The Curse of Monkey Island Guide

 

cursemonkeyisland87.jpg

Once again Guybrush Threepwood is caught in a mess with Voodoo Zombie Pirate LeChuck! But there is a twist, he also accidentally cursed his wife Elaine by turning her into a gold statue. Explore the mysteries of Plunder Island, solve clever & silly pirate puzzles and interact with the residents.

cursemonkeyisland83.jpg

Follow my step-by-step guide on installing and configuring The Curse of Monkey Island in Linux with PlayOnLinux.

Note: This guide applies to the GOG version of The Curse of Monkey Island. Other versions may require additional steps.

Tips & Specs:
To learn more about PlayOnLinux and Wine configuration, see the online manual: PlayOnLinux Explained

Mint 18.3 64-bit

PlayOnLinux: 4.2.12
Wine: 3.0

Wine Installation
Click Tools

Select “Manage Wine Versions”
wine01.png

Look for the Wine Version: 3.0

Select it
Click the arrow pointing to the right
wine02.png

Click Next

Downloading Wine

wine04.png

Extracting

Downloading Gecko

wine05.png

Installed

wine06.png

Wine 3.0 is installed and you can close this window

PlayOnLinux Setup
Launch PlayOnLinux

Click Install
cursemonkeyisland01.png

Click “Install a non-listed program”

cursemonkeyisland02.png

Select “Install a program in a new virtual drive”

Click Next
cursemonkeyisland03.png

Name the virtual drive: cursemonkeyisland

Click Next
cursemonkeyisland04.png

Check all three options:

 

  • Use another version of Wine
  • Configure Wine
  • Install some libraries

Click Next
cursemonkeyisland05.png

Select Wine 3.0

Click Next
cursemonkeyisland06.png

Select “32 bits windows installation”

Click Next
cursemonkeyisland07.png

Wine Configuration
Applications Tab

Windows version: Windows 7
cursemonkeyisland08.png

Graphics Tab
Check “Automatically capture the mouse in full-screen windows”

Click OK
cursemonkeyisland09.png

PlayOnLinux Packages (DLLs, Libraries, Components)

Check the Following:

 

  • POL_Install_corefonts
  • POL_Install_d3dx9
  • POL_Install_tahoma

Click Next
cursemonkeyisland10.png

Click Browse

Select “setup_the_curse_of_monkey_islandtm.exe”

Click Open
cursemonkeyisland12.png

Click Next again…

Click OK

cursemonkeyisland14.png

Click Options

Uncheck “Create desktop icon”
Check “Yes, I have read and accept EULA”
Click Install
cursemonkeyisland15.png

Click Exit

cursemonkeyisland16.png

PlayOnLinux Shortcut
Select “scummvm.exe”

Click Next
cursemonkeyisland17.png

Name the shortcut: Curse of Monkey Island

Click Next
cursemonkeyisland18.png

Select “I don’t want to make another shortcut”

Click Next
cursemonkeyisland19.png

PlayOnLinux Configure
Back to PlayOnLinux

Select “Curse of Monkey Island”
Click Configure
cursemonkeyisland20.png

General Tab
Wine version: 3.0

cursemonkeyisland21.png

Note: Click the + to download other versions of Wine. Click the down-arrow to select other versions of WineDisplay Tab
Video memory size: Enter the amount of memory your video card/chip uses

cursemonkeyisland22.png

Run Curse of Monkey Island with Windows SCUMMVM

Select “Curse of Monkey Island”

Click Run
cursemonkeyisland23.png

Note: Click debug to see bugs and errorsSCUMMVM (Windows)
Updates check: Never

Click Proceed
cursemonkeyisland24.png

Click “Add Game…”

cursemonkeyisland25.png

Navigate to C:GOG Games

Select “The Curse of Monkey Island” folder
Click Choose
cursemonkeyisland26.png

Click OK

cursemonkeyisland27.png

Click Start

cursemonkeyisland28.png

Run Curse of Monkey Island with Linux SCUMMVM
Use your package manager to install SCUMMVM

or download from the website:

https://www.scummvm.org/downloads/cursemonkeyisland29.png

Launch Linux SCUMMVM

Click “Add Game…”
cursemonkeyisland31.png

Navigate to the same GOG Games folder: The Curse of Monkey Island

Full Path:

Code:

/home/username/.PlayOnLinux/wineprefix/cursemonkeyisland/drive_c/GOG Games/
Click Choose
cursemonkeyisland32.png

Click OK

cursemonkeyisland33.png

Click Start

cursemonkeyisland34.png

Conclusion:
To play Curse of Monkey Island you only need to install it with PlayOnLinux or Wine, then just launch the Linux SCUMMVM and add the path. Pretty simple! Everything else runs perfectly fine.

Gameplay Video:

Screenshots:cursemonkeyisland80.jpg

cursemonkeyisland81.jpg

cursemonkeyisland82.jpg

cursemonkeyisland84.jpg

cursemonkeyisland86.jpg

cursemonkeyisland89.jpg

Source

Truta: Farewell, Glenn Randers-Pehrson [LWN.net]

[Posted October 25, 2018 by ris]

Truta: Farewell, Glenn Randers-Pehrson

[Briefs] Posted Oct 25, 2018 16:05 UTC (Thu) by ris

Cosmin Truta reports
the death of Glenn Randers-Pehrson. “Glenn is one of the original designers of the PNG format, and a
co-founder of the PNG Development Group, back in the mid-90’s. He took
good care of the PNG Specification, as a contributing author for PNG
version 1.0, and as the main editor for all of the subsequent editions
through PNG 1.1 and 1.2, until the current W3C/ISO/IEC standard PNG
Specification, Second Edition. In addition, all of the related
Specifications, i.e., the registered PNG extensions, and the companion
MNG Specification version 1.0 and JNG Specification version 1.0, had
Glenn at the front as the main editor and moderator-in-chief.”
(Thanks to Paul Wise)

Source

Sparky 4.9 RC | SparkyLinux

Sparky 4.9 RC is out and ready for testing.

The time for next stable point release is coming, which is released 2 times per year, so a release candidate has to be published to make sure all the new features work fine.

Changes:
– all packages updated from Debian stable Stretch repository as of October 26, 2018
– many small changes and improvements; many of them have been done as a result of cooperation with lami07; thank’s a lot Szymon and… keep it doing!

Please test it and report whatever you find.

The stable 4.9 point release should be out on November 11.

The new iso images can be downloaded from the download/development page.

Source

Install Nextcloud on FreeNAS | Linux Hint

Nextcloud

is one of the most popular open source, self-hosted cloud storage alternative. It offers a visually appealing and intuitive frontend for you to access your data remotely. You can install Nextcloud on a local server to share files among your colleagues. Or if you want to install it on a VPS as an alternative to iCloud, Google Drive or Dropbox, Nextcloud can do that too!

Today we will be installing Nextcloud on FreeNAS. For those who don’t know, FreeNAS is a FreeBSD based operating system, specifically designed to be used as a NAS (Network-attached storage). It too comes with a frontend GUI and is often used to share files via SMB, NFS, etc or act as an LDAP server and offer directory services. The best thing about FreeNAS is that it relies on ZFS and so your data is in safe hands.

With FreeNAS as a robust and powerful backbone for managing your data and Nextcloud as a wonderful user-friendly cross platform product, you can have the ultimate cloud storage experience!

To follow along, you need to have:

  1. A FreeNAS installation ready at hand
  2. Root access to the said FreeNAS installation

Installing Nextcloud Plugin

A nextcloud plugin can be installed from the FreeNAS web interface itself, in a couple of clicks. Just login to your server as root, go to plugins (from the top menu, if you are using the older UI) and from there to the list of available plugins:

There you can find Nextcloud available for to download and install. Go ahead and install Nextcloud, it may take a few minutes to half an hour depending on your Internet connection and available computing resources.

Then enable Nextcloud service. To do this switch to the Installed tab on the same plugins menu. And set the service status of Nextcloud Plugin to ON as shown below.

FreeNAS will assign the jail a random private IP address, select the Nextcloud plugin, under the plugin submenu from the left hand column, to get a link to this service:

If that works for you, it’s great. But I prefer to configure networking a little differently.

Configuring Networking

If your local network has a DHCP server (often your home router acts as one) you need to ensure that the Nextcloud gets an IP address of its own from this DHCP server. Or you can manually assign it an IP address, if you want.

We are going for the DHCP approach, since this is the most common setup in most households and small offices. Nextcloud is installed, on our FreeNAS box inside a Jail. Jails are the precursors to containerization technology that Linux later adopted as docker and LXC. Like any container, our Nextcloud plugin can also have an IP of its own, distinct from the FreeNAS IP.

To do this, go to the JAIL tab from the top menu.

Select the nextcloud jail, as it is named on your machine. Click on the red button below to stop the service temporarily and then edit the jail, by clicking the settings icon from the bottom left. Ignore the IP address assigned currently, and click on advanced mode.

Within Advanced mode, select DHCP as your IPv4 option. You can verify the default gateway and a few other parameters too, if you want:

After this, restart your nextcloud jail and you can see your new IP. By selecting the Jails from the top menu and viewing the jails.

In my case the IP address was 192.168.0.105 which is where Nextcloud is running. But for some reason, which I haven’t been able to identify, this doesn’t work when you go to the browser and type in the IP address.

Circumventing the bug

One way to circumvent this bug is to take note of the IP address that the DHCP server assigned your jail, for example, 192.168.0.105 in my case. Stop that jail again, open the edit jail menu and go to the advanced mode, like we did before.

Here, you can again manually assign the DHCP assigned IP address to your jail. Scroll down the advanced menu and uncheck the box that says VIMAGE. This step is important.

After this is done go to the plugin menu from the top bar and restart the plugin. If it was running already, you may have to stop and start it back again for the changes to take effect. And now, finally, if you open a browser from your desktop and open http://192.168.0.105 (or whatever the IP address was assigned in your case) you will be greeted by the Nextcloud menu.

Everything else from here on out is simple. You can create accounts for your employees, family members, access it from whatever device you choose and you can be assured that the data is safe with OpenZFS.

Make sure to go to your DHCP server settings (commonly listed as LAN setup in your home router settings) and assign nextcloud a static IP in there. Otherwise, once the DHCP lease expires, your router may end up assigning nextcloud a different IP which will be inaccessible to you. You should probably do the same for your main FreeNAS box as well.

Conclusion

The only tricky business with the nextcloud plugin is the bug where the IP address is not reachable despite being assigned. I have a strong suspicion that VIMAGE is the culprit here, but I don’t have any evidence to back that up, just yet.

Source

JSON Beautifier on Ubuntu | Linux Hint

JSON, or JavaScript Object Notation, is the bread and butter of every app developer. Despite having

JavaScript

in its name it is actually used across many languages from Python to Go. Each language has its own parser to ‘understand’ valid JSON payloads making it the most useful way for APIs to communicate with other programs.

For those of us who don’t know what JSON is, its a syntax with which data is exchanged between two communicating pieces of software, usually over HTTP. This is the form in which data is sent from, say, your Twitter webpage or Twitter Mobile app to the servers of Twitter.

This allows people to work different front-ends (web UI, official App, third party clients, etc)for the same Twitter service.

A JSON object consists of an unordered list of data or values and each value is can be represented by a name. The data types allowed are:

  1. String
  2. Number
  3. Another JSON object (so you can have JSON objects nested inside one another)
  4. Boolean
  5. Null
  6. Array: An ordered list of any of the data types above

This is all well and good, but JSON is not very human-readable and so we find ourselves in need for a JSON beautifier something that can turn this: {“name”:”John”, “age”:31, “city”:”New York”} into this:

{
“name”: “John”,
“age”: 31,
“city”: “New York”
}

Now, deciphering what are names and what are values is much much easier. For example, “city” is name with the value “New York”.

You can easily read the latter format while the former is just strewn with quotations and commas to the point where you can’t understand where one value ends and the next name begin. With complicated applications and large JSON payloads, this problem can get out of hand pretty quickly. So we need a JSON beautifier for application developers to help them keep track of things. The following are a few curated options that can be used Ubuntu, although as you will see a few of them work as editor extensions and can run on any OS with Visual Studio Code or Atom editor installed there’s also a web based utility that for testing the waters:

1. Code Beautify JSON viewer

This web-based utility offers features including the beautify one, which makes your JSON object friendlier to the human eye. Along with that it also has a minify feature which tightly packages the JSON object, removing excess whitespaces.

There’s feature that lets you choose between hard tabs or spaces of a given length for indentation and much more. The drawbacks of using this are:

  1. Can’t use this natively with your text editor, switching between editor and web browser is distracting.
  2. Not secure. JSON payloads often contain authentication tokens, API keys and other sensitive information. You don’t want to paste it into an untrusted web page.

2. Pretty JSON (extension for Sublime Text Editor 2 and 3)

Next on the list is Pretty JSON, a package for those who are rocking a sublime text editor 2 or 3. The package is feature rich with support for converting JSON into XML, prettify JSON or minify it.

There are no default shortcut keys that come along with this extension, and you would have to either set those shortcuts yourself or use the command palette Ctrl[Cmd]+Shift+P to make use of this.

3. JSON Tools (extension for VS Code)

Arguably, the most popular text editor, VS Code has an extension for pretty much anything under the sun. One such extension is JSON Tools and the best thing about it is that you don’t even have to reach for your mouse if you don’t want to.

It offers only two simple and useful features: JSON prettify and JSON minify. It can be accessed directly from the Command Palette (Ctrl[Cmd]+Shift+P ) where you can search for JSON minify or prettify. You can go Ctrl[Cmd]+Alt+P to directly prettify the selected text or and Alt+M to minify it.

4. Pretty-JSON (extension for Atom Text Editor)

Pretty-JSON for Atom editor comes with features for prettify, minify, sort and prettify (which sorts your JSON object by the name of each value) and few other useful features. Given how many keyboard shortcuts and commands are already available in Atom, the author has decided that by default you can use this extension directly via the command palette Ctrl[Cmd]+Shift+P. If you do decide that you want a custom shortcut, you can always go to settings and configure one.

Atom editor is already infamous for slow startup time and this extension does add a significant amount to it. My editor (which is installed inside a VM, so results are a little exaggerated) gets an increase of over 4000 ms in the startup time for Atom. That over 4 seconds of you waiting for a text editor to open. Even in a low spec VM that’s too long of a wait time and that’s the only criticism I have about this extension.

Conclusion

If you are developer, chances are you are using one of the editors listed above. Hopefully, the tools mentioned here would meet your expectations and improve your workflow.

Source

Improve login security with challenge-response authentication

Introduction

Today, Fedora offers multiple ways to improve the secure authentication of our user accounts. Of course it has the familiar user name and password to login. It also offers additional authentication options such as biometric, fingerprint, smart card, one-time password, and even challenge-response authentication.

Each authentication method has clear pros and cons. That, in itself, could be a topic for a rather lengthy article. Fedora Magazine has covered a few of these options previously:

One of the most secure methods in modern Fedora releases is offline hardware challenge-response. It’s also one of the easiest to deploy. Here’s how.

Challenge-response authentication

Technically, when you provide a password, you’re responding to a user name challenge. The offline challenge response covered here requires your user name first. Next, Fedora challenges you to provide an encrypted physical hardware token. The token responds to the challenge with another encrypted key it stores via the Pluggable Authentication Modules (PAM) framework. Finally, Fedora prompts you for the password. This prevents someone from just using a found hardware token, or just using a user name and password without the correct encrypted key.

This means that in addition to your user name and password, you must have previously registered one or more encrypted hardware tokens with the OS. And you have to provide that physical hardware token to be able to authenticate with your user name.

Some challenge-response methods, like one time passwords (OTP), take an encrypted code key on the hardware token, and pass that key across the network to a remote authentication server. The server then tells Fedora’s PAM framework if it’s is a valid token for that user name. This is great if the authentication server(s) are on the local network. The downside is if the network connection is down or you’re working remote without a network connection, you can’t use this remote authentication method. You could be locked out of the system until you can connect through the network to the server.

Sometimes a workplace requires use of Yubikey One Time Passwords (OTP) configuration. However, on home or personal systems you may prefer a local challenge-response configuration. Everything is local, and the method requires no remote network calls. The following process works on Fedora 27, 28, and 29.

Preparation

Hardware token keys

First you need a secure hardware token key. Specifically, this process requires a Yubikey 4, Yubikey NEO, or a recently released Yubikey 5 series device which also supports FIDO2. You should purchase two of them to provide a backup in case one becomes lost or damaged. You can use these keys on numerous workstations. The simpler FIDO or FIDO U2F only versions don’t work for this process, but are great for online services that use FIDO.

Backup, backup, and backup

Next, make a backup of all your important data. You may want to test the configuration in a Fedora 27/28/29 cloned VM to make sure you understand the process before setting up your personal workstation.

Updating and installing

Now make sure Fedora is up to date. Then install the required Fedora Yubikey packages via these dnf commands:

$ sudo dnf upgrade
$ sudo dnf install ykclient* ykpers* pam_yubico*
$ cd

If you’re in a VM environment, such as Virtual Box, make sure the Yubikey device is inserted in a USB port, and enable USB access to the Yubikey in the VM control.

Configuring Yubikey

Verify that your user account has access to the USB Yubikey:

$ ykinfo -v
version: 3.5.0

If the YubiKey is not detected, the following error message appears:

Yubikey core error: no yubikey present

Next, initialize each of your new Yubikeys with the following ykpersonalize command. This sets up the Yubikey configuration slot 2 with a Challenge Response using the HMAC-SHA1 algorithm, even with less than 64 characters. If you have already setup your Yubikeys for challenge-response, you don’t need to run ykpersonalize again.

ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -oserial-api-visible

Some users leave the YubiKey in their workstation while using it, and even use challenge-response for virtual machines. However, for more security you may prefer to manually trigger the Yubikey to respond to challenge.

To add that manual challenge button trigger, add the -ochal-btn-trig flag. This flag causes the Yubikey to flash the yubikey LED on a request. It waits for you to press the button on the hardware key area within 15 seconds to produce the response key.

$ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -ochal-btn-trig -oserial-api-visible

Do this for each of your new hardware keys, only once per key. Once you have programmed your keys, store the Yubikey configuration to ~/.yubico with the following command:

$ ykpamcfg -2 -v
debug: util.c:222 (check_firmware_version): YubiKey Firmware version: 4.3.4

Sending 63 bytes HMAC challenge to slot 2
Sending 63 bytes HMAC challenge to slot 2
Stored initial challenge and expected response in ‘/home/chuckfinley/.yubico/challenge-9992567’.

If you are setting up multiple keys for backup purposes, configure all the keys the same, and store each key’s challenge-response using the ykpamcfg utility. If you run the command ykpersonalize on an existing registered key, you must store the configuration again.

Configuring /etc/pam.d/sudo

Now to verify this configuration worked, in the same terminal window you’ll setup sudo to require the use of the Yubikey challenge-response. Insert the following line into the /etc/pam.d/sudo file:

auth required pam_yubico.so mode=challenge-response

Insert the above auth line into the file above the auth include system-auth line. Then save the file and exit the editor. In a default Fedora 29 setup, /etc/pam.d/sudo should now look like this:

#%PAM-1.0
auth required pam_yubico.so mode=challenge-response
auth include system-auth
account include system-auth
password include system-auth
session optional pam_keyinit.so revoke
session required pam_limits.so
session include system-auth

Keep this original terminal window open, and test by opening another new terminal window. In the new terminal window type:

$ sudo echo testing

You should notice the LED blinking on the key. Tap the Yubikey button and you should see a prompt for your sudo password. After you enter your password, you should see “testing” echoed in the terminal screen.

Now test to ensure a correct failure. Start another terminal window and remove the Yubikey from the USB port. Verify that sudo no longer works without the Yubikey with this command:

$ sudo echo testing fail

You should immediately be prompted for the sudo password. Even if you enter the password, it should fail.

Configuring Gnome Desktop Manager

Once your testing is complete, now you can add challenge-response support for the graphical login. Re-insert your Yubikey into the USB port. Next you’ll add the following line to the /etc/pam.d/gdm-password file:

auth required pam_yubico.so mode=challenge-response

Open a terminal window, and issue the following command. You can use another editor if desired:

$ sudo vi /etc/pam.d/gdm-password

You should see the yubikey LED blinking. Press the yubikey button, then enter the password at the prompt.

Modify the /etc/pam.d/gdm-password file to add the new auth line above the existing line auth substack password-auth. The top of the file should now look like this:

auth [success=done ignore=ignore default=bad] pam_selinux_permit.so
auth required pam_yubico.so mode=challenge-response
auth substack password-auth
auth optional pam_gnome_keyring.so
auth include postlogin

account required pam_nologin.so

Save the changes and exit the editor. If you use vi, the key sequence is to hit the Esc key, then type wq! at the prompt to save and exit.

Conclusion

Now log out of GNOME. With the Yubikey inserted into the USB port, click on your user name in the graphical login. The Yubikey LED begins to flash. Touch the button, and you will be prompted for your password.

If you lose the Yubikey, you can still use the secondary backup Yubikey in addition to your set password. You can also add additional Yubikey configurations to your user account.

If someone gains access to your password, they still can’t login without your physical hardware Yubikey. Congratulations! You’ve now dramatically increased the security of your workstation login.

Source

OpenWrt based distro claimed to be first fully open source bitcoin mining software

Oct 26, 2018 — by Eric Brown

Braiins has released an open source, OpenWrt based ASIC bitcoin miner stack called Braiins OS, featuring AsicBoost to reduce power usage. It’s compatible with Antminer and Dragonmint mining rigs and works with Braiins’ Slush Pool mining pool.

Braiins Systems launched the first bitcoin mining pool with its eight year old Slush Pool (formerly Bitcoin.cz Mining), and has now released an alpha version of a new Linux distribution designed for ASIC mining. Based on OpenWrt, Braiins OS is billed as being the “first fully open-source, Linux-based system for cryptocurrency embedded devices.”

Braiins OS is optimized to work with Slush Pool, but you can use it with other mining pools as well. Images are available for Bitmain’s Xilinx Zynq-7000-based Antminer S9 and Halong Mining’s currently out of stock, Xilinx based DragonMint T1 mining rigs. According to the Bitcoin Magazine story that alerted us to Braiins OS, the company plans to slowly expand to other hardware, such as Pangolin Miner’s Whatsminer M10. The website also notes plans to support “images built for SBCs including Bitcoin & Lightning software.”

Antminer S9 (left) and DragonMint T1
(click images to enlarge)

 

Like other bitcoin mining packages, Braiins OS is designed to monitor hardware and its working conditions, as well as handle errors and report on performance. The firmware includes hacking tools to enable customized images. The OPKG packaged software offers “seamless firmware updates,” says Braiins. All factory transitional images are signed with GPG and uploaded to a set of GPG servers for verification.

Braiins OS can make use of bitcoin ASIC mining chips with AsicBoost technology, which is claimed to reduce power consumption by up to 20 percent. For the industry leading Antminer S9, Braiins taps Bitmain’s own algorithm, but the company intends to “switch to our custom open-source bitstream as soon as possible.”

Braiins OS screen
(click image to enlarge)

 

In the Bitcoin Magazine story, Braiins CEO Jan Čapek says that while Bitmain’s own Linux-compatible software for its Antminer systems is claimed to be open source, many features are covertly closed off. This makes it impossible to provide a proper software image to record the state of the mining system at a given time. Čapek also notes that the Bitmain software lacks open source FPGA code for the dual Cortex-A9 enabled Xilinx Zynq SoC, and other components are missing.

“The problem is that most of the people out there are not able to build a complete S9 image as it is not quite obvious that all the components are provided by Bitmain,” Čapek was quoted as saying. “To build a complete system you need the first stage bootloader (sometimes called SPL), u-boot, Linux kernel, Linux system (buildroot/openwrt?), FPGA bitstream (+ sources) and cgminer sources. So, there is quite more things that are to be reviewed that are still closed source.”

Bitmain also offers a backdoor called Antbleed designed to police stolen or hijacked hardware. It was the revelation of the existence of Antbleed that led Čapek to build the backdoor-free Braiins OS.

Further information

An alpha version of Braiins OS is available now. More information may be found on the Braiins OS website.

Source

How to Accept Bitcoin Payments with WordPress – ThisHosting.Rocks

Have you ever found it difficult to accept payments while using WordPress? As in, something somehow always goes wrong and then you have to take the longer route to accept payments.

But, what if I told you that there was a way for you to get rid of this problem? How would you feel?

Want to know a secret? You can accept payment on your own WordPress website.

Shocked? And want to know how to do this for your own website?

All you’ve got to do is read on and find out.

But, we need to some basics.

What is Bitcoin?

Be honest, you already know what I’m going to tell you. But, there’s no harm in knowing the basics, right?

For starters, Bitcoin is a cryptocurrency. This cryptocurrency was introduced to the world in 2009.

Furthermore, Bitcoin is a decentralized digital currency that does not need the assistance of any banks or middlemen.

It can be transferred directly from peer-to-peer.

Bitcoins are logged in the form of blockchains which are nothing but online ledgers.

Now, let’s see how you can accept Bitcoin payments with WordPress.

How do you accept Bitcoin payments on WordPress

This is one of the best ways to accept payments. That’s because you can send or receive payments from almost anyone from across the world. And you don’t have to worry about additional charges nor middlemen – like banks. It’s slowly evolving as a payment method.

To be able to accept Bitcoin payments on WordPress you’ll need to go by the following steps:

Create a bitcoin wallet.

First, you will have to choose which Bitcoin wallet you’ll use.

Before doing anything else, you will have to save it locally onto your computer/laptop.

Once you’ve set it up, you’ll have to disconnect your computer from the internet and do the rest of the work offline.

Now that you’re offline, open the saved file on your desktop and type in some random characters into the text box.

In the end, you will get one public and one private key.

These keys are essential for your transaction.

The public key – This key is the one that you can share with others to pay or receive payments.

The private key – This key is the one that is private and allows Bitcoin to be spent.

Finally, you’ve set up your Bitcoin wallet.

Let’s move on to the next step.

Sign up with a digital payment service

Fact: the digital payment service that is used commonly on WordPress is Coinbase.

But, you can use any of the other payment services that you’re comfortable with.

The payment service that you choose will let you accept Bitcoin or other altcoins.

These will then get directly added to your Bitcoin wallet.

How do you sign up on a payment service?

Let’s take Coinbase as an example.

Pretty simple really,

Step 1Go to your browser and go to the main page of Coinbase. Click on the sign-up button on the top-right corner.

Step 2Fill in the fields with accurate information. Make sure that you use the same name as the one mentioned on your Passport or any other ID. If you provide a fake name, the verification process may take longer.

Step 3Choose a password and make sure that you use – uppercase, lowercase, and at least one number.

Step 4Check the ‘I am not a robot’ box and the ‘Terms and Conditions’ box.

Step 5Press the create button.

Step 6You will get a confirmation email, on the account that you have given to the Coinbase account. Click on the link that has been provided in the email. This will activate your Coinbase account.

That is how you make an account on Coinbase.

The steps mentioned above are a basic blueprint of how each websites registration process is.

Install a WordPress plugin.

There are more WordPress plugins to choose from. Let’s continue using Coinbase as an example.

Step 1 Download the plugin as a zip file.

Step 2 Add the plugin to your WordPress blog.

Step 3 Upload the zip file.

Step 4 Click on install now and then activate the plugin.

Step 5 Go to WooCommerce, then settings, and then click on the checkout tab on top of the screen.

Step 6 Click on Coinbase.

Step 7 Enter your API credentials and then click on save changes.

This is how you can add Bitcoin payments to your WordPress.

Isn’t it simple?

Whoever thought that it would be so easy?

So, now you know how you can unlock those special hosting features and add Bitcoin to your WordPress.

This can help you accept payments, make payments and add some special features to your WordPress account.

You can even start a cryptocurrency website and sell crypto-related stuff with the help of these WordPress themes.

No one ever thought WordPress would be so cool and so much until Bitcoin finally came into our lives to introduce such amazing ways to deal with a transaction.

WordPress is a great platform to express yourself and get known as well. It provides its users with a wide range of opportunities and options to be themselves.

Plus, now that we have something as amazing as Bitcoin become a part, it enhances the qualities and applications.

Now that you’ve come to the end of the articles, you are bound to have some thought.

Source

Nordic Theme And Zafiro Icons Looks Amazing Together On Desktop – NoobsLab

If you are fond of dark theme whether it’s your personal liking or for comfort of your eyes, then you landed on the right page. Today, we introduce you to the very elegant theme called ”

Nordic

“. This Gtk theme is created using the awesome Nord color pallete which looks amazing on the desktop, it is released under GNU General Public License V3. Nordic also pack theme for Gnome Shell, and support almost every desktop environment such as Gnome, Cinnamon, Mate, Xfce, Mate, Budgie, Panteon, etc. If you are using distribution other than Ubuntu/Linux Mint then download the theme directly from its page and install it in this location “~/.themes” or “/usr/share/themes”. Since Nordic theme pack is in active development that means if you find any kind of bug or issue with it then report it to get fixed.

Zafiro

icon set is a perfect blend with Nordic theme for your desktop. Minimalist icons created with the flat-desing technique, utilizing washed out colors and always accompanied by white. The priority is simplicity. Both are designed by the same person and are fairly new in the eye-candy town and released under AGPLv3 license. We should always have a door opened for new stuff and should always give a try, who know new things could be our next favorite. The icons are compatible with most of the Linux desktop environments such as Gnome, Unity, Cinnamon, Mate, Lxde, Xfce and others. You will find many application icons in this pack, if you want to add new icons or want to report missing icons or bug then report it to creator and hopefully it will get fixed as soon as possible in the next update.

Available for Ubuntu 18.04 Bionic/18.10/and other Ubuntu based distributions
To install Nordic GTK theme in Ubuntu/Linux Mint open Terminal (Press Ctrl+Alt+T) and copy the following commands in the Terminal:
Available for Ubuntu 18.10 Cosmic/18.04 Bionic/16.04 Xenial/14.04 Trusty/Linux Mint 19/18/17/and other related Ubuntu derivatives
To install Zafiro icons in Ubuntu/Linux Mint open Terminal (Press Ctrl+Alt+T) and copy the following commands in the Terminal:

Don’t forget to give your feedback to creator, who put lots of his time in making this stuff for us for free!

Source

WP2Social Auto Publish Powered By : XYZScripts.com