## Mining software – problem connecting Slushs Pool to GUIMiner. I tried to connect many host addresses every time the target computer explicitly refused

I'm on Windows 10 with GUIminer, I want to mine mine on the slush pool, but every time I enter any host address, I saw that it didn't work on the slush pool. I entered the correct login for my miner and on GUIminer it says that the target computer has expressly rejected this. I also have Bitcoin Core and I haven't completed the download. Bitcoin core and GUIminer are in trouble on my external drive?

So what's the problem and how can I fix it please. Thanks a lot.

## Computer architecture – should a solid-state hard drive cause grating work noise?

I use heavy software. Mostly 3d. I'm used to the soothing sound of a hard drive that sounds like a popcorn popper.

But I just got my first Lenovo with a solid-state hard drive. Model KXG6AZNV512G TOSHIBA
to be exact.

It makes high-frequency cracking noises … even one after the other with every key press (Firefox browser, 1104 memory usage).

Impressive.

When I use zbrush, I hear a buzz every time the model is turned.

Is that normal?

## Entities – Is there a possible conflict for fields with the same computer name?

I'm trying to debug a paragraph that doesn't show any fields and I have

/ admin / reports / fields

one and the same machine name for a field in 3 different paragraphs

``````field_call_to_action_ref    paragraph   Entity reference revisions (module : entity_reference_revisions)

Bloc compositeParagraphe standardElement d'accordéon
``````

## Will learning integrated circuits help me be a better computer architect (long term)?

I don't know if this is the right place to ask this type of question, but here I am and thinking about learning integrated circuits to learn more about computer hardware in general (but more focused on its architecture / hardware) I am losing my time learning integrated circuits? (I plan to read the following book: "Analysis and Design of Analog Integrated Circuits, 5th Edition"). Thanks for the answers.

## tls – client certificate and key store on the client computer

Related to a question I posted here, but thought it would make sense to ask it here.

Basically, I'm developing a web application that displays a dashboard with sensor data from an installation that uses MQTT. I have deployed a certificate delivery system that provides server and client certificates (microcontrollers) in this installation. The broker I use is Mosquitto. In the configuration file I added an option with which the clients have to display a valid client certificate during the TLS handshake. Storing the certificates and keys in the microcontroller or during installation in general is not a problem as I have control over these devices to maintain and secure the system. However, this is not the same for the web clients.

Ideally, the Mosquitto broker should include an option that does not require some clients to be forced to provide a client certificate during the handshake, but rather a username and password. I have not found the way to do it.

My idea for the web app is to have two levels of security:

2. Access to the Mosquitto broker as soon as the user is logged in via the client
Certificates

The client certificate and key are only sent in two cases: initial registration and certificate renewal. So there is no way to request a certificate outside of these two cases.

If someone can get the username and password, they still need to create a certificate to view the MQTT data. If a malicious user can steal a valid certificate and key, they still need a valid username and password combination. Is this okay for security reasons?

How can private keys be properly stored to access a (your) system in a client computer over which you have no control?

## What is the maximum storage capacity of a MariaDB / MongoDB on a computer with very limited RAM?

How much data can be stored on a computer with very limited RAM (1 GB) regardless of performance? Run MariaDB / MongoDB.

Is it possible to use a Raspberry Pi 3 with a 1 TB hard drive connected to store 1 TB of data?

## Computer architecture – how quickly can 10 integer multiplications be performed?

This is self-study, but not homework. I check some slides I found online and came across the following question.

## Question:

When the latency is the integer multiplication $$3$$ and the cycles / output is $$1$$ then

1. How fast can 10 independently to run int mults?
$$t_1 = a_1 * b_1 quad t_2 = a_2 * b_2 quad t_3 = a_3 * b_3 quad cdots quad t_ {10} = a_ {10} * b_ {10}$$
2. How fast can $$10$$ sequentially dependent to run int mults?
$$t_1 = a_1 * b_1 quad t_2 = t_1 * b_2 quad t_3 = t_2 * b_3 quad cdots quad t_ {10} = t_9 * b_ {10}$$

## Attempt:

Obviously, the sequentially dependent case takes longer because each multiplication has to wait until the previous multiplication is complete. I'm not sure how exactly to interpret latency and cycles / problems in this context. My attempt.

1. Each multiplication lasts $$3$$ Cycles, but we can multiply each cycle again (can we?), So we need $$3 + 10 – 1 = 12$$ Cycles?
2. It would take naively $$30$$ Cycles when we wait for the previous one to finish. However, it seems that we could do better. For example

• $$t_1$$ first
• $$b_2 * b_3$$
• Wait a cycle
• $$t_2 = t_1 * b_2$$
• $$t_3 = t_1 * (b_2 * b_3)$$

So the first one $$3$$ Multiples can be done in $$7$$ Cycles instead $$9$$. I think I just have to see that a problem is solved and I will be able to find out what's going on.

## Computer architecture – can someone in cyber security or IT help answer this basic question about changing today's malware?

1.] In the past, Trojans and various other types of viruses that came from your own email on a desktop were the most common types of malware. Given the amount of time since those days, the game has changed. Nowadays, the ways to violate a user's data have changed drastically. What are the most common methods an average person should know today?

## ffmpeg – Connect Firebase to a computer to run programs for it

I am currently using Firebase to save video files sent by an app so ffmpeg can stitch them together and return a finished video. However, ffmpeg will appear to be consuming all of the allocated CPU usage of Firebase's cloud features, since video files are large and may time out. For this reason, I want Firebase to send a request to a computer that downloads the video files, executes ffmpeg to merge them, and then uploads the finished file back to Firebase. App Engine and Compute Engine are not available due to cost reasons.

Is there any way to do that?

Sorry if I missed an obvious solution. I am very new to working with servers in general.

## Programming Languages ​​- Could someone from the fields of computer science, cyber security or IT help answer these frequently asked questions about the changing field of online security?

I am writing an English essay on the discord communities of computing and security and I wanted some honest and legitimate answers to the following questions. Do not be afraid to speak openly in the colloquial language or in the lexicon of your specialist area. These are pretty open questions. The more detailed you are with your own experience and work, the better the content of this essay will be. Thank you so much!

1.] In the past, Trojans and various other types of viruses that came from your own email on a desktop were the most common types of malware. Given the amount of time since those days, the game has changed. Nowadays, the ways to violate a user's data have changed drastically. What are the most common methods an average person should know today?

2.] Nowadays smartphones are perhaps the most widespread and integrated mode of PCs. To what extent has cyber security changed fundamentally with these devices? How are they easier to break through and how are they more difficult?

3.] Big data breaches like the remarkable examples at Sony and Marriott have resulted in sensitive data being compromised by users from all over the world. What risks do users take when they register their information online? How much trust can these organizations be given in collecting data and what steps can a user take to protect themselves?

4.] Phishing attempts are often successful in which a user gives an attacker his password and his personal data. How can a user guarantee that they will not work with a shameful attacker when they need IT support?

5.] Third-party software is an extremely common form of malware infection of a user device. How can a user know that the downloaded material is safe because the downloading of apps and software is done by almost everyone on any device? What checks can someone do on their devices to make sure they're malware-free?