the ambient temperature is 32 degrees, is working with other antminer s4 that go great temperature 52 degrees , this is new s4 + bitmain purchased directly from ... I can not do.
32C should be fine, mine is running in much hotter than that. Do you have sufficient space either side for airflow? Its not receiving hot air from other miners is it?
|
|
|
All images in this one reprocessed from scratch.
|
|
|
One of them makes fancy noises, must be a fan, I remember Dogie wrote somewhere that he had such a noise, too. Some more miners will arrive next week.. My money would be on one of the fans being ever so slightly misbalanced, which at those RPMs generates some exotic sounding vibrations. I had it on my S4, not much you can do other than add in rubber isolation pad.
|
|
|
Get a password generator then you'll never have to remember or type it in. And can change it as often as you like with no consequences on your end.
Can you tell more details about the password generator you are taking about? You could use the free password manager keepass2, it has a built-in password generator: http://keepass.infoLast pass is a good one as thery never store your master pass.
|
|
|
Wow these heatsinks are awesome! at least some update on the S5 They do look very nice. I'm curious someone with new heatsink can you post your normal temps? Does it seem to keep it under the 50C mark consistently? Thanks to anyone who does it! It will be reducing chip temps but it might not be reflected in the readings due to that temp sensor reading a generic PCB temp.
|
|
|
Get a password generator then you'll never have to remember or type it in. And can change it as often as you like with no consequences on your end.
|
|
|
Continuing that, my #1 fan is a "suspect" of the hacking because he doesn't like the moderation / lack of moderation / perceived biasses of admins on here?
There you go again... Dragging him into something completely unrelated. You really are a sad, bitter person, aren't you ? Someone is wearing an eye patch, look at the post just above . As I said last time, everything is about Bick because he makes it about Bick. https://bitcointalk.org/index.php?topic=1071281.msg11464695#msg11464695At any point was I never said he himself hacked the site. BUT I am reasonably certain based on ALOT of information I already have and have posted to this forum, that he had something to do with this. If he gets investigated I am sure something will drop regarding this. Since his last post on BCT the site has been hacked twice. This is not forensic by any stretch, but its certainly a lead and someone with extreme motive and means (money stolen from clients). So he certainly could have gotten someone to do this considering he approached me and others on this. Its worth investigating considering his other actions.
That's a different perspective to the CCN article which basically concluded he did it + ??. Motive is not evidence, its motive.
|
|
|
OpenVMS is considered a highly secure and reliable operating system relied upon by large enterprises around the globe such as Stock Exchanges, Governments and Infrastructure for critical operations. It is supposedly the most secure system in the world.
As well as many small & medium businesses that continue to run it on HP Integrity/Itanium boxes. You've got to be kidding. Check the graph.
I'm not kidding. This graphs is a classical example of data falsification. Solaris is actually a pair of quite distinct OS-es: the classic big-endian SPARC one and the newfangled little-endian on x86/x64. They have significantly different security profiles. "Hey I just made DogieOS today, its the most secure in the world because its never been hacked and there are no vulnerabilities." Its the same claims Apple made for IOS and OSX, before immediately getting rekt by 100s of exploits.
|
|
|
Maybe with a single forum rules you can discourage the forum account buying/selling (but a lot of censorship is not really a good thing, but if the forum is always attacked ... the things *must* change).
The forum *is* under constant attack, but the only attacks you hear about are the ones you get through. Then Theymos gets blamed, not praised for the 500 he thwarted passively.
|
|
|
Well unless malevolent becomes active and proves that he's still in full control of his account, then he would be likely to retain his position as a Global Moderator. He hasn't been around for weeks now, but I'm pretty sure he received the email from theymos. Maybe he has received an email from theymos, but he 'is not' in control of his forum account (who knows). After this another attack I am not surprised anymore (so everything is possible). PS: However, well done admin and good luck with your research (C'mon people theymos will pay a 15 XAU bounty ~ 20k dollars / 75 BTC if you will find the real identity of the 'hacker').Just hand the info over to the FBI, one of the IPs was a server being hosted by a niche NL company. Subpoena them and see what you get out of it.
|
|
|
What QS said is true. CCN is not a credible news site. They use lot of speculation and tell it's a fact.
@OP: I recommend you to message CoinTelegraph. You need to provide them with valid proof. CoinDesk is also good.
The article and the claims are garbage. I skimmed it once and I skimmed it again, it goes like this: Bitcointalk is great AMT + Joshua Zipkin sucks We don't like Josua Zipkin *insert random old screenshots* He would enjoy if Bitcointalk broke Therefore Joshua Zipkin hacked Bitcointalk + add some question marks so can't be sued If there is some actual evidence in there, please point it out. So the full content of skype chats (in my sig) is not evidence enough? Kinda hard to make that much stuff up. Easy to check against the forums posts as well. And the screenshots are not random or old. In fact I challenge you to find earlier versions of those. I took those screenshots on the 25th to CCN as they were requesting them. They have unedited versions I provided as well but these are cropped to preserve the privacy of other people on my contact list. And there is no hard proof he did do this. BUT there is plenty of evidence if one is looking. For instance. Joshua Zipkin's twitter has been very active with alot of SEO friendly links. Things that would bump him up on the rankings. This is something he is known for. In fact before mining this was his thing. Someone with his level of desperation would hire someone to bring this forum down. Considering that there are others in the same circumstance, its very plausible that he conspired with his family/buddies in KNC, Technobit and bitmine.ch to bring this down. Their petahash operation cant generate new business if their reputations are smeared here. Business is lost. Joshua made it his mission to bring this forum down, there are others who can back this information up. No, that is not evidence that he hacked anything. This quote just highlights the problems in the article: There are other suspects, surely. Butterfly Labs came to many people’s minds... BFL is NOT a suspect - a term which means a very specific thing - its just an entity that could potentially have a motive. And exactly the same falsified logic is used against Josh, all we have is him wanting the forum to be gone in posts from 6-12 months ago. Along with you detailed how you are able to manipulate the moderators and ck in particular... Continuing that, is Bicknellski a "suspect" of the hacking because he doesn't like the moderation / lack of moderation / perceived biasses of admins on here? No of course not, he's just another party in a huge line of people who may benefit from bct disappearing. Considering that there are others in the same circumstance, its very plausible that he conspired with his family/buddies in KNC, Technobit and bitmine.ch to bring this down.
You see? You're trying to spin a conspiracy into "he did it" when its just that, a conspiracy. And CCN has run with it because clicks = money.
|
|
|
Is quickseller trying to bury the association?
Interesting in deed.
Opi stop listening to QS I doubt he knows anything more about all this than you do personally and spread the information FAR and WIDE leave no media or agency untouched with the information. Some of it will stick. Mister Quickseller is anonymous entity on these boards and covers up his location / identity for someone that is supposedly trustworthy you might want to be more careful in your interactions with this user Opi.
What QS said is true. CCN is not a credible news site. They use lot of speculation and tell it's a fact. @OP: I recommend you to message CoinTelegraph. You need to provide them with valid proof. CoinDesk is also good. The article and the claims are garbage. I skimmed it once and I skimmed it again, it goes like this: Bitcointalk is great AMT + Joshua Zipkin sucks We don't like Josua Zipkin *insert random old screenshots* He would enjoy if Bitcointalk broke Therefore Joshua Zipkin hacked Bitcointalk + add some question marks so can't be sued If there is some actual evidence in there, please point it out.
|
|
|
Went to check speeds tonight, saw this on one of the miners:
Rebooting doesn't change it, what are the troubleshooting steps to take from here?
1) The loss of the temp sensor suggests it may be do with either power into the board (all), or its cables to the controller. 2) But the lack of mining on the other suggests the controller 3) Put it on its own PSU, so the Evga 1300 temporarily. 4) Put it on BTCGuild for now. 5) Try swapping ports the board connects to on the controller 6) Then try swapping a cable from a known working miner and see if the problem moves. 7) PM me your order number so I can check warranty status please. That should be enough for now.
|
|
|
Well, it's impossible to be completely secure from an attack... they admins ARE human. My concern is how easily the hackers were able to get in.
How do you know it was easy? How do you know that this was the first attempt?
|
|
|
Its just some garbage 'awards' to make money, it doesn't really mean anything.
|
|
|
If the problem was on one hashing board, I'd say its the S5, but because the problem is moving it becomes 50x more likely that its the shared resource, being the PSU. Test with your second PSU and see where the problem migrates, if it remains.
|
|
|
about 80% of accounts here have a fake email address set. People are reluctant to use real email addresses so they can stay anonymous. Only thing people can do is log in and change their password before the hacker can crack it.
Some of those 80% will still have access to the fake/throwaway email accounts, some wont. It takes 5 minutes to setup a spare email account for security / spam and it only needs to be checked 1 a year to make sure it remains active. Anyone that isn't maintaining these accounts in a password manager is irresponsible and deserves to become a newbie again. no i mean 80% of the emails are invalid, they aren't temporary emails, they are invalid that bounce emails back. Most people just entered sadasdsdfgdfgdfgdfa@gmail.com or similar, the email accounts don't exist. The only authentication the forum has is password/security question, email is no good for us, even satoshi's account has an invalid email. I thought we knew Satoshi's (since hacked) email? Or are you saying he didn't even use that one on here?
|
|
|
Theymos,
Check your PMs. I sent you some info on something that might get the ball rolling. That said there are obvious suspects which info I already provided to CCN. Some press coverage might get the right wheels greased to get an actual investigation going.
I don't think a witchhunt + grease is a good combination, it just ends up in a "everyone is Satoshi" shitstorm that gets innocent people caught up. Those that aren't yet aware of the hacking yet probably don't have the expertise to work it out, so let those that do get on with it.
|
|
|
What's the limit for passwords? I tried using an unreasonably large string as my password and didn't receive any error messages (despite the load time after I press the login button being huge). Were the last characters of the string cut off for it to fit a certain limit?
No, the last characters are not cut off, at least not at any "reasonable" password length. My password here is over 60 characters, and it still cares about whether the last character is entered. I used a 2024 character string though. Not the most reasonable password length eh? I was pretty surprised to see that there wasn't any warning or error message and that's why I came here to ask if there's any limit. Aaaaaand now we know the reason why the server lags every now and then, you're signing in For the sake of the servers might want to set it to a reasonable 50 or so, which has the same strength of 2048 = not worth bruting = just as likely to be social'ed or reset. Thanks theymos, I have changed my password yesterday and also today... and I hope to be 'safe' (a big word) now . XAU for his real identity, it is a lot of money.... and I do not think he is stupid (he made a soc. engir. attack... only a few people are able to do it). PS: however good luck with the search. From what I saw it wasn't a new virtual identity that was used in the attack.
|
|
|
C1 sold. Lowered price on Ares.
|
|
|
|