Show Posts
|
Pages: [1] 2 »
|
On the page I linked in the OP, there are measurements of the (ridiculously expensive) replacement fan. That is identical to the one on the card. The one you linked, while a bit smaller (75mm instead of 85mm), would probably fit on the card. If I don't find anything better, I'll probably buy it. For $4 including shipping there is not much risk. Two options, replace the whole cooler with a aftermarket one, ArticCooling, Akasa, Thermalright etc, or cut one more blade of the fan, so the balance is even on the even. I will try the second option first, because it is already broken and you loose nothing for a try.
Unfortunately, since I broke off the first blade, I broke off many others. I didn't even think I could "fix" it by breaking off another blade. Thanks for the quick responses.
|
|
|
These patches also don't do what they claim to do— they'll still apply fees in some cases. (Though at least thats a good thing)
Of course, it wasn't my intention for the patch to remove ALL fees. It only removes the necessity of paying the fee which started around 0.3.23. It reverts the client behavior to the one from 0.3.20. I'm not quite happy with that, why not eliminate forced transaction fees altogether? Here's the patch I use: --- main.h 2012-02-18 14:00:22.008162091 +0100 +++ main.h 2012-02-18 14:00:22.008162091 +0100 @@ -35,8 +35,8 @@ static const int MAX_BLOCK_SIGOPS = MAX_BLOCK_SIZE/50; static const int64 COIN = 100000000; static const int64 CENT = 1000000; -static const int64 MIN_TX_FEE = 50000; -static const int64 MIN_RELAY_TX_FEE = 10000; +static const int64 MIN_TX_FEE = 0; // Changed by dani147624 +static const int64 MIN_RELAY_TX_FEE = 0; // Changed by dani147624 static const int64 MAX_MONEY = 21000000 * COIN; inline bool MoneyRange(int64 nValue) { return (nValue >= 0 && nValue <= MAX_MONEY); } static const int COINBASE_MATURITY = 100; @@ -568,6 +568,8 @@ int64 GetMinFee(unsigned int nBlockSize=1, bool fAllowFree=true, enum GetMinFee_mode mode=GMF_BLOCK) const { + // Changes by dani147624: this should now check what the minimum fee would be, and then return 0 anyway. + // Base fee is either MIN_TX_FEE or MIN_RELAY_TX_FEE int64 nBaseFee = (mode == GMF_RELAY) ? MIN_RELAY_TX_FEE : MIN_TX_FEE; @@ -602,13 +604,14 @@ if (nBlockSize != 1 && nNewBlockSize >= MAX_BLOCK_SIZE_GEN/2) { if (nNewBlockSize >= MAX_BLOCK_SIZE_GEN) - return MAX_MONEY; + return 0; // Changed by dani147624 + nMinFee *= MAX_BLOCK_SIZE_GEN / (MAX_BLOCK_SIZE_GEN - nNewBlockSize); } if (!MoneyRange(nMinFee)) nMinFee = MAX_MONEY; - return nMinFee; + return 0; // Changed by dani147624 }
I'm waiting for a transaction created with this to be confirmed, but have had little luck in the last 2 days. It's input has many transactions (maybe 20-40) of newly generated coins (from p2pool) and it's output has 1 BTC plus some change. I hope it will get included in a block once. (It would take quite some months for me to mine it with my 160 MH/s.) Details of transaction: "account" : "", "address" : "1AaTGqfaGhuqUq8Eaq6dmLsDjEFjtwGkQA", "category" : "send", "amount" : -1.00000000, "fee" : 0.00000000, "confirmations" : 0, "txid" : "ded01bdef405f10258d4bb180f79680f83023e8c179d3e165f4a2db268fa34fb", "time" : 1329412273
I did manage to get about a thousand 1 satoshi, no fee transactions into the testnet blockchain with it, but I had to mine the block myself.
|
|
|
Do you plan adding support for non-deterministic wallets? I don't think I would like to use a deterministic one. (I can't really give a reason why, I just don't like the idea.)
Also, if the client will not do block validation, please keep the option to only accept blocks through the satoshi client.
Edit: Oh, by the way, I mentioned I can't create transactions with insanely large transaction fees. Here's the error message I get when trying to send 1 satoshi with a 2200 BTC fee: "SelectCoins returned a list of size zero. This is problematic and probably not your fault." I don't think this is a real problem, but I thought it's worth mentioning.
|
|
|
Hmmm... I got an error message when trying to send 5 BTC with more than 1252 BTC fee. Interestingly, when I decreased the 5 BTC by 1, I could add 1 BTC to the fee. I forgot to write down the error message, but I can try again in 120 blocks when I get back the 1257 BTC. (This was in testnet, of course.) Not that it really matters (who the hell sends transactions with >1000BTC fees?), but I thought it was worth sharing.
|
|
|
What caused the chain to split? Is there any reason why the new chain would be better than the old one?
|
|
|
Montico == account-stolen
Thanks! I can no longer login to his paypal, so I believe it is now safe to disclose his password and how I guessed it: After server run his program he posted something (maybe an error messages) which contained a login name and password for his ftp: btc:btcwh1t3p0w3r. And these also worked for ssh. I tried logging in as root with that password, and it didn't work. So I omitted the 'btc' part and tried just 'wh1t3p0w3r' which did work. Oh, and his e-mail address contains his name, so we have that too. (I'm not making that public, but theymos can probably see it if needed.)
|
|
|
Could an administrator or moderator look at the IP addresses of Montico and account-stolen? I am interested whether they are different...
(My IP is 94.248.129.19, I have logged into Montico with this, I hope this didn't screw up anything.)
EDIT: I'm reporting this message to a moderator, hoping that it will get answered more quickly. The forum software doesn't allow me to do that.
|
|
|
Yes, after uploading my wallet, i ran the miner, but it didnt work, not on my server (which collapsed today) or on my pc. Reinstall everything?! Is there no way to remove this virus without reinstalling everything? I've heard from the pool in an email. No, just 1 other was mining there, but for the first 100 Miners, there is an reward of 10 BTC. But i never got them  Wait, you got some random email from someone you dont know offering a 10BTC reward, you "uploaded your wallet" (??), downloaded a binary, ran it on both your server and your desktop ? Are you serious? Can you post that email with header? Ill be honest. Nothing you say makes any sense. You are supposedly a newbie that has no clue about bitcoin, you never mined before, only now with a miner that isnt a miner but a trojan. Yet you claim to have lost bitcoins? Moreover I can not find any single reference to this cross miner thing in google, other than in this very thread. Ill give you the benefit of the doubt, but it seems quite likely you are the very same scammer that started this thread. The cross-miner thing is what he mentioned: crossminer.tk. It resolves to the same IP address as wotan.cc Other than that, it doesn't make much sense. I'm currently having a conversation with him through email, let's see what turns out of this...
|
|
|
The pool at crossminer.tk But this is down, and my wallet also  I'm not montico, i'm Sebastian. And, i think, hid did something, a mail in my gmail-account took me to this site! And he wrote, that he logged in my PayPal-Account, and now, BTC and REAL Money is gone! And who is "OP" ?! OP means Original Poster, the person who have started the thread. If you're honest here, you have been victim of the malware created by "Montico" and also of identity theft. Please get in touch with me via email as soon as possible. Please also share details how you gmail-account took you here. Hmmm... maybe the forum hides my email, I thought it was visible. It is dani147624@gmail.com
|
|
|
What the fuck is ths here?! I checked my gmail account and it took me here. I signed up for the cross-mining pool, and 2 day later this?! What the hell?
Now my PayPal-Account is empty and locked?! Hope, you dont live in Germany, dani147624. Tomorrow morning i will go to my lawyer! Or give me my money back! My gmail-Account is the only thing thats working. The Account on the pool is away, together with my wallet there, and many other things!
So, write me an eMail, what you did, and where my money and bicoins are!
I haven't sent any money from your paypal account, nor have I messed with any bitcoins. I did, however, contact paypal and suggest that the account be suspended until the owner identifies himself. What I get now when logging in with his details is this: We are currently performing regular maintenance of our security measures. Your account has been randomly selected for this maintenance, and you will now be taken through a series of identity verification pages.
Protecting the security of your PayPal account is our primary concern, and we apologize for any inconvenience this may cause.
I signed up for the cross-mining pool, and 2 day later this?!
This shows that you don't even know what you're talking about. The website in question wasn't a pool, but a wallet stealing software advertised as an efficient miner. If you wish to prove that you're the one who owns the email address associated with the paypal account I found the password for, please use that to email me. My email address can be found on my profile.
|
|
|
LOL. Actually he has paypal. And the password is the same. The e-mail address is now available on his profile.
I will not, however, send money from his paypal. I consider that too illegal to do. (He has about 60 EUR.) Theft is theft and I have no reason to believe that he already managed to scam someone. If he had, I might have transferred the money on another paypal account to hold it until this is resolved.
EDIT: Oh, and some additional info: on his gmail account he had this password once, but it was (according to gmail) changed 3 months ago.
I quite agree. However, I would change his passwords on paypal and gmail. If this is a hijacked account, you will actually be doing the real owner a favor. And it will prevent anyone else reading this thread from emptying his account. He might deserve it, but its not up to us to do that. I don't have his gmail password (only the one he changed about 3 months ago). I also can't change his paypal password (I tried to change mine as a test, and it asked me my bank account number). I'll change his password in this forum (if I can) and hide his e-mail address again.
|
|
|
LOL. Actually he has paypal. And the password is the same. The e-mail address is now available on his profile.
I will not, however, send money from his paypal. I consider that too illegal to do. (He has about 60 EUR.) Theft is theft and I have no reason to believe that he already managed to scam someone. If he had, I might have transferred the money on another paypal account to hold it until this is resolved.
EDIT: Oh, and some additional info: on his gmail account he had this password once, but it was (according to gmail) changed 3 months ago.
|
|
|
getting some personal information would be nice , but i dont think he is that stupid is he?
Unfortunately he changed his password before I could start downloading everything he had... Anyway, at least his site it down now (he took it down, not I).
|
|
|
It's nice from the scammer to have left us an ftp server, login and password: ftp://btc:btcwh1t3p0w3r@wotan.cc I'm uploading some /dev/urandom to that, maybe that causes him some frustration.  EDIT: That idiot has ssh on the box, and I managed to guess the root password (it wasn't hard). What do you think I should do? 
|
|
|
How do you determine who gets a part of these bitcoins? Is it random? Or should everyone mining in p2pool be receiving them? If the latter, it isn't working perfectly, as I haven't received any bitcoins except for the generation. My address: 13ueEyoJY6c3cQk8ZgaAxhw3MeNYdpP3Te
|
|
|
If you insist, you can add the sending address as a second recipient to which you send all remaining coins. However, this is not recommended.
|
|
|
Damn it!  Doing the operations was my first idea... I managed to force pywallet to output something in hex, which I beleived, were the numbers: 33 + caea7cc3f8b198101e0f7ffb0eeb2e8c85ce9e72cc628990f30f41183aa6eba58761c239d03ded / 019385 (all in hex) Doing these operations in gcalctool I ended up with this solution: 80BBC798A19A21A8BCEAA022375B1B73C73EF466CBE5B48D1DB1C195B26CC4603DDC2F897C However, when this was imported into my wallet.dat, I didn't get the bitcoins (bitcoin was restarted with -rescan). What did I screw up? The base58-key kontains 5 additional bytes that the hex-version do not. The blue part is the actual key: 80BBC798A19A21A8BCEAA022375B1B73C73EF466CBE5B48D1DB1C195B26CC4603DDC2F897CNow that I think about it, pywallet probably didn't allow me to import the long key, so I deleted the last 5 bytes... Turns out I should have deleted the first byte and the last 4 bytes instead... Well, anyway, thanks for pointing that out.
|
|
|
Damn it!  Doing the operations was my first idea... I managed to force pywallet to output something in hex, which I beleived, were the numbers: 33 + caea7cc3f8b198101e0f7ffb0eeb2e8c85ce9e72cc628990f30f41183aa6eba58761c239d03ded / 019385 (all in hex) Doing these operations in gcalctool I ended up with this solution: 80BBC798A19A21A8BCEAA022375B1B73C73EF466CBE5B48D1DB1C195B26CC4603DDC2F897C However, when this was imported into my wallet.dat, I didn't get the bitcoins (bitcoin was restarted with -rescan). What did I screw up?
|
|
|
Why are there no new pictures and clues? Did you decide not to continue? 
|
|
|
|