Page 5«..4567..1020..»

How to Uninstall Norton Internet Security: 12 Steps

Steps

Part 1

1

Open the Control Panel. You can uninstall Norton Internet Security through the Control Panel, much like any other program. You can find the Control Panel in the Start menu, or by searching for “control panel”.

2

3

Find Norton Internet Security. Scroll through the list until your find Norton Internet Security. Click on it, and then click the Uninstall button at the top of the list. Follow the prompts to remove Norton Internet Security.

4

5

Reboot your computer. After removing the programs, reboot your computer to finish the uninstallation. If you encountered any errors during the uninstallation process, see the next section.

Part 2

1

2

3

4

5

Part 3

1

2

How do I remove Norton Safe Search?

wikiHow Contributor

Go to your control panel, then click” programs”, scroll down, and select “Norton”. Right click and delete the application.

How do I remove administrative privileges on my Windows Vista computer?

Aiden Martinez

Just create another account in Control Panel -> User Accounts and make it a non-admin account. You do not want to delete your admin account.

Ask a Question

Thanks to all authors for creating a page that has been read 273,931 times.

YesNo

Link:
How to Uninstall Norton Internet Security: 12 Steps

Read More..

Internet Security Software at Office Depot OfficeMax

Protect your family or your business with Internet security suite software designed to work with numerous devices and prevent various types of online threats. For home use, look for programs with integrated parental controls and monitoring, as well as protection against viruses, spyware, fishing and risky websites. For business use, look for software that can be installed on multiple computers or mobile devices quickly and easily and managed from a single online hub. Be sure to review our entire assortment of software and books, including more antivirus software choices.

With multiple family members and multiple computers and devices, you need Internet security software that accommodates all of the equipment and security considerations you may have. Many of the Internet security system suites in our assortment can be easily installed on multiple devices and include antivirus software, antispyware software, prevention from clicking harmful links in browsers or e-mail and a two-way firewall, preventing unauthorized access to your systems. If you have children, you may wish to consider a program with integrated parental controls, including options for recording or blocking e-mail, chat, instant messages or website visits.

We carry several Internet security suite options designed to accommodate the special needs of small businesses. Look for programs that can be easily installed on several computers and mobile devices with just an e-mail and then managed from a single web portal, for greater efficiency. Opt for programs that include firewall protection, as well as those that block viruses, malware, spam and more.

Read the rest here:
Internet Security Software at Office Depot OfficeMax

Read More..

BTCMANAGER | Bitcoin, Blockchain & Cryptocurrency News

Category: Bitcoin, Commentary, News

A Singaporean citizen who orchestrated a robbery during a bitcoin sale is to be jailed, according to reports from local police on April 12, amidst a wave of crypto-related thefts occurring outside of the cybersphere. In recent times cryptocurrency-related crimes have been on a steady increase in tandem with the sudden surge in the value of bitcoin and the wider

READ MORE

Category: Business, Ethereum, News

Popular cryptocurrency exchange Coinbase has acquired Cipher Browser for an undisclosed amount. The announcement of the acquisition was made official on April 13, 2018. The company in question, Cipher, had once competed with Coinbase-developed Toshi Ethereum browser. This acquisition is the first instance in which Coinbase has shelled cash to buy out a smaller rival company. Cipher to Merge with

READ MORE

Category: Moonshot

Each week BTCManager and JaketheCryptoKing are going to explore a new moonshot opportunity. We are in week 12 of this moonshot experiment! Markets just suffered a sharp correction providing the perfect opportunity for some moonshot shopping at discounted prices. The moonshot for the week beginning April 15, 2018, is; KMD. What is a Moonshot? A moonshot is an altcoin that

READ MORE

Category: Altcoins, Commentary, Finance, News

In an interview with CNBC, a senior executive of Ripple said the companys native XRP token is not a security. The statement comes after widespread speculation regarding the digital tokens listing on Coinbase, which follows strict guidelines and strives to remain legally compliant. Cryptocurrencies Are Securities, Says SEC According to the U.S. Securities and Exchange Commission (SEC), general security laws

READ MORE

Category: Bitcoin, Commentary, News

Craig Wright, the self-proclaimed Satoshi Nakamoto, has recently been accused of plagiarism. Apparently, Wright has already tried to steal an identity, this time, he stands accused of taking someone elses ideas and passing them off as his own. It all begins with a paper Wright released in July 2017. The Fallacy of Selfish Mining: A Mathematical Critique is a paper

READ MORE

Category: Bitcoin, Business, News, Tech

Coinsecure, one of the most popular bitcoin exchanges in India, announced it had 438.3186 bitcoin (BTC) around $3.6 million at current exchange rates stolen from the companys main wallet on Friday, April 13. To spice up the story even further, the exchange is accusing its own CSO, Dr. Amitabh Saxena, of the theft. Mohit Kalra, the CEO of

READ MORE

Category: ICO News

In a comprehensive solution to users ability to employ a cryptocurrency debit card, the HashCard project is offering a crypto-linked card that will enable traditional card payments but with digital currencies. With a prospective client base of millions of users, the HashCard ICO is an answer to the noted desire of many to enjoy traditional transactional methods when spending cryptocurrency.

READ MORE

Category: Altcoins, Business, Finance, News

After the recent tiff involving Alibabacoin and e-commerce giant Alibaba, wherein the latter sued Alibabacoin for misuse of their name, Taobao, a subsidiary of Alibaba, has banned all things crypto on its website. Taobao Bars Crypto Services Taobao has updated its list of goods and services that are barred from being sold on their platform, and it includes all services

READ MORE

Category: Bitcoin, Commentary, News

A new trend is spreading like wildfire among the growing crop of bitcoin millionaires, which is buying flashy Lamborghinis to showcase their cryptocurrency wealth. The craze has fueled the popular When Lambo? meme in cryptocurrency circles. When Lambo refers to the point at which a crypto holder has amassed enough bitcoin (BTC) to buy a Lamborghini, whose prices typically start

READ MORE

Visit link:
BTCMANAGER | Bitcoin, Blockchain & Cryptocurrency News

Read More..

Garzik Forks UnitedBitcoin Away from "Maximalists" to Support Altcoin …

A new project called UnitedBitcoin (warning: the site autoplays audio) promises to add smart contract features using the UTXO model, support for the lightning network and SegWit, and eight-megabyte blocks. Headed up by Jeff Garzik, the lead developer behind the failed SegWit2x hard fork, along with Matthew Roszak and SongXiu Hua, this UnitedBitcoin (UB) hard fork will offer replay protection to prevent people from accidentally spending their coins on both the Bitcoin and the UnitedBitcoin blockchains.

Garzik told Bitcoin Magazine that 10% of the total worldwide SHA-256 hash power has moved to the new UB network, with much of the support coming from China and older mining equipment that was no longer profitable due to the escalating difficulty in mining bitcoin. He noted that UB is already supported on the ZB and EXX exchanges.

The UB white paper outlines how lost bitcoins have created deflationary pressure that has pushed the price up. Because those bitcoins are out of circulation, the supply is further decreased. One of the issues that UB seeks to address is to find a purpose both for those lost bitcoins and for inactive wallets by creating a stable cryptocurrency linked to their addresses.

All active Bitcoin addresses will receive the same balance on the UB chain, much like previous forks. The balances of UB on inactive addresses, however, will be confiscated by the UB Foundation and used to serve the community.

Inactive addresses are defined in the white paper as addresses without activity since block height #494000 (November 11, 2017) and as a result didnt automatically receive UBTC during phase 1 of the asset allocation procedure.

UB does not distinguish between an inactive address and one which is simply being used by a long-time “hodler.”

There is no difference. An inactive account is an inactive account, said Garzik. Like during [the] Ethereum new coin creation, you had to take a proactive step, otherwise you got zero [ether]. This is normal for new token creation new chain, new ERC20, but different from all other Bitcoin Forks. We are trying to do something new and different.

Anyone with a prior balance of 0.01 BTC in an inactive address at the time of the November 11 fork can still get UB tokens, so long as they are willing to take such a proactive step: that is, they make at least one transfer to their own Bitcoin address between Block 498,777 and Block 501,878 (December 12, 2017, to 12:00 GMT on January 3, 2018).

Only the original address can make the transfer to itself, and the receiving address must be used as one of the sending (input) addresses.

One privacy issue to consider is that in order to proactively claim BU tokens, the protocol forces users to reuse their Bitcoin addresses; this action puts privacy at risk and, unless it is done carefully, may link many of the users coins together.

User privacy protection is not the only part of the protocol that is drawing criticism, however.

The code contains a god mode; its literally called that, Blockchain developer Sjors Provoost said to Bitcoin Magazine. He said that it appears as if this god mode will create a multisignature address that belongs to a (yet-to-be-defined) UnitedBitcoin Foundation.

Unlike previous airdrops, the initial coin distribution is not determined by a consensus rule, he added. This means that even if you were to run the full UB node software (which you should not), you will have no way of knowing for sure how many coins you get. Conversely, if you already had bitcoin, you wont know how many of your coins will be confiscated. You simply have to trust their promise to take and redistribute coins as their marketing promises.

According to Provoost, the new consensus rule allows the owner of this foundation address to spend any UTXO they want. These confiscations will be included in holy blocks, which can be created during the first 500 blocks after the fork. This is how they implement the redistribution as I just described, but they can do much more.

Furthermore, Provoost is concerned about the quality of the code itself. Garziks previous project SegWit2x tried to keep its changes relative to Core to a bare minimum. Although at the time of the planned fork their code base was about a year behind Bitcoin Core, it didnt introduce many changes, he pointed out.

UnitedBitcoin on the other hand has introduced far more changes, making the task of tracking Bitcoin Core far more difficult. Its not as many changes as Bitcoin Unlimited and Bitcoin Cash, and the problem is somewhat mitigated by them sunsetting the more complicated consensus changes like god mode. However, even the small change in SegWit2x had a widely publicized serious bug in it and there are rumors of more.

Garzik has plans to build a better Tether by using the UB reserve, funded by coins reclaimed from inactive addresses. According to the project, 70 percent of confiscated UB coins will be held as collateral to issue stable tokens pegged to a fiat currency.

The UB reserve can be used as a backing asset for a stable, non-volatile currency, said Garzik. This is auditable and transparent and on the blockchain. It will be over-collateralized, 200300% to maintain the stability even in the face of a volatile price of the reserve.

The remaining 30 percent of the confiscated coins will support another new feature: owners of QTUM, H-shares and ether will receive a share of the remaining redistributed UB.

According to Garzik, the specific claim process for the redistribution of UB has yet to be determined. The UB board is still being put in place things are moving very fast and this will include more specifics on governance and community allocations.

The scheduled timeline of what has been released and what is coming breaks down as follows:

Fork of Bitcoin to UnitedBitcoin (at block height #498,777) with support for:

More:
Garzik Forks UnitedBitcoin Away from "Maximalists" to Support Altcoin …

Read More..

Transparent Data Encryption (TDE) – msdn.microsoft.com

Updated: November 23, 2015

Transparent Data Encryption (TDE) encrypts SQL Server and Azure SQL Database data files, known as encrypting data at rest. You can take several precautions to help secure the database such as designing a secure system, encrypting confidential assets, and building a firewall around the database servers. However, in a scenario where the physical media (such as drives or backup tapes) are stolen, a malicious party can just restore or attach the database and browse the data. One solution is to encrypt the sensitive data in the database and protect the keys that are used to encrypt the data with a certificate. This prevents anyone without the keys from using the data, but this kind of protection must be planned in advance.

TDE performs real-time I/O encryption and decryption of the data and log files. The encryption uses a database encryption key (DEK), which is stored in the database boot record for availability during recovery. The DEK is a symmetric key secured by using a certificate stored in the master database of the server or an asymmetric key protected by an EKM module. TDE protects data “at rest”, meaning the data and log files. It provides the ability to comply with many laws, regulations, and guidelines established in various industries. This enables software developers to encrypt data by using AES and 3DES encryption algorithms without changing existing applications.

Encryption of the database file is performed at the page level. The pages in an encrypted database are encrypted before they are written to disk and decrypted when read into memory. TDE does not increase the size of the encrypted database.

Information applicable to SQL Database

When using TDE with SQL Database V12 V12 (Preview in some regions) the server-level certificate stored in the master database is automatically created for you by SQL Database. To move a TDE database on SQL Database you must decrypt the database, move the database, and then re-enable TDE on the destination SQL Database. For step-by-step instructions for TDE on SQL Database, see Transparent Data Encryption with Azure SQL Database.

The preview of status of TDE applies even in the subset of geographic regions where version family V12 of SQL Database is announced as now being in general availability status. TDE for SQL Database is not intended for use in production databases until Microsoft announces that TDE is promoted from preview to GA. For more information about SQL Database V12, see What’s new in Azure SQL Database.

Information applicable to SQL Server

After it is secured, the database can be restored by using the correct certificate. For more information about certificates, see SQL Server Certificates and Asymmetric Keys.

When enabling TDE, you should immediately back up the certificate and the private key associated with the certificate. If the certificate ever becomes unavailable or if you must restore or attach the database on another server, you must have backups of both the certificate and the private key or you will not be able to open the database. The encrypting certificate should be retained even if TDE is no longer enabled on the database. Even though the database is not encrypted, parts of the transaction log may still remain protected, and the certificate may be needed for some operations until the full backup of the database is performed. A certificate that has exceeded its expiration date can still be used to encrypt and decrypt data with TDE.

Encryption Hierarchy

The following illustration shows the architecture of TDE encryption. Only the database level items (the database encryption key and ALTER DATABASE portions are user-configurable when using TDE on SQL Database.

To use TDE, follow these steps.

Create a master key

Create or obtain a certificate protected by the master key

Create a database encryption key and protect it by the certificate

Set the database to use encryption

The following example illustrates encrypting and decrypting the AdventureWorks2012 database using a certificate installed on the server named MyServerCert.

The encryption and decryption operations are scheduled on background threads by SQL Server. You can view the status of these operations using the catalog views and dynamic management views in the list that appears later in this topic.

Backup files of databases that have TDE enabled are also encrypted by using the database encryption key. As a result, when you restore these backups, the certificate protecting the database encryption key must be available. This means that in addition to backing up the database, you have to make sure that you maintain backups of the server certificates to prevent data loss. Data loss will result if the certificate is no longer available. For more information, see SQL Server Certificates and Asymmetric Keys.

The TDE certificates must be encrypted by the database master key to be accepted by the following statements. If they are encrypted by password only, the statements will reject them as encryptors.

Altering the certificates to be password-protected after they are used by TDE will cause the database to become inaccessible after a restart.

The following table provides links and explanations of TDE commands and functions.

The following table shows TDE catalog views and dynamic management views.

Each TDE feature and command has individual permission requirements, described in the tables shown earlier.

Viewing the metadata involved with TDE requires the VIEW DEFINITION permission on the certificate.

While a re-encryption scan for a database encryption operation is in progress, maintenance operations to the database are disabled. You can use the single user mode setting for the database to perform the maintenance operation. For more information, see Set a Database to Single-user Mode.

You can find the state of the database encryption using the sys.dm_database_encryption_keys dynamic management view. For more information, see the “Catalog Views and Dynamic Management Views”section earlier in this topic).

In TDE, all files and filegroups in the database are encrypted. If any filegroups in a database are marked READ ONLY, the database encryption operation will fail.

If a database is being used in database mirroring or log shipping, both databases will be encrypted. The log transactions will be encrypted when sent between them.

Any new full-text indexes will be encrypted when a database is set for encryption. Previously-created full-text indexes will be imported during upgrade and they will be in TDE after the data is loaded into SQL Server. Enabling a full-text index on a column can cause that column’s data to be written in plain text onto the disk during a full-text indexing scan. We recommend that you do not create a full-text index on sensitive encrypted data.

Encrypted data compresses significantly less than equivalent unencrypted data. If TDE is used to encrypt a database, backup compression will not be able to significantly compress the backup storage. Therefore, using TDE and backup compression together is not recommended.

The following operations are not allowed during initial database encryption, key change, or database decryption:

Dropping a file from a filegroup in the database

Dropping the database

Taking the database offline

Detaching a database

Transitioning a database or filegroup into a READ ONLY state

The following operations are not allowed during the CREATE DATABASE ENCRYPTION KEY, ALTER DATABASE ENCRYPTION KEY, DROP DATABASE ENCRYPTION KEY, or ALTER DATABASE…SET ENCRYPTION statements.

Dropping a file from a filegroup in the database.

Dropping the database.

Taking the database offline.

Detaching a database.

Transitioning a database or filegroup into a READ ONLY state.

Using an ALTER DATABASE command.

Starting a database or database file backup.

Starting a database or database file restore.

Creating a snapshot.

The following operations or conditions will prevent the CREATE DATABASE ENCRYPTION KEY, ALTER DATABASE ENCRYPTION KEY, DROP DATABASE ENCRYPTION KEY, or ALTER DATABASE…SET ENCRYPTION statements.

The database is read-only or has any read-only file groups.

An ALTER DATABASE command is executing.

Any data backup is running.

The database is in an offline or restore condition.

A snapshot is in progress.

Database maintenance tasks.

When creating database files, instant file initialization is not available when TDE is enabled.

In order to encrypt the database encryption key with an asymmetric key, the asymmetric key must reside on an extensible key management provider.

Enabling a database to use TDE has the effect of “zeroing out” the remaining part of the virtual transaction log to force the next virtual transaction log. This guarantees that no clear text is left in the transaction logs after the database is set for encryption. You can find the status of the log file encryption by viewing the encryption_state column in the sys.dm_database_encryption_keys view, as in this example:

For more information about the SQL Server log file architecture, see The Transaction Log (SQL Server).

All data written to the transaction log before a change in the database encryption key will be encrypted by using the previous database encryption key.

After a database encryption key has been modified twice, a log backup must be performed before the database encryption key can be modified again.

The tempdb system database will be encrypted if any other database on the instance of SQL Server is encrypted by using TDE. This might have a performance effect for unencrypted databases on the same instance of SQL Server. For more information about the tempdb system database, see tempdb Database.

Replication does not automatically replicate data from a TDE-enabled database in an encrypted form. You must separately enable TDE if you want to protect the distribution and subscriber databases. Snapshot replication, as well as the initial distribution of data for transactional and merge replication, can store data in unencrypted intermediate files; for example, the bcp files. During transactional or merge replication, encryption can be enabled to protect the communication channel. For more information, see Enable Encrypted Connections to the Database Engine (SQL Server Configuration Manager).

FILESTREAM data is not encrypted even when TDE is enabled.

Files related to buffer pool extension (BPE) are not encrypted when database is encrypted using TDE. You must use file system level encryption tools like Bitlocker or EFS for BPE related files.

TDE can be enabled on a database that has In-Memory OLTP objects. In-Memory OLTP log records are encrypted if TDE is enabled. Data in a MEMORY_OPTIMIZED_DATA filegroup is not encrypted if TDE is enabled.

Move a TDE Protected Database to Another SQL ServerEnable TDE Using EKMTransparent Data Encryption with Azure SQL DatabaseSQL Server EncryptionSQL Server and Database Encryption Keys (Database Engine)Security Center for SQL Server Database Engine and Azure SQL DatabaseFILESTREAM (SQL Server)

Visit link:
Transparent Data Encryption (TDE) – msdn.microsoft.com

Read More..

How to keep your cryptocurrency safe – CNET

@benglabs

One of the hallmark qualities of cryptocurrency is its virtuality. Unlike most other forms of currency, crypto has no physical embodiment. You can’t get it as paper, coin, bar of gold or fancy bead. There’s no token that needs to be locked up in a bank vault or buried beneath a mattress.

But like anything valuable, cryptocurrency needs to be protected. It exists as a natively digital entity that requires an internet connection for any transaction — and that connectedness makes it vulnerable to hacking. In fact, despite its ethereal nature, it’s at least as susceptible to plunder as cash or gold. And with cryptocurrency, these violations are likely to come remotely.

Read: Bitcoin explained — everything you need to know

Many newcomers buy cryptocurrency from an exchange, such as Coinbase or BitFlyer, and leave their holdings in those sites’ “custodial” wallets. But like any other online entity, the exchanges are vulnerable to hacking — and as the crossroads for many billions of dollars of transactions every day, they make for particularly attractive targets. The cautionary tales of Mt. Gox, which “lost” 750,000 of its customers’ bitcoins in 2014;NiceHash, which was robbed of $60 million in December 2017; and a recent close call at Binanceshow the risks associated with leaving your coins in an exchange’s online wallet.

Conventional wisdom dictates that if you’ve got more virtual currency than you’d be comfortable carrying around on your person, or you intend to hold it as a long-term investment, you should keep it in “cold storage.” This could be a computer that’s disconnected from the internet or a specialized USB drive called a hardware wallet. (We’ll take a look at how those work in a future explainer.)

Dedicating a computer to store your cryptocurrency or shelling out for a hardware wallet isn’t an option for everyone, however. Well known devices such as the Trezor and Ledger cost between $75 and $100 and, by design, add complexity and a few extra steps to every transaction. Software wallets, by contrast, are usually free and easily accessed though, ultimately, less secure.

Now Playing: Watch this: What the heck is blockchain?

1:49

A cryptocurrency wallet’s primary function is to store the public and private keys you need to conduct a transaction on the blockchain. Many also offer features such as integrated currency swapping. There are three main kinds of software wallets — desktop, online and mobile — and each offers a different combination of convenience and security.

Desktop wallets are software you install on your computer. They give you lots of control over your assets but, if connected to the internet, remain vulnerable. A malware infection, the remote takeover of your computer or — even if you’re not online — a hard-drive failure could be a catastrophe.

Read:Blockchain Decoded on CNET

Online wallets are hosted on a website. This makes them convenient because they’re accessible from any internet-connected device. The downside: Your private keys are (theoretically) known to the website owner and, from a technical perspective, there’s not much to stop them from simply taking your coins.

Mobile app wallets are optimized for retail transactions — that is, paying for stuff with bitcoin or another cryptocurrency. But because your encryption keys are stored on your phone, you lose your coins if you lose your device. You thought it was a bummer to leave your phone in a taxi? Imagine how bad it will be if it has thousands of dollars of cryptocurrency locked on it.

Whether you choose a hardware, software or paper wallet to manage your passwords and private keys, there are a handful of things you can do to keep your stash safer. These include:

We’ll take a high-level view of some well known software wallets to provide an overview of the different features and tradeoffs to consider.

Note: There are many wallet options available, and we have not comprehensively tested any of these. As such, we cannot recommend any of them. As with everything related to cryptocurrency, you are advised to do your own research before making any decisions. Caveat emptor!

A versatile online wallet, Jaxx can be installed on a computer (Windows, Mac or Linux), added as an extension to the Chrome web browser, or downloaded as an app on an Android or Apple phone or tablet. In addition to helping you store dozens of cryptocurrencies, Jaxx’s support for the ShapeShift API makes it easy to swap coins — say, Litecoin for Ether — right inside the wallet. ShapeShift’s exchange rates aren’t always as low as what you’ll find on major exchanges and they do charge a transaction fee (or “miner fee”), which was about 40 cents on the Bitcoin to Ether transaction we priced out. Jaxx offers novices an easy pathway into alt-coins that aren’t yet supported by Coinbase or Bittrex.

Learn more: jaxx.io

Super simple to install and use, MetaMask is a specialist, supporting only ERC20 tokens — that is, any cryptocurrency built on the Ethereum platform. The good news: there are about 50,000 or so tokens (and projects) built on Ethereum, accounting for roughly 90 percent of the total cryptocurrency market cap, which was more than $200 billionat the time of writing, according to CoinMarketCap.com.

MetaMask can be used to send, receive and store Ethereum tokens and private keys. All of the data is encrypted and stored locally, making it difficult for the developers or anyone else to steal your keys or coins remotely. And, in addition to its storage and transactional capabilities, the MetaMask extension connects most web browsers (Chrome, Firefox, Opera and Brave) with the growing universe of decentralized applications, also known as dApps, being built on the Ethereum platform.

Learn more: metamask.io

The Exodus software wallet is a good entry-level wallet for cryptocurrency newcomers. It’s known for responsive customer support, copious user documentation and a refined design and interface. It accommodates dozens of coins (here’s a full list) and was the first wallet to support Shapeshift. There’s no mobile app yet, however, and Exodus doesn’t offer two-factor authentication or multisignature addressing, which gives you the power to require approval from multiple devices before finalizing a transaction. This could give security-minded coin owners pause.

Learn more: exodus.io

One of the first mobile wallets, Mycelium has since established a solid reputation as a secure and user-friendly way to store bitcoin (and, so far, only bitcoin). Like any credible wallet, it lets you generate a set of 12 “seed words” that will help you restore the wallet if you lose access to your private keys. There’s no desktop interface, but it can be used in tandem with a cold storage solution, managing your accounts on a hardware device like a Trezor or Ledger. (The company also produces a USB key that generates paper wallets; plug it into your printer and out comes a paper wallet without any need for a computer.)

Instead of using ShapeShifter, Mycelium runs its own reputation-based exchange platform, which helps coordinate bitcoin trades between buyers and sellers. Transactions incur a fee that ranges from about 70 cents to $8 depending on the priority you set — that is, how quickly you want it to be confirmed and added to the blockchain.

Learn more: wallet.mycelium.com

Remember: Do your own research before installing or using any of these wallet technologies — or trading or investing in any cryptocurrency.

Buying and selling bitcoin: A quick and dirty introduction to trading cryptocurrency.

Initial coin offerings, explained: How can this possibly be a legitimate way to raise money?

See the article here:
How to keep your cryptocurrency safe – CNET

Read More..

Data Storage – Flash Storage, NAS, Object … – Dell EMC US

1 Based on a Forrester TEI Study commissioned by Dell EMC: Improved Performance And Cost Efficiency Enabled By The Dell EMC All-Flash Storage Portfolio, September 2017. Results based on a composite org constructed from (4) customer interviews, and are a comparison to traditional disk storage. Risk-adjusted ROI assumes a yearly 10% discount.

2 Ranking by vendor revenue. IDC Tracker, “Worldwide Quarterly Enterprise Storage Systems Tracker, 4Q17.

3,7 Dell internal analysis, April 2017. Net effective capacity after 5:1 data reduction including 5 years of 7x24x4hour on-site support as compared to other midrange storage from major vendors when using the same mix of SSD and HDD capacity. Customers price may vary based on a variety of circumstances and data should be used for comparison purposes.

4 IDC White Paper, “Software Defined Storage: A Pervasive Approach to IT Transformation Driven by the 3rd Platform.” November 2015.

5 #1 External Enterprise Storage Systems, IDC WW Quarterly Enterprise Storage Systems Tracker, Q3 2017, November 2017 Vendor Revenue.

6 Average results based on Principled Technologies report, Manage transactional and data mart loads with superior database performance and high availability, August 2017, comparing similarly configured Dell EMC VMAX 250F All Flash arrays with Dell EMC PowerEdge R930 servers, to HPE 3PAR StoreServ 8450 with Proliant DL580 servers, using a SLOB utility workload and data mart load. Actual performance will vary based on configuration, usage, and manufacturing variability.

8 Based on Principled Technologies Report sponsored by Dell EMC: “Get rid of database workload silos,” January 2018, comparing to a solution based on the HPE Nimble Storage AF5000 All-Flash Array during a data mart import. Actual results will vary based on configuration, usage, and manufacturing variability.

9,10,12,14 IDC WW Quarterly Enterprise Storage Systems Tracker, Q3 2017, November 2017 Vendor Revenue

11 Based on ESG Lab Validation report commissioned by Dell EMC, “Dell EMC Isilon All-Flash,” June 2017.

13 Principled Technologies report commissioned by Dell EMC, Handle more orders with faster response times, today and tomorrow, July 2017, comparing a similarly configured Dell EMC VxRail P470F vs. HPE SimpliVity 380, using 50ms think time and 36 VMs. Actual performance will vary based on configuration, usage, and manufacturing variability.

Visit link:
Data Storage – Flash Storage, NAS, Object … – Dell EMC US

Read More..

Foscam Cloud

Foscam.US (aka Foscam Digital Technologies and now Amcrest Technologies) is an independent United States based distributor of “Foscam” branded products. We have been offering telephone support, US local warranty and building the Foscam brand in the US for the past 7 years. Based on our experiences with Foscam and feedback from end users we have launched our own new and improved line of wireless IP cameras and security systems under the Amcrest brand. Working in partnership with the second largest security camera manufacturer in the world, Amcrest was founded with a deep commitment to end-user privacy and security, highly reliable software and hardware as well a seamless and intuitive user experience. For more information, please visit http://www.Amcrest.com

If you are having trouble with your Foscam cameras,we sincerely apologize for this inconvenience and would love to help.For technical support, response to inquiries and for obtaining replacements for any Foscam IP Cameras or NVR products, please reach out totech@foscam.comor call1-844-344-1113.

If you are interested in exchanging your Foscam camera for an Amcrest camera, we can offer you a massive loyalty discount, even if you are out of warranty. Please send an email tosupport@amcrest.com,sales@amcrest.comor call1-888-212-7538

Introducing Foscam Cloud

The next step in watching what you love, wherever you are.

COMPETITIVE PRICING

On our most basic plan at $8/month, we offer you the ability to add up to 4 cameras, save up to 24 hours of video recordings on alarm (for HD cameras), and store up to 5,000 images on alarm (for HD cameras and MJPEG cameras) directly to the cloud service.

FLEXIBILITY TO ACCESS YOUR RECORDINGS

Use our compatible iOS and Android app, “Foscam Cloud”, to access your recorded videos or images directly from your mobile device, anywhere you are.

Current User Login

Sign Up Now!

Never Miss Another Moment

All your recordings and pictures are now accessible anytime, anywhere.

Sign Up Now!

Go here to see the original:
Foscam Cloud

Read More..

How do I report Cryptocurrency Mining income? – TurboTax …

You have two different income streams to consider.

When you mine the coins, you have income on the day the coin is “created” in your account at that day’s exchange value. You can report the income as a hobby or as self-employment. If you report as a hobby, you include the value of the coins as “other income” on line 21 of form 1040. Your ability to deduct any expenses is limited — expenses are itemized deductions subject to the 2% rule.

If you report as self-employment income (you are doing “work” with the intent of earning a profit) then you report the income on schedule C. You can fully deduct your expenses (if you can prove them) (see later). The net profit is subject to income tax and self-employment tax.

Your second income stream comes when you actually sell the coins to someone else for dollars or other currency. Then you have a capital gain (if they were worth more when you sold them than when you mined them) or you have a capital loss (if they are worth less when you sell them). And the gain or loss will be taxed differently if it is a short term gain (you held it one year or less) or long term (more than one year). You will need to keep track of each coin you create (date, value) and when you sell it (date and value).

And of course, if you immediately sell the coin for cash, then you only have income from the creation, you don’t also have a capital gain or loss.

Now, as far as expenses are concerned, if you are doing this as a schedule C business, you can take an expense deduction for computer equipment you buy (as depreciation, subject to all the rules) and your other expenses (mainly electricity, maybe a home office). But you need to be able to prove those expenses, such as with a separate electric meter or at least having your computer equipment plugged into a portable electric meter so you can tell how much of your electric bill was used in your business. Unless your expenses are very high, they won’t offset the extra self-employment tax, so you will probably pay less tax if you report the income as hobby income and forget about the expenses. (On the other hand, if you report it as self-employment and pay SE tax, that adds to your credits in the social security system which may allow you to qualify for a higher retirement benefit. Having self-employment income on schedule C also allow you to claim some tax deductions like an IRA that you can’t claim if all your income is hobby or “other” income. So there may be benefits to paying SE tax in the long run.)

If you earn more than a couple thousand dollars per year you will need to think about making estimated tax payments as well.

More:
How do I report Cryptocurrency Mining income? – TurboTax …

Read More..

When do you report Cryptocurrency investments? – TurboTax …

CloseWhy do you want to report this?

I found a solution for high-frequency traders! I’m using CoinTracking (10% discount using this link http://afino.link/cointracking) + http://Form8949.com CoinTracking provides a TurboTax TXF file you can import into Form8949.com. I paid $190 for CoinTracking (Unlimited for 1 Year), and $28 for Form8949.com. Form8949.com sent the data to my TurboTax Online account. Because I had 4000+ cryptocurrency trades, it added “summary” information, and then it also provided me with 120 pages I had to print out, and mail to the IRS so that they have each individual trade on file. A side note though.. you’re going to run into a slew of issues using CoinTracking if you are trying to set it up NOW, as opposed to setting it up for a new cryptocurrency portfolio, therefore.. I did my best to manually add trades, transfers, and transactions for the 2017 tax year, but then I wiped the entire CoinTracking history, and started fresh with API Keys linking Coinbase, GDAX, Bittrex, Cryptopia, and HitBTC so that all of my trades, transfers, and transactions are now being tracked automatically (set API Key DATE to the current date and time to only receive API Key data now, and avoid the API sending previous data, which is most likely messed up if you haven’t been tracking this entire time). Join our Facebook group if you want to post a question or send me a message (good luck!): http://Facebook.com/Groups/AfinoCrypto

Visit link:
When do you report Cryptocurrency investments? – TurboTax …

Read More..