Archive: July 23, 2021

Trading SLP to PHP now in Binance

How to Sell SLP to PHP using Binance P2P

1) Ronin Account
2) Metamask Account
3) Binance Account
4) SLP Token should be present on your Metamask account, if not you should add it first.

Note: Time for the assets to be cleared from one account to another depends on how much gas fee you spend on every transaction.

Gas Fee – There are no fixed gas fees. Sometimes it’s high, sometimes it’s low. You can check the price of Gas fee at I suggest you have at least a $30 ceiling for gas fees.

Make sure you have at least $30 worth of ETH on your Metamask account because this is where all the gas fees get deducted.

Now for the Steps:
Step 1: Log in to your ronin wallet and metamask wallet thru browser extension.

Step 2: Log in to Axie Infinity Marketplace. PLEASE ALWAYS CHECK THE LINK. (

Step 3: Click “My Account”, Click “Claim Tokens”, then Claim your SLP. This step takes time so when you claim so please do not refresh your browser until you see the SLP on your Ronin Wallet browser extension.

Step 4: Once your SLP appears on your Ronin Wallet browser extension, Go back to “My Account” then click “Ronin Withdrawal”. It will open up the Ronin Bridge.

Step 5: There are 3 Text Boxes where you can type in.

Box 1: Etherium Address – This is where you will paste your METAMASK address.

Box 2: ASSET – This is where you will select if you will transfer AXS or SLP. So select SLP.

Box 3: Amount – This is where you will type how much SLP are you going to transfer.

IMPORTANT: Before clicking on the “NEXT” button, make sure you have at least $30 worth of ETH on your METAMASK account and I advise you to select the fastest gas fee on all your transactions.

IMPORTANT: Make sure you already added SLP Token on your Metamask Wallet, if not you have to manually add it first by going to:
( You should see the Metamask icon under the “Contract” field, just click that and it will automatically add SLP as one of your tokens.

Step 6: Check your METAMASK Wallet browser extension if the SLP is already added. If you see your SLP then you are good to go.

Step 7: Go to Binance and log in to your account. After logging in, click “Wallet” then select “Overview”.

Step 8: On the overview screen, click “Deposit” Then select Crypto Deposit.

Step 9: You will see a “Coin” text box on the next screen, just search for SLP. Select SLP and NOT SLPOLD.

Step 10: You will see a warning box and just click OK. Do not change anything on the screen. Copy your Binance Address

Step 11: Open your Metamask Wallet browser extension, make sure you are on Etherium Mainnet then click the “Send” button. Then paste your Binance address on the text box.

Step 12: You will see 2 text boxes and the gas fee involved in this transaction.

Box 1: Asset – Select your SLP Asset
Box 2: Amount – Click max (some suggests leaving at least 1slp for a smooth transaction)
Gas Fee: I advise select the “fastest” and make sure you have at least $30 ETH on your Metamask Wallet so you won’t encounter any issues.

Step 13: After setting everything up just click next to proceed with the transaction.

Step 14: If successful, you will find your SLP under P2P assets and from here you can now sell it to Binance.

How To Sell SLP to Binance

Step 1: Go to Trade, select P2P.
Step 2: Select “SELL” then select “SLP” Then change the currency to “PHP”
Step 3: From the set of buyers, select who you want to sell your SLP to. Then click “Sell SLP”
Step 4: There will be 2 text boxes

Box 1: I want to sell – This is where you will type how many SLP you wanted to sell

Box 2: Auto-Generated – This is how much you will receive

Step 4: Select Payment Method. Either bank transfer, Unionbank or Gcash.

Notable Cash Out Options for SLP in the Philippines

The following are the usual cash out options not just for SLP sale but also for crypto sale on the P2P platform:

1) GCash

2) PayMaya

3) UnionBank

What is Axie Infinity?

Axie Infinity is a Pokémon-inspired universe where anyone can earn tokens through skilled gameplay and contributions to the ecosystem. Players can battle, collect, raise, and build a land-based kingdom for their pets.
All art assets and Axie genetic data can be easily accessed by 3rd parties, allowing community developers to build their own tools and experiences in the Axie Infinity universe.
While still in early access, Axie is ranked the #1 Ethereum game by daily, weekly, and monthly active users. It has generated over 13,000 ETH in revenue (16M+ USD) so far.
While Axie is a fun game, it’s also taken on characteristics of a social network and jobs platform due to the strong community and play to earn opportunities that have come from its early success.
The key difference between Axie and a traditional game is that Blockchain economic design is used to reward our players for their contributions to the ecosystem. This new model of gaming has been dubbed “play to earn”. Axie has attracted thousands of players from developing countries in the pursuit of a new income stream during the Covid pandemic. Many of these players are fathers, aunts, and even grandparents who have never used Blockchain technology before!

Players can earn by:
Competing in PVP battles to win leaderboard prizes.
Breeding Axies and selling them on the marketplace.
Collecting and speculating on rare Axies such as Mystics and Origins.
Farming for the love potions that are needed to breed Axies. These can be sold on exchanges such as Uniswap and Binance.
Starting in 2021 players can earn a governance token, AXS, which represents a real slice of the game universe as it has governance rights and fee sharing built into it. Since players can earn this token by playing, a Ready Player one type quest emerges where players can actually earn part of the universe. However, these quests are not winner takes all and rewards each player based on their effort and skill.

Axie’s Mission
Axie was built as a fun and educational way to introduce the world to blockchain technology. Many of the original team members met playing Crypto kitties, and it was their first time ever using Blockchain for anything other than pure speculation. They soon started working on Axie to introduce the magic of Blockchain technology to billions of players.

The Vision
We believe in a future where work and play become one.
We believe in empowering our players and giving them economic opportunities.
Most of all, we have a dream that battling and collecting cute creatures can change the world.
Welcome to our revolution.

-Axie Infinity Whitepaper

Axie Infinity Shards(AXS) are an ERC-20 governance token for the Axie Universe. AXS holders will be able to claim rewards if they stake their tokens, play the game, and participate in key governance votes. Players will also be able to earn $AXS when they play various games within the Axie Infinity Universe and through user-generated content initiatives.

The goal with Axie Infinity Shards is to align the incentives between the players of the game and the developers in novel and exciting ways. The mechanisms described above have two main goals:

  • To reward players for interacting with Axie Infinity while simultaneously incentivizing them to hold on to their tokens so they can claim additional rewards.
  • To decentralize the ownership and governance of Axie Infinity.

They want Axie to become the first game truly owned and operated by the community that plays it. This opens up limitless possibilities but must be approached carefully. In the past, projects have been abandoned and become stagnant using the term “decentralization” as a ruse. The shift to a true Decentralized organization will occur gradually over time.

In early 2021, the Community Treasury will go live. The Community Treasury will begin to receive revenues generated by Axie Infinity as well as a portion of staking rewards. This treasury will be governed by AXS stakers eventually, once the network has become sufficiently decentralized. A more detailed overview of the Treasury can be found here.

The token has been designed in collaboration with Delphi Digital who has put together an AXS staking guide so future holders can view the potential of AXS at a glance.


Watch cyberattacks realtime worldwide

1. Cyberthreat real-time map by Kaspersky shows you the real-time attack detected by their various source systems.

  • On-Scanner access
  • On-Demand Scanner
  • Web Anti-virus
  • Mail Anti-virus
  • Intrusion Detection System
  • Vulnerability Scan
  • Kaspersky Anti-spam
  • Botnet Activity detection

2. FireEye Cyber Threat Map gives you an excellent summary of total attacks today with the following data.

  • Top 5 reported industries
  • Top attacker by country

3. This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform and its unprecedented insights into DNS and IP traffic.

4. There are three main types of attacks visualized on the Cyberthreat map by Bitdefender.

  • Spam
  • Infection
  • Attack

PrintNightmare now patched on all Windows versions

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.

Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates.

Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.

Detailed steps on how to install these out-of-band security updates are available in the support documents linked below:

“Microsoft recommends that you immediately install this update on all supported Windows client and server operating system, starting with devices that currently host the print server role,” the company added.

“You also have the option to configure the RestrictDriverInstallationToAdministrators registry setting to prevent non-administrators from installing signed printer drivers on a print server. For more information, see KB5005010.”


Is this the vulnerability that has been referred to publicly as PrintNightmare?

Yes, Microsoft has assigned CVE-2021-34527 to this vulnerability.

Is this vulnerability related to CVE-2021-1675?

This vulnerability is similar but distinct from the vulnerability that is assigned CVE-2021-1675. The attack vector is different as well. CVE-2021-1675 was addressed by the security update released on June 8, 2021.

Did the June 2021 update introduce this vulnerability?

No, the vulnerability existed before the June 8, 2021 security update.

All versions of Windows are listed in the Security Updates table. Are all versions vulnerable?

All versions of Windows are vulnerable. As of July 7, 2021, Microsoft has released security updates for this vulnerability for all supported versions of Windows listed in the security updates table in this CVE.

What vulnerabilities do the security updates released on and after July 6, 2021 address?

The security updates released on and after July 6, 2021 contain protections for a remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527, as well as for CVE-2021-1675.

Are Domain Controllers known to be affected by the vulnerability?

Domain controllers are affected if the print spooler service is enabled.

Are client systems and member servers that are not domain controllers known to be affected by the vulnerability?

Yes. All editions of Windows are affected.

How can I see attack activity on my network related to this vulnerability?

Security products, like Microsoft 365 Defender, offer different ways to view relevant alerts and telemetry. Microsoft has published our recommendations for seeing this sort of behavior at our GitHub here: Microsoft 365 Defender Hunting Queries. Customers using other technologies can adapt this logic for use in their environments.

How is Point and Print technology affected by this particular vulnerability?

Point and Print is not directly related to this vulnerability, but the technology weakens the local security posture in such a way that exploitation will be possible. To disallow Point and Print for non-administrators make sure that warning and elevation prompts are shown for printer installs and updates. The following registry keys are not present by default. Verify that the keys are not present or change the following registry values to 0 (zero):

  • HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
  • NoWarningNoElevationOnInstall = 0 (DWORD)
  • NoWarningNoElevationOnUpdate = 0 (DWORD)

We also recommend explicitly listing specific print servers which should be used by clients.

Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the “Changing Keys And Values” Help topic in Registry Editor (Regedit.exe) or view the “Add and Delete Information in the Registry” and “Edit Registry Data” Help topics in Regedt32.exe.


Hiren’s BootCD just got a major update

Hiren’s BootCD (HBCD short) was a CD or USB stick bootable live system running on a customized “Mini Windows XP ” ( Windows PE ) and the boot manager grub4dos based. In addition, the Linux distribution Parted Magic was offered at the start. The last version is from 11/2012. The current Hiren’s BootCD PE (Preinstallation Environment) is a restored version of Hiren’s BootCD based on Windows 10 PE x64 (v1.0.1). Since there have been no official updates since November 2012, the PE version is maintained by an independent developer community.

The main goal is to rescue or restore defective Microsoft Windows systems. Furthermore, it offers numerous possibilities for data recovery, backup, and forensics. The software is recommended as an irreplaceable ” Swiss Army Knife ” for PC maintenance and is one of the most frequently downloaded software in download portals.

Download page:

Direct Download:


Hiren’s BootCD PE x64 v1.0.2 (1 July 2021):

  • Hiren’s BootCD PE Windows 10 core has been updated to version 21H1 (build 19043.928).
  • 195 new drivers have been integrated at the IO, Network and Storage categories.
  • Almost all utilities have been updated.
  • New added utilities: DMDE, ReclaiMe, PhotoRec, Unstoppable Copier, Test Disk, Crystal Disk Info, DiskGenius, EaseUS Partition Master, Macrorit Partition Expert, Eraser, VLC Media Player, McAfee Stinger, Kaspersky Virus Removal Tool, Windows Login Unlocker.
  • Removed utilities: Runtime (GetDataBack for FAT, GetDataBack for NTFS, GetDataBack Simple, NAS Data Recovery, RAID Reconstructor, RAID Recovery for Windows, Captain Nemo, DiskExplorer for FAT, DiskExplorer for Linux, DiskExplorer for NTFS), CCleaner, Teamviewer.

Hiren’s BootCD PE x64 (v1.0.2) – ISO Content


  • BootIce v1.3.3
  • EasyBCD v2.3

Hard Disk Tools – Data Recovery

  • CheckDisk GUI v0.3.1
  • Lazesoft Data Recovery v4.0.0.1
  • Puran Data Recovery v1.2.0
  • Puran File Recovery v1.2.0
  • Recuva v1.53.0.1087
  • DMDE v3.8.0
  • ReclaiMe build 3475
  • PhotoRec v7.2
  • Unstoppable Copier v5.2

Hard Disk Tools – Defrag

  • Defraggler v2.22.33.995

Hard Disk Tools – Diagnostic

  • GSmartControl v1.1.3
  • HDDScan v4.1
  • HDTune v2.55
  • WD Data Lifeguard Diagnostics v1.37
  • Crystal Disk Info v8.12.2
  • Test Disk v7.2

Hard Disk Tools – Imaging

  • Acronis TrueImage 2021 build 39216
  • AOMEI Backupper v6.5.1
  • Lazesoft Disk Image & Clone v4.0.0.1
  • Macrium Reflect PE v7.3.5925
  • Runtime DriveImage XML v2.60

Hard Disk Tools – Partition Tools

  • AOMEI Partition Assistant v9.2.1
  • Macrorit Partition Extender v1.5.0
  • Macrorit Partition Expert v5.6.1
  • DiskGenius v5.4.2.1239
  • EaseUS Partition Master v14.5

Hard Disk Tools – Security

  • HDD Low Level Format Tool v4.40
  • Eraser v6.2

Windows Recovery

  • Lazesoft Windows Recovery v4.0.0.1

Other Tools

  • FSViewer v7.5
  • Free Office rev 703
  • Sumatra PDF v3.2
  • 7-Zip v21.02
  • ExamDiff Pro v12.0.1.1
  • HxD v2.5.0
  • Notepad++ v8.1
  • WinMerge v2.16.12
  • VLC Media Player v3.0.16

Removable Drive Tools

  • CDBurnerXP v4.5.8.7128
  • Rufus v3.14.1788

Security – AntiVirus

  • ESET Online Scanner v3.5.6
  • Malwarebytes Anti-Malware v2.2.1.1043
  • McAfee Stinger v12.2.0.268
  • Kaspersky Virus Removal Tool

Security – KeyFinders

  • ProduKey v1.97
  • ShowKeyPlus v1.0.7060

Security – Passwords

  • Lazesoft Password Recovery v4.0.0.1
  • NT Password Edit v0.7
  • Windows Login Unlocker v1.6

System Tools

  • CPU-Z v1.96
  • GPU-Z v2.40
  • HWInfo v7.04-4480
  • Speccy v1.32.774
  • WinNTSetup v4.6.3
  • Attribute Changer v10.0
  • Change Keyboard Layout v1.0.0
  • Dependency Walker v2.2.6
  • Registry Backup v4.0.0
  • Regshot v2.0.1.70
  • SysInternals Suite
  • PowerShell Core v7.1.3


  • Aero Admin v4.7
  • Acrylic Wi-Fi Home v4.5.7802
  • Chrome v91.0.4472.106
  • Mozilla Firefox Quantum ESR v78.11.0.7821
  • PENetwork v0.59.0.B12