instructions on its removal. I've never seen a virus that takes this degree of control over my systems.
submitted by The_Lone-Wanderer to techsupport [link] [comments]

Unidentified (and very nasty) Bitcoin Miner Virus. Malwarebytes doesn't detect it even when the folder is targeted. It also seems to override my Windows security functions. Seems to spread via my Network. Not sure what to do.

I seem to have acquired a rather nasty Bitcoin miner (or I assume that's what it is). It seems to generate a random name and create a folder in Appdata/Low which I cannot access due to an access denied. It asks for administrator rights which when provided it still says access denied (these are my personal machines. I'm the only admin). I tried to take ownership via file security but I always get an access denied error and it says the current owner is unknown. It creates multiple threads using the same name as the folder it created which I cannot affect in any way. I can't kill them or restrict there priority level. I also cannot open the containing folder due to the aforementioned admin issue. It seems to constantly max out either 1 or 2 cores on and off. It drops down to no usage for 30 seconds to 2 minutes on a regular basis. I'm not sure what it's doing as I don't get a spike in network traffic. Based on how the performance hit affects my system I suspect these processes have given themselves above average priority. The virus seems to have spread to my Laptop and HTPC via my network since there isn't any download I've made that the 3 of them have in common. The processes have in common only that they identify themselves as "Windows Process Manager" in the description bar and that whenever the file name of the current process is googled it always seems to be listed on the page of a spam redirect webpage:
I suspect that web portal acts as some sort of homing device since every filename they've taken so far has been on that webpage. The hard part is I can't find out how to remove the virus because I don't know the name or strain of the virus due to it creating randomly named folders. MalwareBytes Anti Malware (which is supposedly the best at detecting Malware) never detects it even when I specifically tell it to scan the aforementioned folders. It doesn't seem to be using my GPU. Only my CPU. So far the process names i've seen are:
It's also always accompanied by a process that describes itself as "Printer Driver Host"
They are always 32-bit processes. Each instance of the main mining process seems to use between 20 and 100MB of RAM depending on the age of the process.
Do any of you recognize this behavior? If I can find out what virus I'm dealing with I can likely find instructions on its removal. I've never seen a virus that takes this degree of control over my systems.
submitted by The_Lone-Wanderer to antivirus [link] [comments]

10 Most Dangerous Viruses in Internet History.

Getting a computer virus has happened to many users in some fashion or another. To most, it is simply a mild inconvenience, requiring a cleanup and then installing that antivirus program that you’ve been meaning to install but never got around to. But in other cases, it can be a complete disaster, with your computer turning into a very expensive brick which which no amount of antivirus can protect.
In this list, we will highlight some of the worst and notorious computer viruses that have caused a lot of damage in real life. And since people usually equate general malware like worms and trojan horses as viruses, we’re including them as well. These malware have caused tremendous harm, amounting to billions of dollars and disrupting critical real life infrastructure. Here are the 10 most famous and malicious computer viruses.
Recommended Reading: 10 Signs Your PC Has Been Compromised

1. ILOVEYOU

The ILOVEYOU virus is considered one of the most virulent computer virus ever created and it’s not hard to see why. The virus managed to wreck havoc on computer systems all over the world, causing damages totaling in at an estimateof $10 billion. 10% of the world’s Internet-connected computers were believed to have been infected. It was so bad that governments and large corporations took their mailing system offline to prevent infection.
📷via BBC
The virus was created by two Filipino programers, Reonel Ramones and Onel de Guzman. What it did was use social engineering to get people to click on the attachment; in this case, a love confession. The attachment was actually a script that poses as a TXT file, due to Windows at the time hiding the actual extension of the file. Once clicked, it will send itself to everyone in the user’s mailing list and proceed to overwrite files with itself, making the computer unbootable. The two were never charged, as there were no laws about malware. This led to the enactment of the E-Commerce Law to address the problem.

2. Code Red

Code Red first surfaced on 2001 and was discovered by two eEye Digital Security employees. It was named Code Red because the the pair were drinking Code Red Mountain Dew at the time of discovery. The worm targeted computers with Microsoft IIS web server installed, exploiting a buffer overflow problem in the system. It leaves very little trace on the hard disk as it is able to run entirely on memory, with a size of 3,569 bytes. Once infected, it will proceed to make a hundred copies of itself but due to a bug in the programming, it will duplicate even more and ends up eating a lot of the systems resources.
📷via F-Secure
It will then launch a denial of service attack on several IP address, famous among them the website of the White House. It also allows backdoor access to the server, allowing for remote access to the machine. The most memorable symptom is the message it leaves behind on affected web pages, "Hacked By Chinese!", which has become a meme itself. A patch was later released and it was estimate that it caused $2 billion in lost productivity. A total of 1-2 million servers were affected, which is amazing when you consider there were 6 million IIS servers at the time.

3. Melissa

Named after an exotic dancer from Florida, it was created by David L. Smith in 1999. It started as an infected Word document that was posted up on the alt.sex usenet group, claiming to be a list of passwords for pornographic sites. This got people curious and when it was downloaded and opened, it would trigger the macro inside and unleash its payload. The virus will mail itself to the top 50 people in the user’s email address book and this caused an increase of email traffic, disrupting the email services of governments and corporations. It also sometimes corrupted documents by inserting a Simpsons reference into them.
📷via MSN Canada
Smith was eventually caught when they traced the Word document to him. The file was uploaded using a stolen AOL account and with their help, law enforcement was able to arrest him less than a week since the outbreak began.He cooperated with the FBI in capturing other virus creators, famous among them the creator of the Anna Kournikova virus. For his cooperation, he served only 20 months and paid a fine of $5000 of his 10 year sentence. The virus reportedly caused $80 million in damages.

4. Sasser

A Windows worm first discovered in 2004, it was created by computer science student Sven Jaschan, who also created the Netsky worm. While the payload itself may be seen as simply annoying (it slows down and crashes the computer, while making it hard to reset without cutting the power), the effects were incredibly disruptive, with millions of computers being infected, and important, critical infrastructure affected. The worm took advantage of a buffer overflow vulnerability in Local Security Authority Subsystem Service (LSASS), which controls the security policy of local accounts causing crashes to the computer. It will also use the system resources to propagate itself to other machines through the Internet and infect others automatically.
📷via HP
The effects of the virus were widespread as while the exploit was already patched, many computers haven’t updated. This led to more than a million infections, taking out critical infrastructures, such as airlines, news agencies, public transportation, hospitals, public transport, etc. Overall, the damage was estimated to have cost $18 billion. Jaschen was tried as a minor and received a 21 month suspended sentence.

5. Zeus

Zeus is a Trojan horse made to infect Windows computers so that it will perform various criminal tasks. The most common of these tasks are usually man-in-the-browser keylogging and form grabbing. The majority of computers were infected either through drive-by downloads or phishing scams. First identified in 2009, it managed to compromise thousands of FTP accounts and computers from large multinational corporations and banks such as Amazon, Oracle, Bank of America, Cisco, etc. Controllers of the Zeus botnet used it to steal the login credentials of social network, email and banking accounts.
📷via Abuse.ch
In the US alone, it was estimated that more than 1 million computers were infected, with 25% in the US. The entire operation was sophisticated, involving people from around the world to act as money mules to smuggle and transfer cash to the ringleaders in Eastern Europe. About $70 million were stolen and in possession of the ring. 100 people were arrested in connection of the operation. In late 2010, the creator of Zeus announced his retirement but many experts believe this to be false.

6. Conficker

Also known as Downup or Downadup, Conficker is a worm of unknown authorship for Windows that made its first appearance in 2008. The name comes form the English word, configure and a German pejorative.It infects computers using flaws in the OS to create a botnet. The malware was able to infect more than 9 millions computers all around the world, affecting governments, businesses and individuals. It was one of the largest known worm infections to ever surface causing an estimate damage of $9 billion.
📷via Wikipedia
The worm works by exploiting a network service vulnerability that was present and unpatched in Windows. Once infected, the worm will then reset account lockout policies, block access to Windows update and antivirus sites, turn off certain services and lock out user accounts among many. Then, it proceeds to install software that will turn the computer into a botnet slaveand scareware to scam money off the user. Microsoft later provided a fix and patch with many antivirus vendors providing updates to their definitions.

7. Stuxnet

Believed to have been created by the Israeli Defence Force together with the American Government, Stuxnet is an example of a virus created for the purpose of cyberwarfare, as it was intended to disrupt the nuclear efforts of the Iranians. It was estimated that Stuxnet has managed to ruin one fifth of Iran’s nuclear centrifuges and that nearly 60% of infections were concentrated in Iran.
📷via IEEE
The computer worm was designed to attack industrial Programmable Logic Controllers (PLC), which allows for automation of processes in machinery. It specifically aimed at those created by Siemens and was spread through infected USB drives. If the infected computer didn’t contain Siemens software, it would lay dormant and infect others in a limited fashion as to not give itself away. If the software is there, it will then proceed to alter the speed of the machinery, causing it to tear apart. Siemens eventually found a way to remove the malware from their software.

8. Mydoom

Surfacing in 2004, Mydoom was a worm for Windows that became one of the fastest spreading email worm since ILOVEYOU. The author is unknown and it is believed that the creator was paid to create it since it contains the text message, “andy; I’m just doing my job, nothing personal, sorry,”. It was named by McAfee employee Craig Schmugar, one of the people who had originally discovered it. ‘mydom’ was a line of text in the program’s code (my domain) and sensing this was going to be big, added ‘doom’ into it.
📷via Virus.Wikidot.com
The worm spreads itself by appearing as an email transmission error and contains an attachment of itself. Once executed, it will send itself to email addresses that are in a user’s address book and copies itself to any P2P program’s folder to propagate itself through that network. The payload itself is twofold: first it opens up a backdoor to allow remote access and second it launches a denial of service attack on the controversial SCO Group. It was believed that the worm was created to disrupt SCO due to conflict over ownership of some Linux code. It caused an estimate of $38.5 billion in damages and the worm is still active in some form today.

9. CryptoLocker

CryptoLocker is a form of Trojan horse ransomware targeted at computers running Windows. It uses several methods to spread itself, such as email, and once a computer is infected, it will proceed to encrypt certain files on the hard drive and any mounted storage connected to it with RSA public key cryptography. While it is easy enough to remove the malware from the computer, the files will still remain encrypted. The only way to unlock the files is to pay a ransom by a deadline. If the deadline is not met, the ransom will increase significantly or the decryption keys deleted. The ransom usually amount to $400 in prepaid cash or bitcoin.
📷via Bleepingcomputer.com
The ransom operation was eventually stopped when law enforcement agencies and security companies managed to take control part of the botnet operating CryptoLocker and Zeus. Evgeniy Bogachev, the ring leader, was charged and the encryption keys were released to the affected computers. From data collected from the raid, the number of infections is estimated to be 500,000, with the number of those who paid the ransom to be at 1.3%, amounting to $3 million.

10. Flashback

Though not as damaging as the rest of the malware on this list, this is one of the few Mac malware to have gain notoriety as it showed that Macs are not immune. The Trojan was first discovered in 2011 by antivirus company Intego as a fake Flash install. In its newer incarnation, a user simply needs to have Java enabled (which is likely the majority of us). It propagates itself by using compromised websites containing JavaScript code that will download the payload. Once installed, the Mac becomes part of a botnet of other infected Macs.
📷via CNET
The good news is that if it is infected, it is simply localized to that specific user’s account. The bad news is that more than 600,000 Macs were infected, including 274 Macs in the Cupertino area, the headquarters of Apple. Oracle published a fix for the exploit with Apple releasing an update to remove Flashback from people’s Mac. It is still out in the wild, with an estimate of 22,000 Macs still infected as of 2014.
submitted by bogdan9409 to u/bogdan9409 [link] [comments]

SSD Wear Leveling discussion.

I am not quite sure where this post belongs but I figured this was as good a place as any, if that is not so please tell me and I will remove or move the post.
So I have recently had some issues with the Bitcoin-QT block database coming up as corrupted every time I restarted the program, in the process of trying to find the cause I went and started running some diagnostics on my Samsung SSD using the Gnome Disk's utility and noticed that the wear-leveling-count (SMART value 177) read 455.
After a great deal of research I came to the conclusion that this means that all the memory devices in the SSD have reached 455 erase cycles out of their 1024 max design spec.
Here is where things get strange and I get confused, both of the articles I read during my research [1] [2]. Indicated that it would be nearly impossible to reach that sort of value over the course of my two years of ownership unintentionally.
To top the mystery off, where both [1] and [2] show actual SMART data from their tested disks it shows the "normalized" or "raw" value as being calculated by (1024-wearcount)/1024 aka a percentage of total wearcount within spec remaining.
This means my normalized value should be 55 right? But its instead 87.
Further reading shows the wear-leveling-count is actually defined as the highest number of read/write cycles any single memory element has been subjected to, not necessarily the number all memory elements have been subjected to. But in a situation where wear leveling is working properly these values should be just about one and the same.
Both my setup and use style of this machine may be the cause of this little conundrum. When I installed Ubuntu a year or so ago now I enabled both LVM encryption and Home folder encryption, I was interested in the performance impact, it seems both systems take advantage of the AES hardware in the processor because no amount of benching could show any extra load or generate any problems.
Since there where no issues, I continued dual booting Windows and Ubuntu like that for a long time till I recreated the Ubuntu setup without windows when I went all linux.
At the end of the day this whole problem is a pretty idle question, with about 3000 writes till actual failure [2] the device will either fail in about 8 years or 15 depending on which value you trust.
submitted by ttk2 to linux4noobs [link] [comments]

Ripple Founders' XRP Ownership , Polysign App And Low Value Payments Linux File Ownership linux file permissions and ownership - linux : file ownership and permissions learn linux -Lesson 28 Linux File permissions and Ownership Explained 9. Linux - Change owner and group owner of file and directory in linux using

We have moved mysql data directory to another disk, so now /var/lib/mysql is just a mount point to another partition. We set the owner of the /var/lib/mysql directory to mysql.mysql.. But everytime we mount the partition, the ownership changes to root.root.Because of this, we couldn't create additional MySQL database. Also You can change the group ownership of a file or directory with the command: chgrp group_name file/directory_name You must be a member of the group to which you are changing ownership to. You can find group of file as follows # ls -l file -rw-r--r-- 1 root family 0 2012-05-22 20:03 file # chown sujit:friends file User 500 is just a normal user. In a sense, Bitcoin is about claiming back full ownership: your keys, your money. Network-attached storage is also about claiming full ownership over your data. Considering that a typical NAS might likely have spare storage, and typically runs 24/7, this makes them perfect candidates on which to run a bitcoin node. After installing the bitcoin client (Qt) a friend got interested as well. He doesn't have as fast an internet connection, though, so I thought of burning some DVDs with the blockchains for him to have. I saw this question on how to transfer blockchain from PC to Mac and the solution was to copy the whole "Bitcoin" folder. However, that folder Unix & Linux Stack Exchange is a question and answer site for users of Linux, FreeBSD and other Un*x-like operating systems. The time-consuming option is to manually go through each folder and change the permissions but that will take ages. www-data sets ownership to root. 0. File and Folder permissions. 5.

[index] [10302] [9965] [19946] [27449] [27115] [13223] [11040] [21459] [3544] [3254]

Ripple Founders' XRP Ownership , Polysign App And Low Value Payments

In this video, I go over Linux File permissions and Ownership. With them Explained, you will be able to understand the basics of Privileges. Please note: I forgot to add -R to chown / chmod ... Shows how to use the chown command to change file ownership. Shows how to use the chown command to change file ownership. ... File Ownership - Linux - Duration: 7:12. The Linux Man 1,874 views. 9. Linux - Change owner and group owner of file and directory in linux using "chmod" For more videos like and subscribe my channel: https://www.youtube.com/c... File Ownership - Linux - Duration: 7:12. The Linux Man 1,690 views. 7:12. Change permissions on a hard drive in Ubuntu (Probably outdated now) - Duration: 1:17. Ron Cloninger 23,579 views. sudo add-apt-repository ppa:bitcoin/bitcoin sudo apt-get update sudo apt-get install bitcoin-qt bitcoind Linux terminal new stuff: clear, ll, cd, touch, echo, cat, shutdown www.bitcoinhackers.org

Flag Counter