When I upload a file via SSH to my VPS server with Beeline mobile internet connection, the speed is about 300KB/sec – 800KB/sec:

When I upload a file via SSH to my VPS server with Beeline mobile internet connection, the speed is about 300KB/sec – 800KB/sec:
sudo apt install ejabberd
ufw allow to any port 5280 proto tcp
ufw allow to any port 5222 proto tcp
ufw allow to any port 5269 proto tcp
ufw allow to any port 7777 proto tcp
sudo nano /etc/ejabberd/ejabberd.yml
##
## hosts: Domains served by ejabberd.
## You can define one or several, for example:
## hosts:
## - "example.net"
## - "example.com"
## - "example.org"
##
hosts:
- "developernote.com"
...
###. ====================
###' ACCESS CONTROL LISTS
acl:
##
## The 'admin' ACL grants administrative privileges to XMPP accounts.
## You can put here as many accounts as you want.
##
admin:
user:
- "admin": "developernote.com"
It is still possible to mine the following on GTX 1060 3GB in November 2020:
coin | dag size | exchange |
BTCZ | 1716MiB | https://crex24.com/ |
ZCL | 2550MiB | https://www.hotbit.io/ |
RVN | 2726MiB | https://www.binance.com/ |
If I use CCXT on my Windows machine I periodically get ‘Timestamp for this request is outside of the recvWindow’ error.
Exchange has the following options by default:
I worked on some Windows app that registers a Windows service with a C++ code like this:
SC_HANDLE hService = ::CreateService(
hSCM, m_szServiceName, _T(SERVICE_NAME),
SERVICE_ALL_ACCESS, SERVICE_WIN32_OWN_PROCESS,
SERVICE_AUTO_START, SERVICE_ERROR_NORMAL,
szFilePath, NULL, NULL, _T("RPCSS\0"), user_name, password);
where user_name and password are strings that are provided by the app user during the app install. Assuming the service name is MyService this creates a registry key HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\_SC_MyService that is hidden by default and even administrator does not have a permission to read it and regedit does not show the content of HKEY_LOCAL_MACHINE\SECURITY key by default. But fortunately the access can be allowed by right clicking on HKEY_LOCAL_MACHINE\SECURITY and selecting Permissions or alternatively by running
Enable-TSDuplicateToken
in PowerShell. To list the content of the key I used the following command:
dir HKLM:\SECURITY\Policy\Secrets\_SC_MyService