Articles by "Method"
Showing posts with label Method. Show all posts

Some terms in crypto asset trading

It is undeniable that when we trade as a beginner, we will definitely find several terms to describe a situation, even though Crypto Asset trading and other Asset trading are the same in trading terms, but they still have some differences.

Below are some of the terms in crypto trading often used in chatting on trading sites that you might find:


  1. Hold: "Hold on for life dear" - hold your coins.
  2. Bear Market / Bearish: Market is falling
  3. Bull Market / Bullish: Market goes up
  4. BlockChain: A growing list of records, called blocks, which are linked and secured using cryptography. Each block usually contains cryptographic hashes from the previous block, timestamp data, and transactions.
  5. Bitcoin: A very well-known coin, also called BTC.
  6. Altcoin / Alts: Alternative coins. Coins other than BTC. Examples: Ethereum, Ripple, Doge, Bch, etc.
  7. Satoshi / Sats: Decimal portion in cryptocurrency (1 BTC = 100,000,000 Satoshi)
  8. Market Capitalization: Market Capitalization. (price) X (coins in circulation).
  9. Hard Cap: The maximum number that Crowdsale will receive.
  10. Low Cap: If an ICO wants to raise less funds then generally less than $ 20 million.
  11. High Cap: If an ICO wants to raise more funds then generally more than $ 25 million.
  12. FUD: Fear, Uncertainty, Doubt - Fear, Uncertainty, Doubt. It usually arises when there is bad news, but its authenticity is uncertain.
  13. Fudder: People who like to spread bad news.
  14. Shill / Shilling: Promote a coin on a coin to increase its sale value.
  15. FOMO: Fear of Missing Out - where the fear of missing an update.
  16. Shitcoin: Altcoin has become worthless. The value of Shitcoin can be realized because it failed to materialize, Altcoin itself is not made in good faith, or because the price is based on speculation.
  17. Solid Coin: A good and trusted coin
  18. Moon / Mooning: Coin prices are as high as stars (very high).
  19. Mars: The price of coins will soar very high.
  20. ATH: All-Time High- The most expensive price from the date of issue of the coin.
  21. Whale: People who have a lot of BTC.
  22. Pump: Buy a coin so that the price rises.
  23. Dump: Sell coins after prices go up.
  24. Pump and Dump: Buy coins so that prices rise, so that you can dump.
  25. Bag Holder: Someone who has bought coins at a high price and did not have time to sell and the coins become Shitcoin.
  26. Long: Position taken by the trader. To take a long position on something is to believe that its value will increase in the future.
  27. Shot: Position taken by the trader. To take a short position on a coin is to believe that its value will fall in the future.
  28. Litite orders: Coin orders that are placed at a future price that will be executed when the target price is reached.
  29. Borrowing rate: When you open a leveraged position, you will borrow coins at a predetermined rate. This value will be added to reflect the overall profit and loss of your position.
  30. Lending rate: Some exchanges have a loan account, you can deposit coins into this loan account to lend your coins to others. In trading with leverage. Loan interest rates fluctuate throughout the day based on requests for coin shortening.
  31. Circulating supply: The price of a coin has no special meaning. However, the price of a coin when multiplied by the outstanding inventory can provide a market capitalization of the coin.
  32. ICO: Initial Coin Offering - Initial Coin Offering.
  33. BTFD: Buy The F **** Dip - Buy coins when the price is very low.
  34. Weak Hands: Someone who sells coins at a loss when the market goes down because of fear.
  35. Airdrop: Coins/tokens are distributed to the community for free.
  36. Token: Representation of certain assets or utilities, which are usually above the other blockchain. Tokens can basically represent any asset that can be exchanged and can be traded, ranging from commodities to loyalty points to other cryptocurrencies.
  37. DYOR: Do Your Own Research. Do your own research.
  38. IDEX: Digital money trading market.
  39. Load Map: Target / plan.
  40. BTD: Buy The Dip. Buy a coin whose price has dropped dramatically.

If you are naming other terms, you can leave them in the comments column to be a reference for crypto traders.

Best Remote Computer App


Speaking of computers, have you ever had to monitor client computers in a remote place? Or do you want to monitor system performance in many places? Do you have to visit the one place where the computer is? Maybe, you can try a remote computer application. This application uses an extranet network. The use of extranet is very much needed in the application of this remote technology, especially for companies that have many branches.

Remote desktop applications or other designations remote access software or remote control software are applications that allow you to control other computers remotely. With this application, you can take control of other computers that are connected using the mouse and keyboard on the computer in front of you.

In general, in order to access a computer that is far from where you are now, you must install an application called a host on the computer that you want to control. After that is done, the computer or other devices with valid access rights, or the client's name, can connect to the host and control it.

Relax, even though it looks really technical, you won't have any difficulties in using remote computer applications. Moreover, the free remote computer application that we will convey below only requires a few clicks to get started and does not require special computer knowledge.

The following is a list of applications:

1. TeamViewer

TeamViewer is a very reliable remote application. Many features can be used in this application. Even so, you will have no trouble when installing and using TeamViewer, because you don't need to change the configuration of the router or firewall used on your internet network.

TeamViewer supports video, voice calls, chat, file transfer, wake-on-LAN (WOL), and can even reboot a PC remotely and then reconnect automatically.

From the host or computer you want to control, the installed OS can be Windows, Mac, or Linux. There are three installer options to choose from. Full version with the installer for the full version, portable version or called TeamViewer QuickSupport if you want to remotely only once or if there are conditions that do not allow installing TeamViewer on the host computer, or TeamViewer Host for you who will be remotely hosting the host computer.

Meanwhile, from the client-side, TeamViewer has a number of options to connect to the computer that you want to control. There are applications that can be installed or portable versions for computers running Windows, Mac, and Linux, and there are also mobile applications for iOS, BlackBerry, Android, and Windows Phone smartphones.

2. Remote Utilities

Remote Utilities works by connecting two computers with what they call "Internet ID". With this application, you can control up to 10 computers.

From the host side, install the part of Remote Utilities called host on a Windows OS computer. You can also choose to run an Agent that provides instant support without having to install anything, even you can run it from a flash disk. The host computer will be given an Internet ID that the client can use to communicate to the computer.

Meanwhile, on the client-side, install a part of Remote Utilities called Viewer that functions to connect to the Host or Agent computer. The viewer can be downloaded separately or combined with Host. You can also download the portable version if you prefer not to install anything.

The advantage of this application is that you do not need to change router settings such as port forwarding. As a client, you only need to enter your Internet ID number and password. The client application can also be downloaded on iOS and Android smartphones.

The features supported by Remote Utilities are as follows:
๐Ÿ—ธ remote task manager
๐Ÿ—ธ file transfer
๐Ÿ—ธ wake-on-LAN (WOL)
๐Ÿ—ธ remote terminal or Command Prompt
๐Ÿ—ธ remote file launcher
๐Ÿ—ธ text chat
๐Ÿ—ธ remote registry access
๐Ÿ—ธ information manager system
๐Ÿ—ธ Remote webcam viewing
๐Ÿ—ธ print remotely
๐Ÿ—ธ multi-monitor.
The drawback of this application is the confusing configuration on the host computer, so many different choices.

3. Ammyy Admin

Ammyy Admin is a remote desktop application that is truly portable and its settings are very simple. This application works by connecting one computer to another through the ID provided by the application.

From the host side, you simply run the Ammyy Admin application on the computer you want to access. You don't need to install this application, just run it. From the menu called Ammyy, you can choose Service and install Ammyy Admin Service. So you can access other computers without having to run the program manually.

From the client-side, you only need to run the portable application and enter the ID of the host computer. Once connected, you can do things like use the clipboard on the host computer, voice chat, and transfer files to and from the host computer.

4. UltraVNC

Actually, the UltraVNC application is almost the same as Remote Utilities, where the server and viewer are installed on both PCs, and the viewer itself is used to control the server.

From the host side, you can choose whether to install Server, Viewer, or both. You must install Server on the computer that you want to control. You can install the UltraVNC Server as a service on the system so that communication can always run.

From the client-side, you have to install the Viewer during the setup installer. Then, after you have configured port forwarding on the router, you can access the UltraVNC server from anywhere with an internet connection, either through a mobile device that supports VNC connection, a computer installed by Viewer, or through a browser. What is important, you enter the IP address of the Server (Host) to be connected.

The advantages of UltraVNC include the support of file transfer, chat, share clipboard, and can boot and connect to the server during Safe Mode.

5. AeroAdmin

AeroAdmin is arguably the easiest remote desktop application at the moment. The reason, there are almost no settings needed, and everything is done quickly and directly to the point to be used as impromptu support.

From the host side, AeroAdmin will look like TeamViewer. You only need to run the portable program and share your IP address or share ID with other computers.

While from the client-side, you only need to run the same AeroAdmin program and enter the ID or IP address that is shared by the host. You can choose the "View Only" or "Remote Control" mode before you connect your computer to the host computer, then click "Connect" to start the remote.

The AeroAdmin application is completely free for personal and commercial use, but unfortunately, there is no chat feature. AeroAdmin can be installed on Windows 10, 8, 7, and XP, both 32-bit and 64-bit types.

6. Windows Remote Desktop

Windows Remote Desktop is a remote desktop application that integrates with the Windows operating system or is installed by default when you install Windows. So, you don't need to download anything if you use this application.

From the host side, to activate the connection to the computer, you must open the "System Properties" setting, then activate the "Allow remote connections" setting. You also need to set port forwarding on the router so that other computers from outside the network can be connected to the host computer. Don't forget to set the firewall function so that your communication is not interrupted.

Meanwhile, from the client-side, other computers that want to connect to the host computer only need to open the Remote Desktop Connection software and just enter the IP address of the host. After you are connected, you can transfer files, print to a local printer, listen to audio from a remote PC, and transfer clipboard content.

https://www.coincryptoasia.com/2020/01/how-to-create-or-modify-wikipedia-page.html

How to create or modify a Wikipedia page?


Creating the most extensive Wikipedia pages or articles about free encyclopedias is not an easy task. This is a task proposed by many SEO agents and which is no longer part of their offer today - too much risk, too much time, too much rejection or cancellation of content by contributors or moderators. But, there are still some experts out there who offer exceptional Wikipedia page services for their clients.

Wikipedia looks for the neutrality of viewpoints

This means that articles cannot promote certain points of view. Sometimes this means describing several points of view and representing each point as precisely as possible, taking into account their respective interests in the field of knowledge.

Wikipedia is published under a free license

Specific licenses authorize everyone to create, copy, modify and distribute Wikipedia content. The obligation is to maintain the same license for certified and modified copies, as well as for the original author's credit. Nobody has control over certain items. Any text brought to Wikipedia can be modified and redistributed without warning by anyone, including merchants. Free does not mean that everyone can write or do whatever they want freely. Copyright must be respected.

Do you want to know how to get a Wikipedia page about yourself or your company, it is highly recommended to involve a skilled Wikipedia contributor or creator. He can guide you through each niche.

Wikipedia is a collaborative project that has some strict rules

You are asked to respect other Wikipedia contributors, even when there is disagreement. Always be polite, polite and respectful. Look for consensus. Don't attack people or make derogatory generalizations. Keep your temperament and content cool when the atmosphere heats up. Avoid publishing war.

Wikipedia contributors update content if they see a need

Don't hesitate to be brave in your contributions because one of the advantages of being able to modify Wikipedia is that everything doesn't have to be perfect the first time. Because it is not necessary to know all the rules to contribute. If you make a mistake, other contributors will find it, correct it, and explain it to you.

Rules and best practices for creating or modifying articles on Wikipedia

In the perspective of creating or modifying Wikipedia pages, here are some recommendations:

Your information source

Before writing or modifying Wikipedia articles, you are advised to research and list as many sources as possible. That can be web pages, tweets, blog articles, extracts from magazines, books and TV or radio programs. The more information taken from diverse and diverse sources, the more likely it is to remain in place.

Also, it's important to place a maximum of internal links (to other Wikipedia articles) in the article's body.

Adopt a neutral and encyclopedic style

Avoid using subjective and superlative sentence changes. We also have to avoid anything that can be seen as a disguised advertisement and that has no informative purpose. For example, we can talk about the technology offered exclusively but avoid talking about price.

Also note that the titles must be clear and informative. Thus, it is advisable to avoid the sections that are titled various stories.

Exchange with the community

Wikipedia presents itself as a free encyclopedia - anyone can contribute freely in accordance with applicable rules. However, administrators are there to monitor the quality of the proposed changes.

After modifying the article, the History section at the top of the page gives an account of possible changes to follow. You can chat with the administrator to ask for improvements before making new changes.

Finally, the Draft functionality allows you to have articles in draft versions and share them. Only drawback, it is currently not possible to create more than one concept.

Optimize article references

Like all web content, titles, translations, and items in bold are valued for SEO. It is recommended to have some guidelines regarding SEO and apply them if possible to Wikipedia articles. And if you want to create a backlink from Wikipedia, you can hire an expert on how to help you in that aspect.

Sell On Your Own Website

Monetize anything

Satoshiwall is the peer-to-peer monetization platform for the world.

Non-custodial
Earn passive income with total confidence. We never touch the coins you earn.

How to get started?

You can be stacking sats for your content within 10 seconds.

1. Download a Bitcoin Cash wallet
We recommend Electron Cash or Badger wallet. You might also check out bitcoincash.org for a detailed guide to available BCH wallets. You will need it to generate an address for receiving payments.

2. Create a paywall
Put any content or information behind a paywall. It's free and you don't even need an account. Enter a title, the content, the price and your bitcoin address.

3. Share the link
After creating your paywall, you can share your URL to friends, family or salty Bitcoin Core maximalists. Just keep it sincere and avoid spamming.

4. Profit
All payments will go directly from the wallet of other users to your wallet. It's fully non-custodial and everything happens on-chain. You are in control, we never touch your money.

Selling any content on your website? Autopay!



On this occasion, I would like to share my experience selling content on the website. Content is (website, blog template, etc.) or application. You can use the method below!

First: you visit the site! satoshiwall
Second: you register the web! satoshiwall.cash
Third: Login! satoshiwall.cash/login

If so, then we will enter into the topic of discussion, namely selling content on our website.
1. Create paywall
2. Select BCH
๐Ÿ—ธ Price & payment options
3. Price
4. Cash address
๐Ÿ—ธ Content
5. Title
6. Free content (This content is free. Everyone can see without paying).
7. Paid content (Well, in this column you can fill in the content you want to sell / this content is in the form of a blog template or others). If you sell the application, then you upload it to another site first, then you place the download link in this column.
8. Click Post Paywall

Well, for payment you have to use the BitPay, Electron Cash or Badger wallet.

Good luck!

Private Key Lost and Password


Private Key Lost


MyEtherWallet does not manage accounts with information such as passwords, private keys, or e-mails. To ensure your security and privacy, no sensitive data has ever been saved, stored, or sent when you use MyEtherWallet. 

We only have access to information that is publicly available on the blockchain. We don't have a server and we don't own your assets.

Only users themselves can access and control their funds - this is the goal of a decentralized network. Your funds are stored on the Ethereum blockchain itself, and we are just an interface that allows you to easily interact with it. The password and private key are in the user's hands and are the user's responsibility.

Unfortunately, this means we cannot:
๐Ÿ—ธ Restore your private key
๐Ÿ—ธ Access your account
๐Ÿ—ธ Recover or reset your password
๐Ÿ—ธ Reverse or cancel a transaction
๐Ÿ—ธ Restore your account
๐Ÿ—ธ Send your ETH or Token from one address to another

It might be possible that you saved your Keystore / JSON file without realizing it. We recommend:
๐Ÿ—ธ Do a complete search of your computer for 'UTC–' and see if the file appears.
๐Ÿ—ธ Do a complete search of your computer for your address, without 0x at the start.
๐Ÿ—ธ If you know when you created it, see all the files during that time period for each document or screenshot.
๐Ÿ—ธ Generate new wallets through our interface and see various options that you might have downloaded or saved. Sometimes, stepping back can help put your memories together.

In the future, we strongly recommend that you use our companion application MEWconnect, or purchase a hardware wallet for higher security. If you must use a private key, print the paper version from your wallet, store it in several physical locations, and only use it with the offline version of MEW.

You can read more about how to safely back up your wallet here. Create New!

Private Key Not Working


Make sure there is no space at the beginning or end of your private key. We validate based on the number of characters. The private key has 64 characters, calculate to make sure you have all 64. If you have saved another version (eg UTC / Keystore file) it might also be worth trying the file. For more information on how to use Keystore files, learn how to access your wallet.

Make sure you type your private key carefully and accurately. One wrong character will open a different wallet than yours.

Some wallets, such as Output, can export private keys that start with 0x. If you delete these two characters from the beginning, you might be able to access your account.

For reference the private key looks like this:
afdfd9c3d2095ef696594f6cedcae59e72dcd697e2a7521b1578140422a4f890
Ledger Nano X.

Ledger Nano X - Restore from a recovery phrase


Return the Ledger Nano X device from your recovery phrase to recover, replace, or back up your Ledger hardware wallet. Ledger Nano X will recover your private key supported by your secret recovery phrase.

Or, set it as a new device to generate a new private key and write a new recovery phrase.

What do you need

  • The Big Book Nano X.
  • Get a recovery phrase to recover. BIP39 / BIP44 recovery phrases supported.
  • The device is at least an iOS 9 or Android 7 smartphone or a computer with at least Windows 8 (64-bit), macOS 10.8, or Linux.
  • The Ledger Live application is downloaded and installed.

Step by step

Ledger Live displays interactive settings commands. Simply open the application to get started.

Step 1. Restore from the recovery phrase

  1. Press the button next to the USB port until the Ledger brand seems to show on the device. Important note: If you keep pressing the button, you will access the "Bootloader" menu. You must turn off the device and restart.
  2. Read the instructions on the screen. Press the right button to continue or the left button to go back.
  3. Press both together when Restore from the recovery phrase is displayed.

Step 2. Select your PIN code

  1. Press both buttons when Select PIN code is displayed on the device.
  2. Press the left or right button to select numbers. Press both buttons to validate the numbers.
  3. Select ✔️ to confirm your PIN code is 4 to 8 digits. Select ✖️ to delete numbers.
  4. Enter the PIN code again to confirm.

๐Ÿ›ก️Security tips

✔️Choose your own PIN code. This code unlocks your device.
✔️Use 8 digits for optimal security.
✔️Never use the device that came with the PIN code and / or recovery phrase.
✔️Contact Ledger Support if there are doubts.

Step 3. Enter your recovery phrase

  1. Select the length of your recovery phrase (12, 18 or 24 words). Press both buttons to validate. Make sure the correct length of the recovery phrase is selected. Always enter all words from the recovery phrase.
  2. Enter the first letter of Word #1 by selecting it with the right or left key. Press both keys to validate each letter.
  3. Choose Word #1 from the suggested words. Press both buttons to validate.
  4. Repeat this process until the last word of your recovery phrase.
  5. Your device is ready to display after you successfully complete the setup process. Press both buttons to Access the Dashboard. You will then arrive at the Dashboard.

๐Ÿ›ก️Security tips

✔️Anyone who has access to your recovery phrases can take your assets. Store safely.
✔️The ledger does not store your 24-word backup. Make sure you are the only holder.
✔️Never use the device that came with the recovery phrase and / or PIN code.
✔️Contact Ledger Support if there are doubts.

Invalid recovery phrase?

  • Make sure the correct length of the recovery phrase is selected. Always enter all words from the recovery phrase.
  • Make sure the order of words entered on the device matches the order on your Recovery sheet.
  • Check that all words from your recovery phrase are in the BIP39 word list.

๐Ÿ›ก️Security tips

When you don't use Ledger Nano X, make sure to lock it to make sure no one else can use your device.

The next step

You have successfully recovered the private key that is linked to the recovery phrase on your device.
  • Check these tips on how to secure your recovery phrase and PIN code.
  • Install the application on your device and add an account on Ledger Live.
  • Receive and send crypto assets.

Good luck, hopefully this explanation can help you.

https://www.coincryptoasia.com/2019/10/how-to-create-erc20-token.html
Create ERC20 Token.

Step 2 - How To Created ERC20 Token?


In the first step, we explained how to design an ERC20 token code. Now we are entering the second stage of How to Make ERC20 Tokens.

Download MetaMask chrome extension to generate a wallet. This is going to be the owner of the smart contract. Alternatively you can always use Mist or My Ether Wallet. For the sake of simplicity let's use MetaMask extension in this project.

Once you download the extension, go ahead and create a new account protected by a password. Then choose "Ropsten TestNet" from the top left corner. Before we deploy the contract to Main Ethereum blockchain, we'll test it against TestNet and make sure everything works as expected. It looks something like this:

Ropsten Test Network

Now head over to Remix Ethereum (an online solidity compiler and debugger) and paste the code you just modified. Ignore any warnings you see. Next go to settings and uncheck "Enable Optimizations" if it's checked.

Now go to "Run" tab and click on Deploy under .

PLUGIN MANAGER

After you press Deploy, MetaMask will ask you to buy several ether tests and send the transaction. It looks like this:

Confirmed MetaMask

Make sure you are on Ropsten TestNet and not on MainNet then press Submit. Now open MetaMask again and click on the first transaction. This will take you to Etherscan where you can observe ongoing transactions. Up to 30s are required to confirm a transaction. Once confirmed, it looks like the following:

TX Etherscan.io
Create Smart Contract

You just deployed your contract. Note the address on the above transaction page. That's your contract address.

Step 3

Add your token to MetaMask. Copy the Contract Address, open MetaMask -> Add Token and Paste the Address. This looks like the following:

ADD Token

Congratulations, you just made an ERC20 token, in TestNet mode. If you have questions, please leave a message in the comments column below. Hope it is useful for you. Thanks.

Update: The Remix IDE has moved to http://remix.ethereum.org. This instance of Remix you are visiting WILL NOT BE UPDATED. Please make a backup of your contracts and start using http://remix.ethereum.org