EOS 1.86 Billion Estimated Market Cap but don't offer any support.

If a company is a 1.86 Billion estimated market cap you expect some type of customer service but not EOS. Visiting their website Block.One and you will find their team members but you have no way to get in touch with any of them including the CEO Brendan Bluemer, Daniel Larimer, and others. They have a contact form but no feedback since I tried multiple times requesting for assistance.

I need assistance from any of them because I've sent all my EOS to their address.

I accidentally sent all my 569.399 EOS to their EOSCrowdsale Address (0xd0a6E6C54DbC68Db5db3A091B171A77407Ff7ccf) and requesting to send it back to me. I included the transaction information and the exact amount so they can verify it.

I've used the block.one contact form, and sent a twit to https://twitter.com/BrendanBlumer but still no reply to my request for assistance.

Where the hell are your customer support EOS or any of the management team? I'm looking forward to hear from any EOS team, if there is a team. To please assist recover my EOS tokens. 

Please email (em@king.net) to get in touch with me. My Ethereum Address: 0xeB6F0Af12930d30252Df3F159Bbff9504c78D866

Source: QUE.com

Block Media #2 Litecoin LTC

This week open the crypto currency trades in positive lead by Litecoin at 10.01%, Dash 9.81% and Ethereum Classic 4.53% gain. Here's the Top 10 chart.
QUE.com.Bitcoin.2577
Update: June 20, 2017 Nothing special today except the trading price of Ripple $0.338896 with a 20.36% gain.

And the rest of crytocurrency trading.



Please continue at https://que.com/block-media-2-watch-litecoin-ltc/

My journey to Ethereum - Create your own Crypto Currency - QUE.com

Follow me. I'm learning Ethereum to build "unstoppable applications".
Let's have a basic understanding about Ethereum. What is a Ethereum or ether for short?. From the website "Ethereum is a decentralized platform that run smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third party interference.
These apps run on a custom built blockchain, an enormously powerful shared global infrastructure that can move value around and represent the ownership of property. This enables developers to create markets, store registries of debts or promises, move funds in accordance with instructions given long in the past (like a will or a futures contract) and many other things that have not been invented yet, all without a middle man or counterparty risk.
The project was bootstrapped via an ether pre-sale during August 2014 by fans all around the world. It is developed by the Ethereum Foundation, a Swiss nonprofit, with contributions from great minds across the globe.

Please visit ethereum.org for more details or read Blockchain 101 article.



Please note, this article is in progress and will continue to update 'till I complete my project.

What is the name of the project? It is for "Designing and issuing our own cryptocurrency" called "Yehey". Learning should be fun, so the project name Yehey is appropriate. I will follow the step-by-step procedure here: https://ethereum.org/token
First action is to download the Ethereum Wallet for Mac, install and start downloading blocks of 3,853,756 as of this date June 10, 2017. This will take a while ...
I will go out for dinner with my family and watch a movie while this blocks downloading is in progress.  After 6-7 hours, block download is 1,290,000 of 3,849,495.

June 11, 2017. 8:25 am. Another 8 hours passed. Downloading blocks at 2,157,336 of 3,854,733. I guess this will take a little longer than I expected.

Block downloading ... in progress.

Follow my journey at https://que.com/my-journey-to-ethereum-create-your-own-crypto-currency/

If you have any suggestion to make this project a success, please don't hesitate to let me know.

Stay tune!

QUE.com - Why Invest in Bitcoin?

The popular digital currency Bitcoin has been on the rise in terms of value and popularity over the last few years and it continues to gain popularity in the world of e-commerce. It’s not all rosy for Bitcoin owners right now though, as the popular digital currency has seen a massive drop in price over the last few days. Experts believe the sudden drop was because of a price correction and bitcoin owners will be hoping that’s the case so that it continues to rise in the future. However, other experts believe the drop would suggest there is a resistance in price and it’s not going to grow much in the future.
The Value of Bitcoin Has Reached an All-Time High in Recent Weeks
It was only two weeks back when Bitcoin was valued at over $2,700– giving it an all-time high in value. However, due to the price correction, Bitcoin has seen a drop in its value of more than $500 in just four days.
Bitcoin Has Dropped in Value by Nearly $4 Billion
In recent months, Bitcoin has seen a further surge in value, which has seen investors push more funds into the popular digital currency platform. However, in recent days the value of Bitcoin has plummeted - so much so that the overall value of Bitcoin dropped from $40.49 billion to $37.08 billion.
Continue reading at: QUE.com

Free Bitcoin

Bitcoin is the new digital money. Help grow the digital currency community and earn free bitcoin.

Using digital currency is more fun with friends! Once you created your free account, buys or sell $100 of digital currency or more, both party get $10 of free bitcoin. Create your free bitcoin account today.

Let us know if you are using bitcoin, post comment below.

Credit Scores & Car Loans

Whether you’ve heard it once, twice, or a thousand times, the idea that your credit score affects what kind of car loan you can get is probably burned into your mind, somewhere. On the surface, it seems simple. Higher credit scores equate to better car loans, and lower ones will net you less attractive offerings.
But what are the real credit score requirements for auto loans? It turns out there are some intricate factors at play, and while the conventional wisdom generally holds true, there’s some subtlety you should be aware of, especially if you’re concerned about your current score.
Your Credit Score
Let’s get this out the way right off the bat. Your credit score is an analysis of your credit history, represented numerically, that shows your “creditworthiness.” Lenders use this score to determine how likely you are to be able to repay your debts and whether or not they will offer you a loan.
Without going too deep into the history, your credit score is based on factors like your payment history, length of credit history, how much you owe, and what kind of credit you currently hold. The number can range from 300-850, and scores above 700 are generally considered “good.”
There are several agencies that track your credit score, and if you want to see what your current credit score is, you can request a credit report at any time. Though there is sometimes a fee involved, with some services, you can get this information free of charge.
Bear in mind that your credit score isn’t the ultimate arbiter of whether or not you’ll receive a loan, and even with great credit you might still be denied for certain loan types, but it does give you a ballpark idea of where you stand at present.


DHS Statement on ongoing ransonware attackes - QUE.com

WASHINGTON – The Department of Homeland Security is aware of reports of ransomware known as WannaCry affecting multiple global entities.  Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it.  Microsoft released a patch in March that addresses this specific vulnerability, and installing this patch will help secure your systems from the threat. Individual users are often the first line of defense against this and other threats, and we encourage all Americans to update your operating systems and implement vigorous cybersecurity practices at home, work, and school.
These practices include:
- Update your systems to include the latest patches and software updates.
- Do not click on or download unfamiliar links or files in emails.
- Back up your data to prevent possible loss, whether you are at a family computer or company data.
We are actively sharing information related to this event and stand ready to lend technical support and assistance as needed to our partners, both in the United States and internationally.  DHS has a cadre of cybersecurity professionals that can provide expertise and support to critical infrastructure entities.
DHS also leads the federal government’s efforts to protect civilian executive branch agency systems and networks. In partnership with each agency’s Chief Information Officer we are ensuring our own networks are protected against the threat.
For more information, DHS has previously released information on best practices to address ransomware. That information is available on our website at https://www.us-cert.gov/security-publications/Ransomware
Source: Department of Homeland Security
At QUE.com and partners, we have weekly and monthly schedule to check the security posture of our web servers and services. We also check our network of websites daily and apply updates if needed to keep it up, safe and secure.
And sometimes it is very inconvenient to apply extra layer of security because of added step, this is the reason why. We don't want to be one of the victims of any cyber attacks.
As of writing this email, the sad part is some 20+ already paid using bitcoins. They have no assurance that they will be able to get their data anyway and absolutely no refunds.
Keep in mind, when a hacker owned your computer. It is no longer yours.
If you spot a ransomware incident, take a picture of their bitcoins so we can track their activity.

Source: Que.com

How to improve your credit score

Keys to a Higher Credit Score
Credit scores provide a snapshot of your financial health. Your credit score can affect everything from credit card limits to loans to your ability to rent an apartment or buy a home. A high credit score can indicate to lenders that you are likely more credit worthy while a low credit score can suggest you may be a loan risk.
How to improve your score
There are a few things you can do to improve your credit score over time. Reducing your utilization percentage helps keep your credit score up. Always paying bills when they’re due, keeping a modest balance on your credit cards and paying more than the minimum due each month will help with your credit utilization.
Build your score for the future | There are 4 key things you should do to grow your credit score for long term credit health.
1. Pay your bills on time
Paying your bills on time accounts for 35 percent of your credit score. Stay on top of your bills by creating a calendar for tracking when your bills are due. You can also enroll in auto bill payments with online banking tools to avoid paying bills late.
2. Don’t max out your credit
Keeping your account balances low can help raise your credit scores. Your credit utilization ratio is a major factor when determining your score. You can estimate this ratio for each of your accounts by dividing the amount you owe on each account by the amount of the credit line.
3. Keep track of length of credit history
The length of your credit history accounts for 15 percent of your scores. You should open and maintain one or two major credit cards. Don’t close accounts, particularly those that you’ve had for a longer time. Maintaining accounts in good standing for an extended period of time is an indicator that you’re responsible with your credit.
4. Manage new credit and types of credit
10 percent of your FICO score is based on new credit. Opening multiple accounts within a short time can signal financial problems. A mix of credit types, new and old, is preferable to having only one type of credit. Credit cards, education loans, vehicle loans and home loans are examples of types of credit.
Thank you LendingTree for sharing this credit tips.

Gmail Phishing Attack

Another day of Email Phishing Attack, this one for Gmail user’s account as the target. Last Tuesday May 3, an email phishing attack that was designed to trick users into giving up access to their Gmail accounts started showing up on target email inbox. The 1st captured image below is an example of Gmail Phishing attack email. When a user click on the “Open in Docs” link, the hacker will exploit the Gmail user’s account.
20170503.Gmail.PhishingAttack1
But it did not stop there, this phishing attack also behave as a “worm” that also sent itself out to all the affected user’s contacts. The 2nd captured image is an example of email coming from @gsa.gov infected user’s contact. You might receive a similar email coming from different email addresses.
20170503.Gmail.PhishingAttack
Please note the recipient email address “hhhhhhhhhhh@mailnator.com, I hope this is enough reason not to open or read this message, delete it right away. If you clicked on the link and enter your Gmail credentials please continue to read on how to perform Google security check-up.
Here’s how to check your Gmail account.
  • Open a new browser. I highly recommend using a modern browser e.g. Edge, Google Chrome or Firefox because they are equipped with safe browser features to protect and block malicious site or links.
  • Login to your Gmail account. Check your Gmail account connected Apps here (https://myaccount.google.com/u/1/permissions?pli=1). Review and cancel any connection if you don’t need it or don’t know it.
  • Go to Google Security Check-up (https://myaccount.google.com/secureaccount) to check your account.
I hope that help. Have a Safe surfing.
Source: QUE.com

Hard VS Soft credit pulls

I’m looking for a Mortgage Lending company to loan me money so I can purchase a small house. So, I checked LendingTree.com to give me some ideas. And one day, I received this email I guess one of their Newsletter regarding Credit Tips. “Some vital info about your credit score” and I think it is very useful to new home buyers like me.
Soft pulls happen when you:
  • Check your own score – you can do this often! It doesn’t affect your score!
  • Get free loan offers
  • Receive a loan pre-qualification
  • Experience an employer background check
  • Receive pre-approved credit card offers in the mail
  • Get your LendingTree credit scores
Won’t – adversely affect your credit score
Hard pulls happen when you apply for a:
  • New credit card
  • Home mortgage
  • Auto Loan
  • Refinance of your home mortgage
  • Home equity line of credit
  • Store credit card
  • Checking or savings account
Can – lower your credit score by quite a few points
What hurts your credit score the most. Multiple hard pulls over a long period
Limit your hard pull credit inquiries. While hard inquiries are necessary to receive credit, it is important to understand how it works. All inquiries on your credit report within a 14-day period will count as one inquiry ONLY IF you’re shopping for one of the following items – a home mortgage, home refinance, home equity loan or auto loan. Be mindful if you are tempted to open more than one credit account like a home mortgage and an auto loan or a home mortgage and a new credit card in that same period. It will count as a separate inquiry and could impact your score.
Who Tracks this Info? The most important credit bureaus do. Don’t let your score go down! Avoid getting too many hard pulls at once.
  • fairIsaac
  • MyFico
  • TransUnion
  • Experian
  • Equifax


Decluttering Your Digital Life by QUE.com

I received this Friends Newsletter today from Department of Homeland Security and I think it is a very useful information to share. So here you go and I hope you find it useful as well.
Start fresh this spring – online and offline. In addition to the traditional tasks on your spring cleaning list like tidying the closet and washing the windows, take time to create a “digital spring cleaning” list as well.
What exactly does a “digital spring cleaning” entail?
A digital spring cleaning means taking control of your digital life and the information that you share online. Similar to regular cleaning or tidying one’s home, it might seem like a daunting task at first. In reality, just a few simple steps can make a big difference in helping protect yourself online.
The Department of Homeland Security recommends that you incorporate these cyber tips into your spring cleaning routine this year.
  • Clean your machine. Update the security software on all of your devices that connect to the Internet.  Keeping the software on your devices up to date will prevent attackers from taking advantage of known vulnerabilities. Also review the applications you have downloaded. If you no longer use a particular app, delete it. It’ll not only free up storage space on your device, but it will also remove permissions that app has to potentially gather your information. 
  • Turn on multi-factor authentication. Enable stronger authentication on your online banking and email accounts. Turning on a two-factor authentication, such as a PIN sent to your mobile device, helps verify a user has authorized access to an account. For more information about authentication, visit the Lock Down Your Login Campaign at www.lockdownyourlogin.com.
  • Tidy your online reputation. Review your social media accounts and delete old photos or posts that may no longer represent who you are. As you go through your online posts, think about how they might influence others’ opinions of you. Also take the time to review the privacy settings on your online accounts. Take advantage of the privacy settings offered by major online apps and websites by limiting the amount of people who can see the information you share.
Visit and download the National Cyber Security Alliance’s “Digital Spring Cleaning Checklist” for more steps to clean up your online life.
For more tips on how to stay safe online, please visit the Department of Homeland Security’s Stop.Think.Connect. Campaign at www.dhs.gov/stopthinkconnect.

Source: Que.com

Professions Most Vulnerable to Cyber Hacks

Whenever you are in a profession that deals with highly confidential subject matter, you are going to be just as highly vulnerable to leaks and hacks. Sometimes, this is nefarious in nature as there are those out there who would like to be privy to the ‘secret’ details in someone else’s life and sometimes those leaks are just for the sheer fun of it by a sick mind. Anyone in the field of social work or mental health will be vulnerable to these kinds of attacks because of the very nature of what it is they do. They deal with the thoughts and emotions of other human beings who may have been victimized in the past. For this reason, the following professions should take extra precautions to guard any data entered or stored on their computers.
First – A Bit of Cyber Security Advice
Before talking about a few of the professions most vulnerable to cyber hacks, it might be wise to give a bit of advice on how to keep your computers as secure as possible. It is suggested that you password protect any devices you will be using in the field and make sure those passwords are of the highest levels. Multi-character long passwords are best so anyone gains access to your laptop or iPad, they will not be able to see any files you’ve saved locally.
Social Workers Are Prime Targets
Anyone employed in the field of social work will be privy to some of the most personal information their clients are willing to share. As a result, it is an ethical and legal obligation of the social worker to keep that information strictly confidential. What happens in the case of a county social worker, for example, who is already working in the field but pursuing a masters in social work online? He or she will undoubtedly be taking that ever-present laptop wherever they go and if there are any files on it that could damage the well being of a client, keeping it unsecured is a breach of professional conduct.
CPS Workers Who Deal with Abused Children
Although a branch of social work, a CPS worker may have obtained that M.S.W. online and, as a result, is now a field agent within the department. This type of social worker will typically be out investigating reports of child abuse and how better to document each visit than a mobile device that can take evidentiary photos and store text files of notes involving what that caseworker observed on the visit? Again, cyber security is an absolute must when working in the field.
Anyone can gain access to that device and what if it is an estranged spouse trying to learn where the mother and children are being kept in a safe facility? You never know who would want to find those abused children or battered women, so cyber security is essential. Any transmissions to your database from your mobile device may be hacked if you don’t have great security on deck. Whether working in the field or from the office, any profession that deals with the mental or emotional well-being of their clients will be a prime target for being hacked and are, indeed, ethically responsible for ensuring confidentiality. Stay secure with the latest software, protecting your clients and yourself at the very same time.
Image by Retune.com

Vault 7: CIA Hacking Tools Revealed | Wikileaks

If you're in Cyber Security business, you will be a lot busier for days to come securing your network and your customers. Wikileaks revealed CIA Hacking Tools.
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

KING of Tanks - MultiPlayer Games

Welcome to KING of Tanks Multiplayer Game – Que.com latest game. 
kingoftanks-com-01
This will be our reference project for future KING of Tanks multiplayer game improvement. We hope you enjoy playing games with us. Keep in mind this game is FREE you don't have to pay to play.
Things to remember, you can easily come back to this page by going to the following links for quick access. We want you bookmark this page :).
continue reading at KING of Tanks Multiplayer Game web page for more information.