Damn you rjk. You are keeping us noobs at a disadvantage by high prices which only allows mega miners like Gigavps, Amazingrando and Mystery Miner as the only ones who can afford your secret sauce. The gap between the haves and haves less just get's larger. Without us noobs having access to your secret sauce, you are contributing to Bitcoin monopolies and cabals of concentrated Bitcoin wealth. Are you a Bitcoin globalist simpathizer?
|
|
|
If you bought your 5970 used you will have to keep an eye on the temps. The second core usually runs 2-6 degrees hotter than the core directly under the fan. Set any fan or temp settings based on the temps of the hotter core. As far as, OC, just play around a little and watch the temps, keeping it under 70C is important for longevity and stability of the cards. Getting 830MH/s might sound great in conversation, but if the card is at 80C will shorten it's effective life, burning it out in 6 months. When you could've ran it at 750 MH/s at 70C for 1.5 years, it would be producing much more BTC over the long term.
|
|
|
Unfortunately this setup is not completely working; only 2/5 cards mine (may be a result of bad extenders or b/c they're not molex powered, but let's assume not for the purposes of this thread). This is a serious issue and I wouldn't leave it running like that indefinitely, you can be damaging something. There are posts on this forum discussing how much power is required by the PCIe Bus feeding the cards, which I believe is, from the PCI spec, "125 watts", I think, so that means while each core is drawing 30 watts, 5 * 30 = 150, you're trying to draw more energy than the system can supply over the PCI Bus. Second issue with extenders/risers; You are adding more distance but adding more resistance and small wires which handle less total current, which contributes to an energy imbalance in the Graphic Cards. Once you go from 4 cores to 5 cores, you need to use powered extenders/risers unless you intend to undervolt the Graphics Cards. With an imbalance, a card or two may get energy spikes that could damage the graphics cards. They still might hash, but lose overclocking ability.
|
|
|
Not an expert here, just speculating...
That is really bizarre. Behavior like this speaks allot about the nature of the one behind it's premeditation. Juvenile for one, and why those three words? Designed to instill fear in the minds of those that find the message. Allot went into them being embedded in the transaction. More than likely a troll shunned by the community here. If this heist had been done by some group within TPTB in-order to derail BitCoin progress, I doubt they would go to all this trouble, no this is the mind of a Jack The Ripper type personality, and my guess a solo individual.
Not an expert of what, trolling?
|
|
|
Currently, the Ubuntu Repository nor PPA Daily, Beta, Dev do not carry version 19.0.1084.46. You may have to download and install direct from Google if you would like to be secure, for now.
|
|
|
Criticality level - Highly critical Impact - Unknown - Security Bypass - System access Where - From remote Multiple vulnerabilities have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to bypass certain security restrictions, and compromise a user's system. 1) An error exists when loading links from internal pages. 2) A UI corruption error exists with long autofilled values. 3) A use-after-free error exists with style element. 4) An unspecified error exists related to incorrect window navigation. 5) An out-of-bounds read error exists in the hairline drawing. 6) A use-after-free error exists in table handling. 7) A race condition exists in workers. A use-after-free error exists with indexed DB. 9) An invalid write error exists in the v8 regex engine. 10) An out-of-bounds read error exists in glyph handling. 11) An out-of-bounds read error exists in Tibetan handling. 12) An out-of-bounds write error exists in the OGG container. 13) A use-after-free error exists in GTK omnibox handling. 14) An out-of-bounds write error exists in sampled functions with PDF. 15) A bad search path error exists for Windows Media Player plug-in. 16) A use-after-free error exists in PDF with corrupt font encoding name. 17) An out-of-bounds read error exists in drawing dash paths. 18) An unspecified error related to a Nvidia driver bug. 19) An off-by-one write error exists in libxml. The vulnerabilities are reported in versions prior to 19.0.1084.46. Solution Upgrade to version 19.0.1084.46. http://secunia.com/advisories/49194/
|
|
|
Well, I was starting to give p2pmining a tryout with one of my miners, but hit a snag. I never have payouts come to my wallet, instead redirecting them all to my exchange deposit addresses, so I can't sign to set up the alt-coin addys. Would it be feasable to add a BTC section on the 'register merged mining' screen so I could use my own addy with my miner, which I can sign with, but have the BTC sent to the other addy similar to how the alt-chains get sent to their own addy's? Otherwise, I'll just have to give up on my tryout -- Smoov PM JayCoin and see what he could do. You may not be the only miner with that issue.
|
|
|
Something else to note Tittiez, if you check the chart times and dates at the peaks and troughs, you will see numerology. More often than not, the changes in the graph occur on 3, 6 or 9 combinations. Could it be satanic mischief? Ooh...Ancient Aliens is coming on UFOTV, got to go.
|
|
|
He's was the Top explosives expert in the FBI. He was present for various high profile investigations that may have been explosive related.
The arrests were for people trading in child porn, the 30 pieces CP was after he was already a suspect under investigation.
|
|
|
It's trivial to get the IPs of every p2pool miner, and spread the DDoS across them. Many (most?) mining pools can withstand far more bandwidth being thrown at them, than the equivalent in miners' connections, so the DDoS will require less bandwidth to pull off. Furthermore, since such a DDoS takes out the miners' connection, it effectively prevents any failover including solo mining.
To contrast, not only do other pools have higher DDoS resistance in terms of bandwidth, but they generally keep their miners' IPs private, so when/if the pool goes down, the miners are free to failover to another pool. If there is consistently below average (10%) block solutions is this indicative of a possible attack? In an attack, what would be targeted to disuade people from using p2pool? Of course, something that would effect Bitcoin generation, but what ways specifically could p2pool be attacked that would reduce coin generation? Would an intermittent DDoS be more difficult to notice but enough to reduce coin generation?
|
|
|
A former supervisory FBI agent has been arrested and jailed on child pornography charges. Donald Sachtleben was taken into custody and charged Monday after a nationwide undercover investigation of illegal child porn images traded over the Internet. The 54-year-old resident of Carmel, Indiana, has pleaded not guilty and has a detention hearing in federal court Wednesday. A federal complaint alleges 30 graphic images and video were found on Sachtleben's laptop computer late last week when FBI agents searched his home, about 23 miles north of Indianapolis. The arrest was a result a months-long probe, said the U.S. attorney for the Southern District of Indiana, Joseph Hogsett.
Sachtleben is currently an Oklahoma State University visiting professor, according to his online resume. He is director of training at the school's Center for Improvised Explosives, but all references to his work have now been removed from the university's website. http://www.cnn.com/2012/05/15/justice/ex-fbi-agent-pornography/index.html
|
|
|
Did you see the thread, about 20 below, of someone looking to buy an MSI 890FXA-GD70?
|
|
|
It will not work because miner software/AMD-SDK/AMD Drivers need Xserver. You can start with Ubuntu Server as long as you have an ethernet connection and installing a desktop, the lightest of the Desktops is Lubuntu.
To install a basic Lubuntu desktop on Ubuntu Server: sudo apt-get update sudo apt-get install python-software-properties sudo apt-get install lubuntu-core
With this you get a no-frills desktop with no extra software.
|
|
|
Does an installed Linux cry at all if you move a HDD to a different system?
|
|
|
Installed 835 on linux and running good so far.
Once I have a chart open (mtgoxUSD) How do I open in another tab cryptoxUSD? How do I add Volume bar ask/bid to the bottom of the window?
I only been playing around with this for 30 minutes so be gentle.
|
|
|
I made this post because people were debating the best method for spreading thermal compound in other threads. While it didn't quell all of the debate, it is the best proof offered so far on the effects of what each method does. Inaba can prove his theory by making a video, I hear transparent aluminum is available.
|
|
|
Maybe try a different Catalyst, something not so recent. 10.xx or 11.xx.
|
|
|
A denial-of-service vulnerability that affects all versions of bitcoind and Bitcoin-Qt has been reported and fixed. An attacker could isolate a victim's node and cause the creation of blockchain forks.
Because this bug could be exploited to severely disrupt the Bitcoin network we consider this a critical vulnerability, and encourage everybody to upgrade to the latest version: 0.6.2.
Thanks to Forrest Voight for discovering and reporting the vulnerability.
How would I know if I am the victim of this attack?
Your bitcoin process would stop processing blocks and would have a different block count from the rest of the network (you can see the current block count at websites like blockexplorer.com or blockchain.info). Eventually it would display the message:
"WARNING: Displayed transactions may not be correct! You may need to upgrade, or other nodes may need to upgrade."
(note that this message is displayed whenever your bitcoin process detects that the rest of the network seems to have a different block count, which can happen for several reasons unrelated to this vulnerability). https://bitcointalk.org/index.php?topic=81749.0
|
|
|
|