Home » huobi listing » Utter chain sync vs.

Utter chain sync vs.

Full chain sync vs.

Automation is all about… sharing!

Thought I’d write a postbode about a topic that is more flourishing now than everzwijn, what to know about and how to trade CryptoCurrencies.

Disclaimer: I’ve written this article to the best of my skill, If i’m misinformed or talking nonsense, or you would like to have some information added please be so zuigeling to inform mij te a adequate manner te the comment section.

This article is intended for people who are looking for information on where to embark if they have any rente te CryptoCurrency.

Basically, CryptoCurrency spil wij know it te 2018 exists and is related to the following topics:

  • Blockchain
  • Initial Coin Offerings (ICO’s)
  • What are Brainy Contracts
  • Trading
  • Exchanges
  • Participation

Wij will go deeper into thesis topics one by one after the introduction.

So I’ve become conocido with CryptoCurrency and mainly Bitcoin spil the very first blockchain cryptocurrency back ter 2012. Bitcoin then already existed for two years and had build a reasonable reputation of something of value. But it is only since May 2018 that I have become truly involved with CryptoCurrency spil an investment for the future, and participating ter one of the many communication methods used by CryptoCurrency owners and traders.

So if you are looking to begin investing, buying, trading, but also working with or on a blockchain solution where would you embark?

What is blockchain?

Very first you would need to understand (if it has your rente to understand it at least) what blockchain is, and what it does. The very first initial idea of blockchain can be compared with a database. Traditional database like wij know them te IT ifrastructures are central, blockchain however is different, it’s decentral. Nobody own’s it, yet everyone is identically significant merienda involved. This means that everybody can become part of the chain. On this database transactions occur just like on a regular database. Thesis transactions are not financial transactions they are just deeds that tell the system what has happened. But spil soon spil a transaction is executed all peers te the network become aware of the transactions and it becomes irreversible. A CryptoCurrency makes use of this proces to send tokens around, and thesis tokens posses some kleintje of value (which wij will discuss zometeen on).

Blockchain usage

Blockchain isn’t solely intended for sending tokens with value around the network. At this ogenblik numerous big companies like Microsoft, IBM, Google, Amazon but also banks and other very large enterprise companies have shown rente te blockchain. One of the most relevant examples of how blockchain can be used, is sea-container company “Maersk” who is working closely with Microsoft and IBM to investigate the usage of blockchain into their company. By what I have heard and read it is used for the insurance process of sea-containers.

Presently this is a process which needs to be ran by 40 stakeholders before a sea container is permitted to ship. 40 Stakeholders which are even identically significant, but are slowed down by a bureaucratic process. This is where blockchain comes te, to speed up the process but also make it more reliable and less fraudulent. Merienda a transaction occurs it is acknowledged by its peers and after a certain number of confirmations becomes irreversible, making it basically incorruptible.

A massive hype ter the blockchain ‘world’ nowadays are Initial Coin Offerings or ICO’s

Thesis ICO’s are basically comparable with start-ups or campaigns to kickstart a venture, raising funds to proceed with the development of the company. Overheen a period of Four months a large amount of fresh cryptocurrency have risen each claiming key features and functionality incomparable with other cryptocurrency. An ICO is funded by exchaging cryptocurrency for their own token. For example on the ethereum network ETH tokens are send to an address and ter terugwedstrijd the sender will receive a number of tokens te the freshly developed cryptocurrency.

A normal trend is that people invest intensely te thesis ICO’s to dump them spil soon spil possible they come available on a cryptocurrency exchange. Usually ter the very first hours after a release on thesis exchanges the coin increases ter value but wouldn’t hold it’s position too long before people metselspecie out.

Latest developments have lead to the banning of ICO’s ter the China area. Spil Chinese people are claimed to be famous gamblers, Chinese government has determined it is barred for Chinese people to participate te ICO’s.

Clever Contracts is something made possible on the blockchain. It is nothing more then an agreement inbetween two parties, where the blockchain is used to control under which circumstances the transaction is executed. Let’s say I want to order a pizza at Domino’s. I can setup a clever contract and send it to the blockchain. Te this contract I make the following requests:

  • The pizza is delivered at my house
  • The pizza needs to be fresh and warm
  • The pizza needs to have tomatoes and cheese on it

Ter terugwedstrijd I’ll send an amount of tokens with the specific amount of value I have agreed with Domino’s overheen the network. Spil soon spil Domino’s meets my requests, the tokens are released.

This is a brainy contract te it’s simplest form. For more informatie, please see: What are Brainy Contract?

Since the rise and fall and rise again of Bitcoin each fresh All Time High (ATH) has generated attention for bitcoin itself spil CryptoCurrency ter it’s entire. Spil wij can see by coinmarketcap.com historical snapshot, te 2013 there where 7 coins listed. Presently there are overheen 850+ cryptocurrencies available for trading.

The basics of trading cryptocurrency is spil following:

Money (which wij will call FIAT) needs to be deposited either at an exchange through wired SEPA transfer, or via paypall or via other websites which enable you to buy bitcoin or other cryptocurrencies and send it directly into a wallet.

So FIAT &gt, Exchange &gt, Wallet

Your wallet exist out of an address which is hexadecimal and is generated merienda you open up a wallet, or deposit currency on a exchange. This address is public and for everyone to see. If I have the address I can list how much currency it presently possesses and which transactions have bot executed towards or away from the address. So basically my canap account is out ter the open and visible, but since there is no rechtstreeks relation inbetween the address and mij, nobody know’s which address belongs to mij or someone.

Now you say, they know my handelsbank account, can’t anyone hack into this? No, not unless you give your private keys to this person. Each wallet generates a private key. This private key again is a very long string which holds all the information to your wallet. With this key I can access the wallet and control it. This means receiving or sending currency which is available on this wallet.


If you want to trade ter your cryptocurrency back to FIAT or another cryptocurrency this can be done at an exchange. This means you need to send out an amount from your wallet to an exchange. If your currency is already on a exchange, you can skip this step and exchange it right away to another currency.

There are a number of large exchanges around at this time (Sept. 2018)

  1. Bitfinex $505,867,176
  2. Bittrex $445,875,834
  3. Poloniex $249,425,157
  4. Kritiseren $214,885,074
  5. Bitstamp $140,261,655

Spil you can see the exchanges Bitfinex and Bittrex are the fattest exchanges, Bitfinex trades around 35 cryptocurrencies and Bittrex around 257! different cryptocurrencies.

Personally I have practice with the following exchanges: Bittrex, Poloniex, Losbreken. I’ll list my individual voor’s and con’s about thesis exchanges here:


  • Margin trading, also available for a certain amount of alternative coins like NEO
  • Rapid interface with instant trades
  • Long and welvoeglijk track record. The exchange has bot hacked before but responded accordingly
  • Mobile Application
  • Not many altcoins, more attention for the big coins
  • Margin leverage to a maximum of Trio.Three


  • Quick
  • Reliable
  • High number of cryptocurrency
  • USDT available
  • Basic Account withdraw Three BTC vanaf day
  • No withdrawal to FIAT possible


  • Withdrawal to FIAT possible
  • Stop-loss and Take-Profit orders or combination of both
  • Support is quick on promedio with tier verification
  • Webstek will become slow and unusable during critical times (te case of prompt increase or decrease of cryptocurrency value)


  • BTC lending
  • Margin trading
  • Stop-limit and combined orders
  • Support is slow and doesn’t react very quickly
  • Withdraw is limited to 1000 USD a day

Each exchange has common functionality such spil buying or selling currencies but some exchanges stand out with special features such spil lending, margin trading, going long or brief

Each exchange works with pairs inbetween cryptocurrencies, this means Bitcoin and another currency or Ethereum and another currency. This means to exchange inbetween currencies you need to very first go back to Bitcoin or Ethereum before you can engage ter another currency.

Example, I’ve purchased Bitcoin somewhere and want to invest te Litecoin, I need to go to an exchange and exchange the desired amount of Bitcoin to Litecoin. Zometeen on I determine to invest te Ethereum. I then very first need to exchange Litecoin back to Bitcoin before I can buy Ethereum.

Most of thesis exchanges if not all wield and API which enables you to control what happens with your currency remotely, with some self written code or perhaps you have purchased a bot.


Cryptocurrency can be held ter wallets, thesis wallets are a hexadecimal address that represent an address on the blockchain. Spil soon spil a wallet address is generated it becomes part of the blockchain basically to never vanish everzwijn again. Merienda a address is generated it can be traced indefinitely. It is publicly available and will tell how much currency is held onto the address. So are your coins on this wallet? No, your wallet is secured with a private key and depending on the software has options to secure access through a passphrase, a 12 word sentence or just a password you make up of your own. This information is needed to access your tokens, but the tokens itself aren’t physically present on your wallet which you may have installed on your phone, rekentuig or airgapped device. It’s just some chunk of information you own, so you can prove you are the holder of the amount of tokens that is residing on that specific address.

Private Keys

Each wallet possesses a private key, this is also a very long string of characters which is basically all the information that is needed to access the address on the blockchain and enables you to deposit, withdraw and transfer currency on the blockchain. Usually a wallet is secured with a password, or 12 or 24 word passphrase.

Paper Wallet

People often speak about a paper wallet which you can securely store te your house, or at a bankgebouw locker/safe. This is nothing more and nothing less than thesis 12 or 24 words written down on a lump of paper.

Utter chain sync vs. light wallets and multi wallets

Back ter the days when there were only a few cryptocurrency values that each had their own blockchain, ter order to participate you needed to download the entire blockchain onto our laptop. Nowadays the blockchain size for Bitcoin is 133 GB (spil of september 2018).

Today there are many solutions ter participating te the blockchain, there are so called total, prompt and null wallets. So total wallet wil actually sync the entire blockchain to your laptop opposed to swift or light wallets which will do a partial sync. And then there are null wallets which don’t have to sync

Let’s say you want to invest or participate te a cryptocurrency, what would be the best places for you to begin?

Big sources for information are Bitcointalk, Reddit and the Slack channel of a currency team. Also the currency’s webstek, roadmap and whitepaper are a vereiste read to predict what is coming. Do research of how the course rate responded after news became public, but don’t leave behind all alternative cryptocurrency is related to the big one: Bitcoin. There aren’t much coins which price isn’t influenced by the course rate of bitcoin.

  • Buy low / Sell high
  • Hold a coin you belief te
  • Define a strategy


  • Sell low(er than you have bought for) (duh!)
  • Be greedy (be sated with Five, Ten, 20%)
  • Buy during or after a pump (likely it will fall back right after)
  • Organize or participate ter pump & dumps (I will explain this one more extensively right after)
  • Trade with emotion (again I’ll dedicate some words to this)
  • Inject your private keys anywhere, everzwijn.

Safe Strategy

Upon injecting the cryptocurrency market it is good to set a predefined target on when you will get out of it. For example, determine to get out of a coin or the market entirely on a profit percentage of 20%. This helps you control your emotion (see Dont’s) and lets you make a rational decision and still feel good about it. Coming in the cryptocurrency market spil a ‘newbee’ is almost like coming in a gokhal to play a spel of roulette. Based on your emotions you want to increase your stakes and profit, and want to make up for your losses when things went sideways. By setting a purpose or defining your strategy you’ll be able to cope with your emotions.

Pump & Dumps

I thought I devote an entire section to pump and dumps and why you should be carefull with it. Since the cryptocurrency market is an unregulated market which has no control or authority to control it or have say overheen what is ok and what not, there is an entire world underneath the surface of people attempting to take advantage overheen other people. Just like the vivo world!

Pump and dumps are a coordinated scheme to increase and decrease the value of a cryptocurrency overheen a brief period of time. Usually thesis p&d’s are coordinated te telegram, whats-app and or private slack channels. Usually there is one person or a team who dictates the pump or dump and others go after. Spil the value embarks to increase or decrease it draws the attention of other people that are already invested ter or want to invest. Thus creating basically a ponzi scheme to facilitate financial gains overheen thesis people. The person or team that initiates the pump or dump gains the most, spil others go after. Then there are the people who are unaware of what is happening, and usually they pay the price (the money needs to come from somewhere, where their is build up there is loss)

I’m not a moralist, but be aware that participating ter thesis schemes comes at a price and has it’s risks. And presently since there is no regulation possible, thesis people are untouchable, but spil soon a relationship can be created inbetween an individual spil te knowing who this person is, and your wallet addresses I’m not so sure thesis people are untouchable any longer.

Trade with(out) Emotion!

A big share which comes with FOMO (fear of missing out) is emotion! The one that always bites you te the culo when it comes to making rational decisions. Can you trade without emotion? Without fear? Since there are no ensures which way cryptocurrency goes. It can go up or down, and what do you do when you are intensely invested ter a coin?

  • HOD’L originated from this thread on bitcointalk and has gone ‘virulento’ amongst cryptocurrency traders meaning, they will hold their currency for a longer period
  • FOMO which means: Fear of Missing Out, this usually occurs when currency is at an exceptional low price and you wish you had some funds available to buy them, or when a currency is ‘mooning’ and you don’t wield any of it
  • FUD which means: Fear Uncertainty and Doubt, FUD is widespread, nowadays with fake news it is very effortless to manipulate cryptocurrency value by spreading rumors to create fear, which will lead to uncertainty and doubt for cryptocurrency holders to stay ter the currency for the upcoming period. So FUD is spread to create a movement. Unexperienced traders are lured into selling their investments while more experienced traders will go along for the rail
  • ATH, means: All Time High, the highest value a cryptocurrency has everzwijn had
  • 24 High and Low can be seen on some exchanges to see what a currency did overheen a time span of 24 hours.
  • Moon or mooning, when a currency rises exceptionally to fresh hights
  • Pump and Dump, when a coin is massively bought or sold this affects the course rate and value of a currency. Pump and Dumps are often organized te private slack channels or telegram and whats-app groups.
  • Alts (spil te alternative coins, spil te altcoins, spil te any coin other than Bitcoin)

I hope you’ve found this article very useful on your way towards cryptocurrency trading. I would appreciate it if you would be so zuigeling to leave a comment if this has helped you ter any way.

After latest events ter the online world, everybody is te a madness patching their servers, disabling SMB1, removing the feature from Windows Ten and Windows Server 2012 R2 (after It should have bot done way way before). So wasgoed I. This week’s priority at the customer I’m working for is entirely dedicated to patching servers (if they weren’t patched prior to WannaCry, which wasgoed a puny percentage nevertheless) and disabling and removing the SMB1 feature on all the machines.

After patching and removing the feature (directly instead of just disabling it very first) on a Windows 2012R2 Server, I discovered I couldn’t browse to the server any longer. Each time I did a: “\\sctxps-01\d$” (which is a Citrix Provisioning Services Server) I got a message the server couldn’t be reached:

After hitting some key phrases on Google and finding the recommendations of Microsoft, it struck mij. The Set-Command: “Set-SmbServerConfiguration -EnableSMB1Protocol $false” which configures SMB to be turned off, can also be partially used spil a Get-Command to see it’s current states. And look what wij found:

It appeared SMB1 Protocol wasgoed still turned on, however due to the removal of the feature entirely from the Server, the machine wasn’t reachable any longer through UNC, IP and even localhost. After hitting the directive: “Set-SmbServerConfiguration -EnableSMB2Protocol $true ” the server could be reached again.

It appeared someone had configured SMB1 before and turned of SMB2. Due to the removal now the servers SMB shares couldn’t be approached any longer overheen the network.

So please check your SMB status with: Get-SMBServerConfiguration before doing something drastic like removing SMB features. Of-course te an ideal world this would all be planned, risk, influence and analysis etc. But te an ideal world their wouldn’t be any Cryptolockers either.

Something I’ve had on my blogroll for a long time and now eventually found some time to write about it.

This little ini opstopping is very significant te the process of MDT doing what it does. Spil some of you may know, MDT uses a standard WinPE photo which will be modified on the fly during the “update deploymentshare process” where boot photos are generated, drivers embedded, the wallpaper and reserve files are set.

After booting the WinPE photo it will automatically embark a VB script and call the parameters attempting to connect with the deploymentshare. This all starts with WinPEshl.ini.

After installing the MDT software on your workstation or (management) server, you will find the ini verkeersopstopping on a special location: C\Program Files\Microsoft Deployment Toolkit\Templates.

When you open the opstopping the contents are spil following:

Now for example let’s say you would want something to execute prior to kicking off the process of connecting to the deployment share, you have some options:

  1. Modify the WinPEshl.ini
  2. Modify the MDT generated boot photo after deploymentshare update
  3. Modify the default boot pic

The default boot photo which MDT uses spil saco for the modified MDT boot picture can be found te the following two locations:

  1. x64: C:\Program Files (x86)\Windows Kits\Ten\Assessment and Deployment Lijm\Windows Preinstallation Environment\amd64\en-us
  2. x86: C:\Program Files (x86)\Windows Kits\Ten\Assessment and Deployment Lijm\Windows Preinstallation Environment\x86\en-us

Ter my opinion it is best to stick with modifying the WinPEshl.ini for several reasons:

  1. Its traceable, effortless documented by telling locating there and there is modified with x and y
  2. Its consistent, if you are altering a MDT generated and updated boot pic, you need to do this every single time when you entirely regenerate the boot photos. I believe that when you are merely updating the existing photos nothing switches
  3. It’s considerably quicker to modify the ini verkeersopstopping, then mounting a wim photo with dism providing its customizations.

So what customizations are wij talking about here, well I have encountered the following requests:

  1. Running scripts such spil placing DNS suffix priority te a numerous domain environment
  2. Running scripts to wipe the disk entirely (for particular machines) preventing the dirty environment found error pop-up
  3. Running diagnostic tasks, password scripts etc.

So to end this, I think WinPEshl.ini is a need little verkeersopstopping that has a phat responsibility ter the process of MDT which can lightly be altered to accomplish things that need to go outside and before the deployment process takes place.

So, yeah latest events at a customer lead mij to writing this article for my own purposes of documenting what I did and sharing this with you to prevent the frustration I’ve encountered.

Lets just say Adobe isn’t that keen on using its software ter a SBC environment or VDI infrastructure. Or you might say they still have the perception of the traditional stand alone work-space. -This is just my opinion

Using a product such spil Adobe Acrobat DC requires activation for every single user that uses it, perhaps you have encountered it before. Upon beginning Adobe Acrobat, the program closes itself and you are prompted with the following screen:

This to mij is just unfeasible ter a SBC or non-persistent environment, I guess that’s why this application gets packaged into a Microsoft App-V or VMware thinapp so often.

But since wij toevluchthaven’t got thesis contraptions to our possession wij needed a different solution. This solution can be found by using adobe_prtk.exe which is part of the Adobe Provisioning Toolkit.

Very first of all wij discovered the customer had a single user license, which will get you nowhere if you want to activate the product for numerous users. Adobe is software that cannot be lightly fooled around with (which is a good thing from a anti-piracy standpoint).

So after a quick talk with Adobe support and the software distributor, the client purchased a volume license based on the English language (since this wasgoed cheaper).

Now wij where able to activate and stream the license (that’s the way Adobe works) to the machines. To do this wij will need the following things:

  1. The serial number
  2. Grant an offline exception for the product through the Adobe Customization Wizard
  3. Know if the product is Resumes Track or Classic Track (see here)
  4. License ID or LEID (see here)
  5. The guideline lines

Spil I said before you’ll need a volume license serial number, the track the customer had or used wasgoed “Continuous” and the accompanying “LEID” is: “V7<>AcrobatESR-12-Win-GM”

This leads to the following directive line for Adobe_PRTK.exe: “Adobe_prtk -tool=VolumeSerialize -generate -serial=XXXX-XXXX-XXXX-XXXX-XXXX-XXXX -leid=V7<>AcrobatESR-12-Win-GM -regsuppress=ss -eulasuppress”

Spil you can see, the Terugwedstrijd Code is “0”, which is a good thing. After running the directive above a prov.xml is generated. This verkeersopstopping holds the license information. This “prov.xml” opstopping on it’s turn can be used to stream the activation of Adobe Acrobat against machines that are non-persistent such spil a VDI work-space, Citrix XenApp MCS or PVS etc.

The directive line to use the prov.xml is: adobe_prtk.exe” -tool=VolumeSerialize -provfile=”prov.xml” -stream

Again if everything is successful the Comeback Code will be “0”. Wij have created a job that after every boot or reboot the guideline line above is executed against every machine Adobe Acrobat is installed on.

This will resolve the “sign-in required” screen ter your user sessions. The activation is machine based, however make sure people cannot begin Adobe Acrobat more times then you have licenses for.

This situation resolved the activation issues with the customer. However there wasgoed one oddity happening which wij have recently discovered. If you have supplied alternative languages ter the Adobe Acrobat Customization Wizard DC, you will need to provide and purchase a license te the desired language. So if you want to have a Dutch Acrobat installation, purchase a Dutch license (licenses te other languages emerge to be more expensive then native English).

Our software distributor provided a English license because this wasgoed cheaper for the client, but when the client switched the desktop from English to Dutch, Adobe needed activation again, the presently streamed license wasgoed insufficient and the “Sign-in” required screen prompted again. To avoid this make sure you will only install the English language.

After returning the question to the software distributor the terugkoppeling wasgoed spil following:

Purchase the language you desire and English is always available, purchase a English only license and no other language can or may be selected.

Hope you find this useful and it will save you time and energy.

– Something wrong? Did I mess up, talking BS or got another trick up your sleeve? Please let mij know te the comment section!

…You get my point right?

Spil a core prerequisite for Microsoft’s Deployment Toolkit Windows Automated Installation Kolenkit (WAIK) successor: Assessment and Deployment Lijm (ADK), count’s numerous versions out there wandering the interwebs. Spil I’m always looking for the latest version available whenever I perform a Microsoft Deployment Toolkit implementation, I thought it would be nice to create and maintain a list of the most latest versions of ADK out there.

I went on a little investigation and came to the following table:

Leave a Reply

Your email address will not be published. Required fields are marked *