Bitcoin Forum
May 02, 2024, 09:05:06 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 [93] 94 95 96 97 98 »
  Print  
Author Topic: [ANN] [BEN] Benjamins ◄ SHA-256 ►◄ BOUNTY AVAILABLE to make BEN merge mineable!!  (Read 94313 times)
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
May 27, 2014, 08:25:11 PM
 #1841

https://www.youtube.com/watch?v=-cHfEBH98yM

G. Edward Griffin is also on the list of heroes.

I have plans, but I am glad to just use this thread to bounce the truth being said, no need for me to add anything, except hope that some solution can be developed not be developers, but by regular folk.

We need no paid cadre to design some good system.

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
1714683906
Hero Member
*
Offline Offline

Posts: 1714683906

View Profile Personal Message (Offline)

Ignore
1714683906
Reply with quote  #2

1714683906
Report to moderator
Even in the event that an attacker gains more than 50% of the network's computational power, only transactions sent by the attacker could be reversed or double-spent. The network would not be destroyed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714683906
Hero Member
*
Offline Offline

Posts: 1714683906

View Profile Personal Message (Offline)

Ignore
1714683906
Reply with quote  #2

1714683906
Report to moderator
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
May 29, 2014, 04:59:17 PM
Last edit: May 30, 2014, 12:48:01 AM by itsunderstood
 #1842

https://www.youtube.com/watch?v=-zzSAoD2mzU

^^^ Good video here as to 55 Water St.

If you don't know conspiracy, I am probably one of the foremost conspiracy researchers in the USA.  Feel free to ask me about this issue.

I think Benjamins Franklin would appreciate what we are doing.  I feel his ghost hearken near.  Mine Benjamins with me friends.  Study and learn the code with your friends and families.  Mine Benjamins and gift them and use them, for no basement vault is safe.

And again, if you have any questions about conspiracy, you'd waste your time asking anyone else.  So, just ask me here, what conspiracy facts you would like to know.

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
May 30, 2014, 04:15:15 PM
 #1843

http://www.bullionanalysis.com/CFTC-Meeting-Martin-Armstrong.pdf

^^^ You should read Martin Armstrong if you want to stay fully informed, as I am.  I have enjoyed his work though it does tend to be a bit overarching in terms of his belief that he can predict "cycles".  Every man wishes to believe he can look at history and thereby ken the cycles of the future.

That is also what is meant by "modality" it refers to the keeping of a particular cadence or rythym, even when nobody else can see whats happening.  In a way, a drummer is the one who creates the desire.

Anyway, to understand the basics of gold manipulation (without getting into Keenan affair and WW2 gold thefts and fake treasury notes, etc) is to understand:

1: the ratio at which gold and silver typically trade in history which is roughly 8:1
2: the difference in how that ratio has changed to approx 60:1 on the face of it.
3: Understand that placer gold nugget in hand, is totally better than any gold bar as it has been assayed by the CREATOR as gold, not marked by Germany or filled with river-tungsten, LOL.

So, I will be mining Benjamins 24/7 but also will be down at the river, studying this Benjamins code, hoping this great team will continue to host the sites and perhaps even bring AllAboutTheBenjamins back to the thread to update according to the COTUS, liberty, and the spirit of 1776.

If people want to modify the difficulty to make more coins, faster, then fine.  But long term vision if what allows money to last, without being debauched.

Here is the question for the day:  Can a blockchain or wallet, held and run by good people, be debauched as would gold coins or fiat money?

Well, certainly the market value could be made to fluctuate, but that is only important to those who trade fluctuations.  If strong hands hold and use Benjamins as with gold and fiat, well, which of the three would be more easily debauched??

If you split each of the 2.4 million existing Benjamins into 1000 MicroBen, that's 2.4 billion coins.  Plenty to accomplish any world trade.  But how to make a blockchain or a coin or a government, non debauchable?  Can it be done?  I throw that question open to the floor of ye fine thinkers and miners and marketeers of the world.

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
May 30, 2014, 04:24:33 PM
 #1844

http://www.bullionanalysis.com/CFTC-Meeting-Martin-Armstrong.pdf

^^^ You should read Martin Armstrong if you want to stay fully informed

[...]

Here is a quote from Martin A. document above:

"Because of numerous Presidential Executive Orders, the ethically questionable Project Hammer was deemed legal."

...and if you will please note, Ed Snowden's emails are simply asking about the legality between statute and Executive Order.  So, the issue of Executive Orders being wartime tools ONLY, is important when one begin to forge backward to the 1776 mindset.

It is a mindset of knowing common law.  Because in 1776 common laws, were the way of the world.

And in 1776, both metals and man, can be true or full of ill intent.

How to assay a man?  How to make gold work in a godly way?  Neither question perhaps has an answer.  But what is an Executive Order if not simply orders from the King?

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
May 30, 2014, 05:17:20 PM
 #1845

https://www.youtube.com/watch?v=j282JKnmeVo

^^^ Good 7 min primer for you and your family and church (LOL) to sit down and watch about the Federal Reserve Bank which is owned by European families as bondman and we Americans as bonded chattel.

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
May 30, 2014, 05:52:18 PM
 #1846

Also relevant to predictive random number generators and their removal after outcry, hehe

The "Federal Register" is the key machine at work here, LOL

Like a Key on a kitestring?  Trying to catch lightning for 1.21 gigawatts of fractionalizating power?

Quote
May 30, 2014
20 minutes ago

NIST requests public comment on proposed SHA-3 cryptographic standard
http://phys.org/news/2014-05-nist-comment-sha-cryptographic-standard.html#jCp

[...]

Comments from the public on the draft of FIPS 202 are welcome for the next 90 days until August 26, 2014, after which NIST will incorporate them into the final version of the specification. The draft is available at csrc.nist.gov/publications/drafts/fips-202/fips_202_draft.pdf. Comments may be sent to NIST either electronically or by mail. Full details appear in the Federal Register at federalregister.gov/a/2014-12336.

[...]

In September 2013, news reports prompted public concern about the trustworthiness of Dual_EC_DRBG. As a result, NIST immediately recommended against the use of the algorithm and reissued SP 800-90A for public comment.

Some commenters expressed concerns that the algorithm contains a weakness that would allow attackers to figure out the secret cryptographic keys and defeat the protections provided by those keys. Based on its own evaluation, and in response to the lack of public confidence in the algorithm, NIST removed Dual_EC_DRBG from the Rev. 1 document.

The revised SP 800-90A is available at csrc.nist.gov/news_events/index.html#apr21 along with instructions for submitting comments. The public comment period closes on May 23, 2014. NIST will take those comments into consideration in making any revisions to SP 800-90A.

NIST recommends that vendors currently using Dual_EC_DRBG who want to remain in compliance with federal guidance, and who have not yet made the previously recommended changes to their cryptographic modules, should select an alternative algorithm and not wait for further revision of the Rev. 1 document.

Read more at: http://phys.org/news/2014-04-nist-cryptography-algorithm-random.html#jCp

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
May 30, 2014, 06:20:46 PM
 #1847

From the thread in my tagline:

Quote
Above Top Secret User ID: "sean"

posted on Apr, 19 2014 @ 07:41 PM

[...]

When you install Windows there is a built in administrator account that is made and then it is disabled once the first user is created, which is also a administrator. Usually 9 times out of 10 that user will continue to use that user (admin group) account. When that user downloads a program and gets a virus or root backdoor, since the user is admin the virus also becomes admin or with admin privileges.

The thing is Microsoft doesn't tell people that you should create another normal user and use policies to protect the system and administrator accounts. This would stop the majority of viruses dead in their tracks. Why? The normal user under the systems security policy cannot download, cannot alter the registry, cannot use msconfig tools, cannot use the CLI, cannot create services, cannot alter the registry etc.

Some browser hijacking viruses may still get through the browser because of flash, java and other things running in the browser. Those sorts of things are still able to punch holes in the security of the system because they are still ran as SYSTEM even though they are under a normal user with no administrator privileges. It's definitely an ongoing debacle.
edit on 19-4-2014 by sean because: (no reason given)

So this is why people suggest using Linux and it makes sense, because you don't start out completely BACKWARDS with Linux.

At least Linux is open sourced such that everyone knows Microsoft's policies are designed to cultivate a feild of viruses, globally.  Total class action suit material here, but god help anyone who goes against the flag of Microsoft, hehe, what flag be that under which ye fly? 

Sorry, but, piracy is completely within the modality of 1776 style work and play.  Comments on the above, from Benjamins crowd?

If you are as bad at Linux as me, you know it would be easier to just Nationalize both Apple and M$ and make them useful.

Call it Micrapple(tm).

Just take them in the name of America.  Haha, but anyone who ever said that would be in serious danger!  Like what if you called ENRON at the peak, before it crashed?  You would sound like an epic loon, and maybe you might end up in a ditch outside Hyderabad if not careful, Wink 

I am guessing of course, that was looong ago, Worldcom, bridge to India, ENRON I mean.

Web shout out to Reinhardt, another IP persona who is known for teaching us much about ENRON and how they make money with the wrecking ball.

M$ >< Linux = Win for humanity?  Err, not yet...

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
May 31, 2014, 04:03:30 PM
 #1848

Security is important to all who value other people's money, stayin in their own hands.

Who builds weak security? 

Quote
http://www.theverge.com/2014/5/29/5762496/new-heartbleed-attack-targets-android-devices-and-routers-over-wi-fi?

/new-heartbleed-attack-targets-android-devices-and-routers-over-wi-fi

[...]

It's still unclear how many devices are vulnerable, but the damage is likely to be much more contained than Heartbleed. The most vulnerable targets are EAP-based routers that require both an individual login and a password — a solution often found in wireless LANs. In those cases, an attacker could use Heartbleed to pull a private key from the router or authentication server, effectively bypassing any security measures. Grangeia says he hasn't done enough testing to estimate how many of those routers are running vulnerable configurations. More importantly, the attack could only target devices within Wi-Fi range, seriously limiting the potential targets. "This particular variant of the attack might be slower to close," Grangeia says, "But it should not be nearly as widespread as the original bug, since the universe of vulnerable devices is lower."

Another concern is Android devices still running the 4.1.1 version of Jelly Bean, which are known to be vulnerable to the bug. In a router-based attack, the attacker would offer an open Wi-Fi signal and then perform the Heartbleed attack to pull data from any connected devices. It's a new line of attack, leaving many Android devices newly vulnerable. As of last month, millions of devices were still running 4.1.1, including several variations of the HTC One. Many were updated in the wake of the attack, but others may still be vulnerable.

These sorts of breakdowns are why we need open honest code, with good people using it to their advantage, not corporate personages and crap brands.

Some I am quite glad to see positions being taken, in the cryptsy market, either for or against, liberty and freedom.

My friend earlier in the thread who said tablets are crap hardware, was correct.  Because, they designed it that way.  Hm... Funny in Star Trek:TNG they never have tablet viruses.  LOL

I will be at the river this afternoon, might do a little panning, but might just swim or read a book about history.  If you are at the river, I hope to see you!  Mine Benjamins with me my friends.  Or, purchase and hold them like milk of future hopes not yet gotten into the bucket.

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
June 01, 2014, 03:59:57 PM
 #1849

Another reason to see a blockchain as being better than debt, is this:

Quote
http://labornotes.org/2014/05/social-security-threatens-close-all-field-offices

But that will change if the Social Security Administration’s “Vision 2025” comes to pass. Bureaucrats are mulling closure of most of SSA’s more than 1,000 community field offices in the U.S., where 43 million people sought services last year.

Even as the number of visitors continues to grow, Vision 2025 would virtually eliminate face-to-face service, replacing it with Internet services and an 800 phone number.

Thirty thousand field office employees would be laid off—following nearly 11,000 positions already eliminated. When SSA sought its employees’ input for Vision 2025, they responded overwhelmingly that field offices were vital to the agency’s mission.

So see when Alan Greenspan did the Fed's bidding and further destroyed our economy, he knew he was following orders to destroy the Social Security Trust Fund, he even tried to fob off the responsibility in Congressional hearings.

And now Social Security will never be able to pay me, who is fully vested in the fund, so, what do they do now??  They fail, as was the plan of evil.

So, we need a future, not built by assholes.  For this reason, I mine Benjamins. 

See you at the river!

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
indiguy
Full Member
***
Offline Offline

Activity: 154
Merit: 100



View Profile
June 03, 2014, 08:32:06 AM
 #1850


Benjamins is also added and now has it's own page on http://coinwik.org a wikipedia listing all the alt coins to help you quickly find facts and links about your favorite coin.

http://coinwik.org/Benjamins
We encourage you guys If you know of other facts and links that can be added to the page, please feel free to update the page.
crackfoo
Legendary
*
Offline Offline

Activity: 3458
Merit: 1126



View Profile WWW
June 03, 2014, 04:45:55 PM
 #1851

anyone know what the default p2p port is for ben wallets?

Thanks

ZPOOL - the miners multipool! Support We pay 10 FLUX Parallel Assets (PA) directly to block rewards! Get paid more and faster. No PA fee's or waiting around for them, paid instantly on every block found!
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
June 03, 2014, 08:43:06 PM
 #1852

anyone know what the default p2p port is for ben wallets?

Thanks

Hey crackfoo, I will post what I have, but a lot of this you already know.  Let's correct anything wrong here:

these are my config files:

To run bfgminer and connect to hasher.ca:

launchbens.cmd is a possible example filename, just copy and paste to a notepad file:

Code:
C:\bfgminer2014\bfgminer.exe -o stratum+tcp://stratum.hasher.ca:3394 -u 16sD5dAMrt6EE4zystJN4r5sZzmPR4srYi -p xxx -S antminer:all --set-device antminer:clock=x0781 --http-port 8330

So in this -u is my Benjamins inbound wallet ID, and I am choosing the standard Benjamins/BTC port 8330 for mining

And prior to that I edit benjamins.conf in C:\Users\user\Application Data\Benjamins such that it read like this:

Code:
rpcuser=x
rpcpassword=pass
rpcallowip=127.0.0.1
rpcport=3393
server=1
gen=0

addnode=198.147.23.176
addnode=162.243.225.132
addnode=79.30.41.82
addnode=79.35.184.193
addnode=178.210.43.53
addnode=37.4.59.204
addnode=188.162.40.145
addnode=67.233.202.8
addnode=66.186.168.160
addnode=70.169.118.178
addnode=216.145.101.106
addnode=123.211.105.43
addnode=50.42.35.91
addnode=46.118.221.232
addnode=124.169.133.2
addnode=86.5.174.41
addnode=151.50.110.59
addnode=184.75.214.210

As for the question about the Benjamins wallet, the selection "Allow port selection via UPnP" is available and seems to work fine.  But I am not sure off hand how to know which port it's running on.

But there is a lot of work to do so I appreciate all who are holding Benjamins long, and trying to mine.  Ask questions as this is the goal, to get new people up and running on SHA-256 gear like Ants and such, and mine with us.

Should we have a conference call or something?  I will just sit in the background and say little unless you ask me to.  We could use gotomeeting.

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
June 03, 2014, 08:52:58 PM
 #1853


Benjamins is also added and now has it's own page on http://coinwik.org a wikipedia listing all the alt coins to help you quickly find facts and links about your favorite coin.

http://coinwik.org/Benjamins
We encourage you guys If you know of other facts and links that can be added to the page, please feel free to update the page.


Thanks!  Here's where I will apologize to the Dev crew for being such a hamfisted fool.

Grin

But we can edit this code however BenjaminTheCoder feels should be done.  He knows he is welcome here in this thread as he is the guest of honor who got this lightning bolt into the right place at the right time. 

Whomever AllAboutTheBenjamins is, he is the true visionary.  His simple error, has made a rockface of difficult proportions but that allows a nice stable mining expectation, and a rarity of coins produced, that is simple to grasp.  Perhaps a slip up of divinity?  Nice work bro.

Bro, nobody had ever roused a 1776 ghost to a blockchain like this, so it was you and your team who allowed me to be such a goofball.  Thanks.

At this point, other than my being in the right location on Earth, (near placer gold) and mining Benjamins, I can't really add to much except technical updates as to security, because so much software is riddled with holes that prove quite costly in the long run.

So that's why I post technical and politicial articles to a launch thread for a 1776 blockchain.  I am trying to explain the potential of 1.21 gigawatts if you just manage to get a Delorean underneath it at the precise time.

Yes, let us build the Benjamins wiki.  For the future.

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
June 04, 2014, 04:57:21 PM
 #1854

Cryptolocker toolkit now moving to Droids (remember me and my buddy who said that all droids and tablets are crapware?)

Their CnC servers are hidden in Tor, which is already a USN weaponized covert battleground.

Be aware that Tor will probably be the only way to do things in the future, but if that's a setup, one has to wonder why the USNavy wouldn't still be smarting from the morning of 9/11 when the ONI offices at WTC7 and at Pentagon were crushed.  And do you know what the ONI offices were investigating?  Gold thefts of WW2.  True story!

Be ready for computer>theft on a scale we have never thought possible.  Be ready for Bitcoin to be smeared as the worst vile thing ever. 

Be ready to seek a blockchain with integrity and purpose.  That would be Benjamins, which is only used by a small group with extremely simple understandings: Privacy, Liberty and death to corsets.

Quote
http://www.welivesecurity.com/2014/06/04/simplocker/

ESET Analyzes First Android File-Encrypting, TOR-enabled Ransomware
By Robert Lipovsky posted 4 Jun 2014 - 12:36PM

Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android by our detection engineers.

Let’s put this all into perspective, so we know what we’re dealing with here…

Almost exactly one year ago, a hybrid comprising characteristics of a rogue AV and ransomware (the lockscreen type, not a file-encryptor) was discovered, calling itself Android Defender, as reported by Symantec. It had all the typical traits of a fake AV and all the typical traits of a lockscreen ransomware – in that it was not actually that trivial to get rid of when a user was not protected by a mobile antivirus, they had to disable it by booting their device into Safe mode. ESET detects it as Android/FakeAV. And a less aggressive Android Defender without the lockscreen functionality was analyzed by Sophos in May 2013.

Last month the blog Malware don’t need Coffee reported on a police ransomware for Android by the Reveton team. Again, this was an evolutionary migration of a malware type very prevalent in the recent years from Windows to the Android platform. Although some connection to Cryptolocker (one of many file-encrypting trojans, which ESET detects as the Win32/Filecoder family, that received an overwhelming amount of media attention and that I have written about here and here) was suggested by Kaspersky, the malware, detected by ESET as Android/Koler was neither Cryptolocker, nor did it encrypt any files on the infected device.

[...]

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
June 05, 2014, 05:17:25 PM
 #1855

https://www.youtube.com/watch?v=Q8pE3tNbBNI

^^^

Jim Willie's list as of 6/5/14 looking forward:

Step 1: The FTO is launched (Yuan gold placed in bench for their exchange)
Step 2: Energy transaction (non SWIFT) begins massively happening in Yuan
Step 3: Gold Trade notes > Gold bonds > Gold Yuan established (FOREX level letter of credit replacement)
Step 4: BRICS + associates sign on
Step 5: Global Barter system, computerized at teirs/levels (national/corporate/retail)

It is very interesting at where Jim says maybe the Belgium T-Bond buying is actually sourcing the BRICS central bank of gold.

But notice at 8:00 in he talks of the retail barter level.  Gold backs the barter system at the ground retail level.

Please do mine Benjamins and help us create a strong true exchange of goods before it's needed.  This wind will move quickly.  We will need all sundries, gold, diapers, and food of course.  But it will need to be a computerized exchange.

Debt cancellation would be a disaster unless you are prepared to profit from a true world with true money.  Let's see if we can capture lightning, shalln't we?

Mine Benjamins and study the code with your family, and buy and hold Benjamins long.  Let us use this thread to catch the lightning of providence.

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
June 05, 2014, 07:35:07 PM
 #1856

Quote
http://yro.slashdot.org/story/14/06/05/1848207/att-charges-750-for-one-minute-of-international-data-roaming

att-charges-$750-for-one-minute-of-international-data-roaming


reifman (786887) writes 'Last week, AT&T shut down my data service after I turned roaming on in Canada for one minute to check Google maps. I wasn't able to connect successfully but they reported my phone burned through 50 MB and that I owed more than $750. Google maps generally require 1.3 MB per cell. They adamantly refused to reactivate my U.S. data service unless I 'agreed' to purchase an international data roaming package to cover the usage. They eventually reversed the charges but it seems that the company's billing system had bundled my U.S. data usage prior to the border crossing with the one minute of international data roaming.'

^^^ This is an important nodal point if you are following AT&T (The NSA itself actually) and its desire to throttle the inter-nationality urge of all good people, and of course of Americans.

They are trying to create smaller worlds, not bigger one.

What would Benjamin Franklin say?  Under what false names would he mock them?  Grin

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
athur0s
Newbie
*
Offline Offline

Activity: 55
Merit: 0


View Profile
June 05, 2014, 09:50:13 PM
 #1857

anyone know what the default p2p port is for ben wallets?

Thanks

Hey crackfoo, I will post what I have, but a lot of this you already know.  Let's correct anything wrong here:

these are my config files:

To run bfgminer and connect to hasher.ca:

launchbens.cmd is a possible example filename, just copy and paste to a notepad file:

Code:
C:\bfgminer2014\bfgminer.exe -o stratum+tcp://stratum.hasher.ca:3394 -u 16sD5dAMrt6EE4zystJN4r5sZzmPR4srYi -p xxx -S antminer:all --set-device antminer:clock=x0781 --http-port 8330

So in this -u is my Benjamins inbound wallet ID, and I am choosing the standard Benjamins/BTC port 8330 for mining

And prior to that I edit benjamins.conf in C:\Users\user\Application Data\Benjamins such that it read like this:

Code:
rpcuser=x
rpcpassword=pass
rpcallowip=127.0.0.1
rpcport=3393
server=1
gen=0

addnode=198.147.23.176
addnode=162.243.225.132
addnode=79.30.41.82
addnode=79.35.184.193
addnode=178.210.43.53
addnode=37.4.59.204
addnode=188.162.40.145
addnode=67.233.202.8
addnode=66.186.168.160
addnode=70.169.118.178
addnode=216.145.101.106
addnode=123.211.105.43
addnode=50.42.35.91
addnode=46.118.221.232
addnode=124.169.133.2
addnode=86.5.174.41
addnode=151.50.110.59
addnode=184.75.214.210

As for the question about the Benjamins wallet, the selection "Allow port selection via UPnP" is available and seems to work fine.  But I am not sure off hand how to know which port it's running on.

But there is a lot of work to do so I appreciate all who are holding Benjamins long, and trying to mine.  Ask questions as this is the goal, to get new people up and running on SHA-256 gear like Ants and such, and mine with us.

Should we have a conference call or something?  I will just sit in the background and say little unless you ask me to.  We could use gotomeeting.

Hi

I can't sync my wallet. Are there any nodes which are working?

Thanks

Athuros
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
June 05, 2014, 11:55:43 PM
 #1858

Hi

I can't sync my wallet. Are there any nodes which are working?

Thanks

Athuros

It takes days to sync.  If you tried the nodes above, you should be fine, just let it sit, blocks are slow we need miners more than anything.

If you are getting any messages, that helps us troubleshoot, thanks!

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
athur0s
Newbie
*
Offline Offline

Activity: 55
Merit: 0


View Profile
June 06, 2014, 05:09:17 AM
 #1859

Hi

I can't sync my wallet. Are there any nodes which are working?

Thanks

Athuros

It takes days to sync.  If you tried the nodes above, you should be fine, just let it sit, blocks are slow we need miners more than anything.

If you are getting any messages, that helps us troubleshoot, thanks!

Thanks for your reply. The problem is i can't connect to any of this nodes. Both wallets (ubuntu server headless + windoiws gui) have this issue. So no blocks are incomming...

Kind regards

Athuros
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


American1973


View Profile
June 06, 2014, 03:28:52 PM
 #1860

Hi

I can't sync my wallet. Are there any nodes which are working?

Thanks

Athuros

It takes days to sync.  If you tried the nodes above, you should be fine, just let it sit, blocks are slow we need miners more than anything.

If you are getting any messages, that helps us troubleshoot, thanks!

Thanks for your reply. The problem is i can't connect to any of this nodes. Both wallets (ubuntu server headless + windoiws gui) have this issue. So no blocks are incomming...

Kind regards

Athuros

The only thing I didn't post is my Benjamins.bat file which goes in your Benjamins folder:

Code:
benjamins-qt -server -seednode=198.147.23.176

My wallet is connected and has 9 active other wallets it can see.

You will need to give us more info to determine what's different for you.  Probably it's IP related, are you running a firewall?

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
Pages: « 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 [93] 94 95 96 97 98 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!