Bitcoin Forum
November 19, 2024, 03:57:37 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 [525] 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 ... 1240 »
  Print  
Author Topic: CCminer(SP-MOD) Modded GPU kernels.  (Read 2347588 times)
joblo
Legendary
*
Offline Offline

Activity: 1470
Merit: 1114


View Profile
March 30, 2016, 06:58:48 PM
 #10481

@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.

That's unfortunate. Was it from a known dev like SP or some nobody? I'd like to be able to trust CMB, they have been a
good source for Windows binaries, particularly for different architectures. Binaries are always a risk so trusted sources
are critical and it appears CMB is not one of them.

The fact is many AVs flag uninfected miners as malware because some people use them to mine in
botnets. There's nothing better than a cloud of false positives to hide a real threat.

AKA JayDDee, cpuminer-opt developer. https://github.com/JayDDee/cpuminer-opt
https://bitcointalk.org/index.php?topic=5226770.msg53865575#msg53865575
BTC: 12tdvfF7KmAsihBXQXynT6E6th2c2pByTT,
Epsylon3
Legendary
*
Offline Offline

Activity: 1484
Merit: 1082


ccminer/cpuminer developer


View Profile WWW
March 30, 2016, 07:15:25 PM
 #10482

and the worst is when you get that after the compilation Wink auto deleted by your antivirus "adware"

BTC: 1FhDPLPpw18X4srecguG3MxJYe4a1JsZnd - My Projects: ccminer - cpuminer-multi - yiimp - Forum threads : ccminer - cpuminer-multi - yiimp
Grim
Sr. Member
****
Offline Offline

Activity: 506
Merit: 252


View Profile
March 30, 2016, 09:55:44 PM
 #10483

@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.

cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?!

There are a few people who got robbed that way (search reddit).

It actually seems teamviewer is the culprit here.

Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ...

Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid.
(the default 6 letter pw can be changed to a 10 letter pw including special characters)
bathrobehero
Legendary
*
Offline Offline

Activity: 2002
Merit: 1051


ICO? Not even once.


View Profile
March 30, 2016, 10:46:50 PM
 #10484

I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?!

There are a few people who got robbed that way (search reddit).

It actually seems teamviewer is the culprit here.

Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ...

Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid.
(the default 6 letter pw can be changed to a 10 letter pw including special characters)

I doubt it's Teamviewer because it increases the amount of time you have to wait to try again after unsuccessful tries but it's possible.

But, you can change the default password's length to 10 characters which includes symbols in Options\Security > password strength.

And you can also disable incoming connections from outside your local network. It also makes windows much more responsive and don't use your bandwidth and of course it's completely safe from the outside (Options\General - Incoming LAN connections > accept exclusively). In this case you can also use local IP addresses to connect for example in shortcuts like this which is pretty convenient:

"C:\Program Files (x86)\TeamViewer\TeamViewer.exe" -i  192.168.1.x --Password doesnt_matter_local_only_password

Not your keys, not your coins!
bensam1231
Legendary
*
Offline Offline

Activity: 1764
Merit: 1024


View Profile
March 31, 2016, 07:38:34 AM
 #10485

Sp_ I noticed that when I start mining decred sometimes some of the cards won't start hashing and their GPU usage stays 0. This seems more frequent with release 7 but it's also there with release 4.
The cards are not crashing or anything, the miner just doesn't start using them. If I restart the same .bat it sometimes work.

Lowering or increasing intensity or poolside difficulty had no effect. Different pools also had no effect. Issue is the same on 750 Ti and 970 on all of my rigs so it's likely the issue is not exclusive to me.


Here's a graph just to shows what I mean:


Explanation: the graph represents a bunch of 1 minute mining sessions with 10 second breaks between them on a loop. So the spikes are the 1 minute sessions and the small drops are the 10 second breaks (just for visibility purposes) and the big drops are when some of the cards are not hashing.

The .bat file had no extra parameters for ccminer.

Not the same thing, but I noticed one of my six GPUs has a oscilating pattern to it. Obviously reduces hashrate. I'll screenshot it next time. Not runnign celerons or dual core processors, so that's not it.

I buy private Nvidia miners. Send information and/or inquiries to my PM box.
Ayers
Legendary
*
Offline Offline

Activity: 2814
Merit: 1024


DGbet.fun - Crypto Sportsbook


View Profile
March 31, 2016, 08:12:04 AM
 #10486

@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.

cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?!

There are a few people who got robbed that way (search reddit).

It actually seems teamviewer is the culprit here.

Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ...

Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid.
(the default 6 letter pw can be changed to a 10 letter pw including special characters)

there are options on teamviewer to remove the possibility to access your computer, you simply choose to negate any connection to that computer from remote

Epsylon3
Legendary
*
Offline Offline

Activity: 1484
Merit: 1082


ccminer/cpuminer developer


View Profile WWW
March 31, 2016, 09:40:42 AM
 #10487

you are wrong, it was infected scam wallets like Intellect, and Oxen recently. And it was not teamviewer but MS Remote destkop.

The method by users with quoted links in the forum seems different.

BTC: 1FhDPLPpw18X4srecguG3MxJYe4a1JsZnd - My Projects: ccminer - cpuminer-multi - yiimp - Forum threads : ccminer - cpuminer-multi - yiimp
pallas
Legendary
*
Offline Offline

Activity: 2716
Merit: 1094


Black Belt Developer


View Profile
March 31, 2016, 09:42:53 AM
 #10488

people should just mine on linux and learn to "configuremake" ;-)

Epsylon3
Legendary
*
Offline Offline

Activity: 1484
Merit: 1082


ccminer/cpuminer developer


View Profile WWW
March 31, 2016, 09:57:55 AM
 #10489

soon : http://techcrunch.com/2016/03/30/be-very-afraid-hell-has-frozen-over-bash-is-coming-to-windows-10/

BTC: 1FhDPLPpw18X4srecguG3MxJYe4a1JsZnd - My Projects: ccminer - cpuminer-multi - yiimp - Forum threads : ccminer - cpuminer-multi - yiimp
Vaccomondus
Full Member
***
Offline Offline

Activity: 224
Merit: 100


View Profile
March 31, 2016, 11:00:38 AM
 #10490

Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

Any chance you mined Oxen?

Some people confused ccminer having malicious code instead of Oxen which was malicious.



cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later.

it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing
joblo
Legendary
*
Offline Offline

Activity: 1470
Merit: 1114


View Profile
March 31, 2016, 02:51:13 PM
 #10491

Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

Any chance you mined Oxen?

Some people confused ccminer having malicious code instead of Oxen which was malicious.



cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later.

it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing

That's the theory, but how many people actually inspect the code before they compile it? Most assume "someone" has
already inspected it. Heartbleed was open source and was built into many different OSs for 2 years beofore it was
discovered. MS and Red Hat and Ubuntu and... must have inspected openssl before using it in their product, didn't they?

AKA JayDDee, cpuminer-opt developer. https://github.com/JayDDee/cpuminer-opt
https://bitcointalk.org/index.php?topic=5226770.msg53865575#msg53865575
BTC: 12tdvfF7KmAsihBXQXynT6E6th2c2pByTT,
bathrobehero
Legendary
*
Offline Offline

Activity: 2002
Merit: 1051


ICO? Not even once.


View Profile
March 31, 2016, 02:57:30 PM
 #10492

Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

Any chance you mined Oxen?

Some people confused ccminer having malicious code instead of Oxen which was malicious.



cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later.

it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing

They obviously publish a clean surce with dirty binaries from a the private, malicious source. People would be fine compiling the clean source but they rarely do it themselves on windows.


That will be very interesting. It might even convince me to make the switch from 7 to 10.

Not your keys, not your coins!
induktor
Hero Member
*****
Offline Offline

Activity: 710
Merit: 502



View Profile
April 01, 2016, 01:37:38 AM
 #10493

Hi sp_

0.1 BTC for you
TxID: cf4e935a8aebce8bc1126740c07f5952014c994830f091c4f8d370ae6c78bcd1

if you have a (private) optimized linux version for quark/lyra2v2 i would like to have it Grin, otherwise, for the opensource 1.5.79 Smiley

I compile for lubuntu 14.04 x64.
excelent job btw with 1.5.78
thanks!
indkt.

BTC addr: 1vTGnFgaM2WJjswwmbj6N2AQBWcHfimSc
Velgelm
Sr. Member
****
Offline Offline

Activity: 299
Merit: 250



View Profile
April 01, 2016, 05:34:50 AM
 #10494

sp - in ccminer have a problem with neoscrypt solo mining. Can u fix this ? (i tested all your version and tpruvots version)

Ayers
Legendary
*
Offline Offline

Activity: 2814
Merit: 1024


DGbet.fun - Crypto Sportsbook


View Profile
April 01, 2016, 06:47:10 AM
 #10495


still the issue about the privacy that bother me so much, i'll stick with win7 for the time being, until a proper solution is found, and removing cortana is not enough

sp_ (OP)
Legendary
*
Offline Offline

Activity: 2954
Merit: 1087

Team Black developer


View Profile
April 01, 2016, 08:19:49 AM
 #10496

sp - in ccminer have a problem with neoscrypt solo mining. Can u fix this ? (i tested all your version and tpruvots version)

did you try to run with this parameter:

--broken-neo-wallet   Use 84byte data for broken neoscrypt wallets.\n\

Team Black Miner (ETHB3 ETH ETC VTC KAWPOW FIROPOW EVRPROGPOW MEOWPOW + dual mining + tripple mining.. https://github.com/sp-hash/TeamBlackMiner
sp_ (OP)
Legendary
*
Offline Offline

Activity: 2954
Merit: 1087

Team Black developer


View Profile
April 01, 2016, 08:21:54 AM
 #10497

Hi sp_
0.1 BTC for you
TxID: cf4e935a8aebce8bc1126740c07f5952014c994830f091c4f8d370ae6c78bcd1
if you have a (private) optimized linux version for quark/lyra2v2 i would like to have it Grin, otherwise, for the opensource 1.5.79 Smiley
I compile for lubuntu 14.04 x64.
excelent job btw with 1.5.78
thanks!
indkt.

Thanks Smiley the quark/lyra2v2 kernals are private for now. But the Decred #7 sourcecode is for sale for 0.4BTC. only 0.3BTC to go. Smiley

Team Black Miner (ETHB3 ETH ETC VTC KAWPOW FIROPOW EVRPROGPOW MEOWPOW + dual mining + tripple mining.. https://github.com/sp-hash/TeamBlackMiner
Velgelm
Sr. Member
****
Offline Offline

Activity: 299
Merit: 250



View Profile
April 01, 2016, 08:49:54 AM
 #10498

sp - in ccminer have a problem with neoscrypt solo mining. Can u fix this ? (i tested all your version and tpruvots version)

did you try to run with this parameter:

--broken-neo-wallet   Use 84byte data for broken neoscrypt wallets.\n\
I ii try :
[2016-04-01 11:49:01] Binding thread 0 to cpu 0 (mask 1)
[2016-04-01 11:49:01] JSON inval data
[2016-04-01 11:49:01] json_rpc_call failed, retry after 5 seconds
[2016-04-01 11:49:06] JSON inval data
[2016-04-01 11:49:06] json_rpc_call failed, retry after 5 seconds
[2016-04-01 11:49:11] JSON inval data
[2016-04-01 11:49:11] json_rpc_call failed, retry after 5 seconds

user password and rpcport existing in .conf and bat file

params :
78_7.5 -d 1 --cpu-priority 3 -a neoscrypt -i 14 -o 127.0.0.1:7878-u yyy -p x--broken-neo-wallet --no-gbt --no-stratum

sp_ (OP)
Legendary
*
Offline Offline

Activity: 2954
Merit: 1087

Team Black developer


View Profile
April 01, 2016, 08:53:12 AM
 #10499

I just did a comparison between my buyable private miner (0.1BTC) and the latest 1.7.5 release.
I have written 0-10% faster, but I should have written 17-74% faster

Sp-Mod #5 default intensities hashrates in MHASH/s. (980ti 1290 coreclock/1650 memclock)

nist5: 43.80 (+17%)
quark: 27.85 (+61,91%)
lyra2v2 16.10 (+16.6%)
x11:   12.85 (+18%)
x13:   10.27 (+19.97)
x15:    8.83 (+18.52 )
neoscrypt: 0.99 (+73.68%)

Current profit with my modded kernal on nicehash.com:(one single gtx 980ti, 24 hours mining)

neoscrypt:    0,00971250BTC ($4,0792500)
quark:   0,00907910BTC ($3,8132220)
x15:       0,00819512BTC ($3,4419504)
x13:       0,00796027BTC ($3,3433134)
x11:       0,00718058BTC ($3,0158436)
lyra2v2:   0,00663964BTC ($2,7886488)
nist5:     0,00161184BTC ($0,6769728)
does this mean you will cut out most of the other algos that are already contained in ccminer-tpruvot175 and only provide the above kernels? ...

No the new fork will contain all the kernals in 1.7.5, but with optimized code.

Team Black Miner (ETHB3 ETH ETC VTC KAWPOW FIROPOW EVRPROGPOW MEOWPOW + dual mining + tripple mining.. https://github.com/sp-hash/TeamBlackMiner
Velgelm
Sr. Member
****
Offline Offline

Activity: 299
Merit: 250



View Profile
April 01, 2016, 09:28:31 AM
 #10500

I ii try :
[2016-04-01 11:49:01] Binding thread 0 to cpu 0 (mask 1)
[2016-04-01 11:49:01] JSON inval data
[2016-04-01 11:49:01] json_rpc_call failed, retry after 5 seconds
[2016-04-01 11:49:06] JSON inval data
[2016-04-01 11:49:06] json_rpc_call failed, retry after 5 seconds
[2016-04-01 11:49:11] JSON inval data
[2016-04-01 11:49:11] json_rpc_call failed, retry after 5 seconds

user password and rpcport existing in .conf and bat file

params :
78_7.5 -d 1 --cpu-priority 3 -a neoscrypt -i 14 -o 127.0.0.1:7878-u yyy -p x--broken-neo-wallet --no-gbt

For example cgminer work fine

Pages: « 1 ... 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 [525] 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 ... 1240 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!