NVIDIA GPUs to Accelerate Microsoft Azure - Bitcoin

Electroneum Mining Earn up to $50 a day on your mobile

While Bitcoin and Ethereum mining is not expensive and not very profitable for regular users, there are a wide variety of cryptocurrencies that offer an alternative. There is nothing simpler than Electroneum mining and it guarantees money.
What is Electroneum?
Electroneum (ETN) is an anonymous cryptocurrency that runs on the blockchain and is based on the Bytecoin cryptocurrency blockchain. Electroneum cryptocurrency was launched in 2017 by a team of developers at the head of Richard Ells: he wanted to create a cryptocurrency for the smartphone market and games and apps running on these devices. In 2017, the team organized an ICO (they collected $ 40 million earlier than planned) and launched iOS and Android apps for ETN mining.
An important feature of Electroneum is its availability and simplicity of counting. Most Bitcoin owners don’t really like that an asset consists of 100,000,000 satoshi — it complicates the calculations. Electroneum uses only two digits after the separator: Instead of “0.089151 BTC” you will see only 21.45 ETN.
Electroneum has what it takes to be a viable alternative to Bitcoin. Some of the features worth mentioning are:
.The transaction speed and security of the coins are as good as Bitcoin (and some even claim that Electroneum is safer). .It can be stored both in the cloud and in offline wallets. .The development team is impressive. The company consists of professional engineers, entrepreneurs and marketers. .It can be easily removed on a smartphone or other device.
In short, although Electroneum is based on its own chain, it has a lot in common with Bitcoin.
Is Electroneum Mining Profitable?
Electroneum cryptocurrency mining is very simple and affordable: those who don’t even have powerful computers can handle it. You can even use Electroneum on the background of the computer. But there is another distinctive point like below. Since Electroneum was created for use by smartphones, you can mining using your mobile phone.This is the most preferred and easiest
How to make Electroneum mining?
Many crypto owners believe that it is better to mine alone without a pool, but beginners are strongly recommended to start cryptocurrency mining with other participants. Pools allow you to receive payments every day, and Electroneum is supported by many platforms that differ in their commissions and reliability.
Electroneum Mining on Mobile Devices (Android and iOS)
You can earn Electroneum using your mobile phone. Follow these steps to install the app and register as a user:
(https://miro.medium.com/max/2871/1*iW72ofy33FzsOefJuJzcEg.jpeg)
“Download” Barcode reader from this link.
After installing the Barcode reader application on your phone, scan the barcode on the left side
Enter the Code when register the application: D65C7C
Check your email address to find an activation link
Enter your mobile phone. Enter the received SMS code in the field on the registration page.
If you lose your account PIN, enter an alternate email address where you can send recovery information.
Enter your PIN. You will need this every time you start the application or send a transaction.
Return to your inbox and click the link in the letter sent to you. This confirms that you have received a PIN recovery email. You can now enter the application.
This much. All you have to do is click the “Start mining” button.
You started making money
while mining phone
Electroneum Mining on Windows and Mac
Use xmr-stak-cpu software for Electroneum mining on CPU: Claymore provides a higher hash than CPU. The CPU version of this software is available from GitHub.
Download and then open the “config” file via any text editor. You should find the following lines in the text editor:
“Pool_address”: “pool.usxmrpool.com//333” “Wallet_address”: “ “Pool_password”: “
They need to be replaced:
“Pool_address”: “layer + ssl: / /etn-eu1.nanopool.org:13433” “wallet_address”: “Your ETN wallet address” “Pool_password”: “x”
Then look for the line:
“Cpu_threads_conf”: null,
And replace it with the following lines:
“Cpu_threads_conf”: [ {“Low_power_mode”: false, “no_prefetch”: true, “affine_to_cpu”: 0} {“Low_power_mode”: false, “no_prefetch”: true, “affine_to_cpu”: 1} {“low_power_mode”: false, “No_prefetch: true,” affine_to_cpu “: 2} {“ low_power_mode “: false,” no_prefetch “: true, “Affine_to_cpu”: 3} {“low_power_mode”: false, “no_prefetch”: true, “affine_to_cpu”: 3} {“low_power_mode”: false, “no_prefetch”: true, “affine_to_cpu”: 4} {“Low_power_mode”: false , “No_prefetch”: true, “affine_to_cpu”: 5},],
Each line connects the processor core separately. For example, if you have a 6-core processor, you can connect five cores and leave one for work. It is important that the first line starts from zero. Register and run the software.
Alternatively, you can try Electroneum mining GPU — there are both AMD and Nvidia options, but it means buying expensive graphics cards. The reward for a mined block is 7,000 ETN, which is quite generous. But is GPU mining worth the investment? You can check the profitability of electroneum mining here
summary
Electroneum mining is a simple and energy efficient way to earn ETN tokens. If you’re new to crypto mining, consider starting your experience with this coin — having some ETN coins in your crypto portfolio will never hurt.
Since it is a mobile-centric cryptocurrency, you can install Electroneum application on your smartphone and continue mining with a single click every day. This is a small source of passive income. Also, don’t forget to join an Electroneum mining rig.
submitted by tolga1500 to u/tolga1500 [link] [comments]

How do I mine Dogecoin?

How do I mine Dogecoin?
Let’s take a lucky guess that you’re here today because you’ve heard a lot about cryptocurrencies and you want to get involved, right? If you’re a community person, Dogecoin mining might be the perfect start for you!
Bitcoin was the first in 2009, and now there are hundreds of cryptocurrencies. These new coins (that operate on their own native blockchain) are called altcoins or alternative coins. One popular altcoin is Dogecoin. It can be bought, sold and traded, just like Bitcoin. It can also be mined!
So, what is Dogecoin mining?
You’ll know what hardware and what software you need to get started. You’ll also know whether or not Dogecoin mining is for you!
So, where would you like to start? The beginning? Great choice. Let’s have a quick look at how Dogecoin got started.
A (Very) Short History of Dogecoin
In 2013, an Australian named Jackson Palmer and an American named Billy Markus became friends. They became friends because they both liked cryptocurrencies. However, they also thought the whole thing was getting too serious so they decided to create their own.
Palmer and Markus wanted their coin to be more fun and more friendly than other crypto coins. They wanted people who wouldn’t normally care about crypto to get involved.
They decided to use a popular meme as their mascot — a Shiba Inu dog.

https://preview.redd.it/rymnyyz1iil31.png?width=303&format=png&auto=webp&s=f138e3fe56eef9c6b0e7f49b84fefc41fb83e5aa
Dogecoin was launched on December 6th, 2013. Since then it has become popular because it’s playful and good-natured. Just like its mascot!
Dogecoin has become well-known for its use in charitable acts and online tipping. In 2014, $50,000 worth of Dogecoin was donated to the Jamaican Bobsled Team so they could go to the Olympics. Dogecoin has also been used to build wells in Kenya. Isn’t that awesome!
Users of social platforms – like Reddit – can use Dogecoin to tip or reward each other for posting good content.
Dogecoin has the 27th largest market cap of any cryptocurrency.
Note: A market cap (or market capitalization) is the total value of all coins on the market.
So, Dogecoin is a popular altcoin, known for being fun, friendly and kind. It’s a coin with a dog on it! You love it already, don’t you?
Next, I want to talk about how mining works…
What is Mining?
To understand mining, you first need to understand how cryptocurrencies work. Cryptocurrencies are peer-to-peer digital currencies. This means that they allow money to be transferred from one person to another without using a bank.
Every cryptocurrency transaction is recorded on a huge digital database called a blockchain. The database is stored across thousands of computers called nodes. Nodes put together groups of new transactions and add them to the blockchain. These groups are called blocks.
Each block of transactions has to be checked by all the nodes on the network before being added to the blockchain. If nodes didn’t check transactions, people could pretend that they have more money than they really do (I know I would!).
Confirming transactions (mining) requires a lot of computer power and electricity so it’s quite expensive.
Blockchains don’t have paid employees like banks, so they offer a reward to users who confirm transactions. The reward for confirming new transactions is new cryptocurrency. The process of being rewarded with new currency for confirming transactions is what we call “mining”!

https://preview.redd.it/rcut2jx3iil31.png?width=598&format=png&auto=webp&s=8d78d41c764f4fe4e6386da4f40a66556a873b87
It is called mining because it’s a bit like digging for gold or diamonds. Instead of digging with a shovel for gold, you’re digging with your computer for crypto coins!
Each cryptocurrency has its own blockchain. Different ways of mining new currency are used by different coins where different rewards are offered.
So, how do you mine Dogecoin? What’s special about Dogecoin mining? Let’s see…
What is Dogecoin Mining?
Dogecoin mining is the process of being rewarded with new Dogecoin for checking transactions on the Dogecoin blockchain. Simple, right? Well no, it’s not quite that simple, nothing ever is!
Mining Dogecoin is like a lottery. To play the lottery you have to do some work. Well, actually your computer (or node) has to do some work! This work involves the confirming and checking of transactions which I talked about in the last section.
Lots of computers work on the same block of transactions at the same time but the only one can win the reward of new coins. The one that earns the new coins is the node that adds the new block of transactions to the old block of transactions. This is completed using complex mathematical equations.
The node that solves the mathematical problem first wins! It can then attach the newly confirmed block of transactions to the rest of the blockchain.
Most cryptocurrency mining happens this way. However, Dogecoin mining differs from other coins in several important areas. These areas are;
  • Algorithm: Each cryptocurrency has a set of rules for mining new currency. These rules are called a mining or hashing algorithm.
  • Block Time: This is the average length of time it takes for a new block of transactions to be checked and added to the blockchain.
  • Difficulty: This is a number that represents how hard it is to mine each new block of currency. You can use the difficulty number to work out how likely you are to win the mining lottery. Mining difficulty can go up or down depending on how many miners there are. The difficulty is also adjusted by the coin’s protocol to make sure that the block time stays the same.
  • Reward: This is the amount of new currency that is awarded to the miner of each new block.
Now, let’s compare how DogeCoin mining works compared to Litecoin and Bitcoin…
Mining Comparison
Bitcoin uses SHA-256 to guide the mining of new currency and the other two use Scrypt. This is an important difference because Scrypt mining needs a lot less power and is a lot quicker than SHA-256. This makes mining easier for miners with less powerful computers. Fans of Litecoin and Dogecoin think that they are fairer than Bitcoin because more people can mine them.
Note: In 2014, Litecoin and Dogecoin merged mining. This means they made it possible to mine both coins in the same process. Dogecoin mining is now linked with Litecoin mining. It’s like two different football teams playing home games in the same stadium!
Mining Dogecoin is a lot faster than mining Litecoin or Bitcoin. The block reward is much higher too!
Don’t get too excited though (sorry!). Dogecoin is still worth a lot less than Bitcoin and Litecoin. A reward of ten thousand Dogecoin is worth less than thirty US Dollars. A reward of 12.5 Bitcoin is currently worth 86,391.63 US Dollars!
However, it’s not as bad as it sounds. Dogecoin mining difficulty is more than one million times less than Bitcoin mining difficulty. This means you are much more likely to win the block reward when you mine Dogecoin.
Now I’ve told you about what Dogecoin mining is and how it works, would you like to give it a try?
Let’s see what you need to do to become a Dogecoin miner…
How to Mine Dogecoin
There are two ways to mine Dogecoin, solo (by yourself) or in a Dogecoin mining pool.
Note: A Dogecoin pool is a group of users who share their computing power to increase the odds of winning the race to confirm transactions. When one of the nodes in a pool confirms a transaction, it divides the reward between the users of the pool equally.
Dogecoin Mining: Solo vs Pool
When you mine as a part of a Dogecoin pool, you have to pay fees. Also, when the pool mines a block you will only receive a small portion of the total reward. However, pools mine blocks much more often than solo miners. So, your chance of earning a reward (even though it is shared) is increased. This can provide you with a steady new supply of Dogecoin.
If you choose to mine solo then you risk waiting a long time to confirm a transaction because there is a lot of competition. It could be weeks or even months before you mine your first block! However, when you do win, the whole reward will be yours. You won’t have to share it or pay any fees.
As a beginner, I would recommend joining a Dogecoin pool. This way you won’t have to wait as long to mine your first block of new currency. You’ll also feel like you’re part of the community and that’s what Dogecoin is all about!
What You Need To Start Mining Dogecoin
Before you start Dogecoin mining, you’ll need a few basics. They are;
  • A PC with either Windows, OS X or Linux operating system.
  • An internet connection
  • A Shiba Inu puppy (just kidding!)
You’ll also need somewhere to keep the Dogecoin you mine. Go to Dogecoin’s homepage and download a wallet.
Note: A wallet is like an email account. It has a public address for sending/receiving Dogecoin and a private key to access them. Your private keys are like your email’s password. Private keys are very important and need to be kept completely secure.
There are two different types; a light wallet and a full wallet. To mine Dogecoin, you’ll need the full wallet. It’s called Dogecoin Core.
Now that you’ve got a wallet, you need some software and hardware.
Dogecoin Mining Hardware
You can mine Dogecoin with;
  • Your PC’s CPU: The CPU in your PC is probably powerful enough to mine Dogecoin. However, it is not recommended. Mining can cause less powerful computers to overheat which causes damage.
  • A GPU: GPUs (or graphics cards) are used to improve computer graphics but they can also be used to mine Dogecoin. There are plenty of GPUs to choose from but here are a few to get you started;SAPPHIRE Pulse Radeon RX 580 ($426.98)Nvidia GeForce GTX ($579.99)ASUS RX Vega 64 ($944.90)
  • A Scrypt ASIC Miner: This is a piece of hardware designed to do one job only. Scrypt ASIC miners are programmed to mine scrypt based currencies like Litecoin and Dogecoin. ASIC miners are very powerful. They are also very expensive, very loud and can get very hot! Here’s a few for you to check out;Innosilicon A2 Terminator ($760)Bitmain Antminer L3 ($1,649)BW L21 Scrypt Miner ($7,700)
Dogecoin Mining Software
Whether you’re mining with an ASIC, a GPU or a CPU, you’ll need some software to go with it. You should try to use the software that works best with the hardware you’re using. Here’s a short list of the best free software for each choice of mining hardware;
  • CPU: If you just want to give mining a quick try, using your computer’s CPU will work fine. The only software I would recommend for mining using a CPU only is CPU miner which you can download for free here.
  • GPU: If you mine with a GPU there are more software options. Here are a few to check out;CudaMiner– Works best with Nvidia products.CGminer– Works with most GPU hardware.EasyMiner– User-friendly, so it’s good for beginners.
  • Scrypt ASIC miner:MultiMiner– Great for mining scrypt based currencies like Litecoin and Dogecoin. It can also be used to mine SHA-256 currencies like Bitcoin.CGminer and EasyMiner can also be used with ASIC miners.
Recommendations
You’re a beginner, so keep it simple! When you first start mining Dogecoin I would recommend using a GPU like the Radeon RX 580 with EasyMiner software. Then I would recommend joining a Dogecoin mining pool. The best pools to join are multi-currency pools like Multipool or AikaPool.
If you want to mine Dogecoin but don’t want to invest in all the tech, there is one other option…
Dogecoin Cloud Mining
Cloud mining is mining without mining! Put simply, you rent computer power from a huge data center for a monthly or yearly fee. The Dogecoin is mined at the center and then your share is sent to you.
All you need to cloud mine Dogecoin is a Dogecoin wallet. Then choose a cloud mining pool to join. Eobot, Nice Hash and Genesis Mining all offer Scrypt-based cloud mining for a monthly fee.
There are pros and cons to Dogecoin cloud mining;
The Pros
  • It’s cheaper than setting up your own mining operation. There’s also no hot, noisy hardware lying around the house!
  • As a beginner, there isn’t a lot of technical stuff to think about.
  • You get a steady supply of new currency every month.
The Cons
  • Cloud mining pools don’t share much information about themselves and how they work. It can be hard to work out if a cloud mining contract is a good value for money.
  • You are only renting computer power. If the price of Dogecoin goes down, you will still have to pay the same amount for something that is worthless.
  • Dogecoin pools have fixed contracts. The world of crypto can change very quickly. You could be stuck with an unprofitable contract for two years!
  • It’s no fun letting someone else do the mining for you!
Now you know about all the different ways to mine Dogecoin we can ask the big question, can you make tons of money mining Dogecoin?
So, Is Dogecoin Mining Profitable?
The short answer is, not really. Dogecoin mining is not going to make you a crypto billionaire overnight. One Dogecoin is worth 0.002777 US Dollars. If you choose to mine Dogecoin solo, it will be difficult to make a profit. You will probably spend more money on electricity and hardware than you will make from Dogecoin mining. Even if you choose a Dogecoin pool or a cloud pool your profits will be small.
However, if you think I am telling you to not mine Dogecoin, then you’re WRONG! Of course, I think you should mine Dogecoin!
But why? Seriously…
Well, you should mine Dogecoin because it’s fun and you want to be a part of the Dogecoin family. Cryptocurrency is going to change the world and you want to be part of that change, right? Mining Dogecoin is a great way to get involved.
Dogecoin is the coin that puts a smile on people’s faces. By mining Dogecoin you’ll be supporting all the good work its community does. You’ll learn about mining from the friendliest gang in crypto. And who knows? In a few years, the Dogecoin you mine now could be worth thousands or even millions! In 2010, Bitcoin was worthless. Think about that!
Only you can choose whether to mine Dogecoin or not. You now know everything you need to know to make your choice. The future is here. So, what are you going to do?
submitted by alifkhalil469 to BtcNewz [link] [comments]

So I finally gave Honeyminer a try. (my personal semi-review)

This review was last updated 11-30-18
When I first was interested in trying this program I couldn't find anything about it. it seems a lot of people were too scared to try it since their is like no information about it other then from the web page itself. to be honest I was a bit scared to try it. I've tried many other software of this kind, on a "test" machine I'm not afraid to lose on a secondary network and router... incase its a scam or gonna give me a virus and I suggest anyone installing mining software do the same as a rule of thumb. please keep in mind the software is still relatively new and they are working to improve it still. They seem to be hiring as well if your interested in helping them grow by working for them look near the bottom for their contact e-mail. ____________________________________________________________________________________________________
This review is for the windows version of Honyminer Because its still relatively new I knew could go one of two ways "sacm software" like most every mobile mining app or even quite a few desktop ones - Or legit. I'm glad to say after using it for a month it seems legit. I was able to withdraw from it no problem. If your system is really crappy It might not work that well on your computer or mining rig. There are no ads and the program doesn't seem to disrupt any day to day activity at least not on my main system, however you can of course expect increased heat production of your system as with any mining software, adequate cooling is important in mining. Anyways Honyminer is as close to an easy one click mining software as I have come. they seem to be making a "pro" version too for more hardcore miners. They do take a fee which is to be expected *look near the bottom for fee information\* but that fee goes down significantly if you have multiple GPU's mining.. The good thing about it for me was it let me kind of set my rig to "autopilot" so to speak. If you wish to see the H/s numbers in real time, go to you settings and view the "expert logs" which will also tell what coin is being mined at the time ____________________________________________________________________________________________________________
Pros
Pro and or con (depending on how you look at it)
Cons:
_________________________________________________________________________________________________
COMPATIBILITY: (sorry it keeps adding asterisks to the card model for no reason)
WORKED ON: every nvidia card tested so far with card models dating back from 20014 to now..
Worked on some surprising low end and or old CPU and GPUs. like the
AMD Radeon R9 380 card in addition to a AMD Athlon II X3 450 Processor and it mines just fine.. of course that processor doesn't make much on its own lol.. but thats an extra 2 or 3 cents per day by itself. I've also tested it with an i3, i2 Most AMD cards worked but I ran into issues with a few so maybe it's easier for me to just tell you what did not work.
DID NOT WORK ON:
--- any of the AMD ATI Radeon HD 4250's tested so far (2) that particular card It didn't work at all for mining like never enabled the gpu but the cpu on that machine did work however it would generate an "error" on start up but otherwise did not disrupt the mining on that system except if I turned on idle earning mode, I would get a bunch of errors as it was trying to access the GPU. we need the functionality to enable or disable hardware individually I think. (errors or no errors it just seems like a good thing to have.)
OR a system that had both a AMD Radeon R7 Graphics and a AMD A8-7650K Radeon R7, (4C+6G) which surprised me considering some of the things that did work lol... but I think it might just might be that one system, but either way can't vouch that it will work. That system was pre-built and wont allow the parts to be changed or easily removed to be worth the effort since I have to use it for other things so unfortunately I can't test these on another mainboard at least not with wasting some time, money and patients that Id rather dedicate elsewhere for now.
I had some issues using one RX Vega 56 card but i think it's was just that card because another one did work just fine.________________________________________________________________________
FEES W/ comparison to nicehash
I'm not sure if this post will be helpful to anyone looking into this software or anyone whos looking to try a different mining software but if it dose great.
-- nicehash charges the following fees as far as "selling/mining" or withdrawing.
Payouts for balances less than 0.1 to external wallet 5%
Payouts for balances greater than or equal to 0.1 BTC to external wallet 3%
Payouts for balances greater than or equal to 0.001 BTC to NiceHash wallet 2%
Withdrawal fees from NiceHash wallet
Withdrawals from NiceHash wallet are subjected to the withdrawal fee, which depends on the withdrawn amount and withdrawal option.
WITHDRAWAL OPTION AMOUNT TO WITHDRAW FEE Any BTC wallet From 0.002 (min) to 0.05 BTC 0.0001 BTC
Any BTC wallet More than 0.05 BTC 0.2% of withdrawn amount
Coinbase More than 0.001 BTC FREE - No fee. but they also say Minimum Coinbase withdrawal limit is adjusted dynamically according to the API overload._____________________________________________________________________________
honyminer fees are based on number of GPU's working.
8% for 1 GPU or for 2 GPUs or more the fee is 2.5%.
The only withdrawal fee is the standard BTC transaction fee that bitcoin charges and it doesn't go to honyminer. When they add the other withdrawal functions that fee cam be avoided I suppose.
_________________________
Earnings: in comparison to nicehash
Update: sometimes software / test networks will give a view that can be off + or - a few percent compared to actual. A lot of different things can affect your earnings including where you are located in the world, I'm not sure how many of you uses more than one mining software day to day , ISP issues, crypto price fluctuation, updates to fee's, and inaccuracies in test software/networks can affect results. but I go back and forth between different ones from time to time and I think that's good practice to keep options open. I notice that honey miner seems to do better for me at night-time and early morning/afternoon is when it has the most trouble raking in the crypto's
That said I've been trying to test to see how this compares to nice hash earnings, with two of my buddies. So this is an average between the 3 of our profits vs loss compared to nice hash, I'm using a two 10 GPU/ 3 cpu setups, while one of my buddies is using two 1 gpu, 2 cpu setups and the other is using two 30 gpu mini farm's. We each have 2 networks each located relatively close by *less than .5 mile the furthest one* one with honyminer running and the other with nice hash and we are looking over 24 hour periods When all three of us have the results for one day, we average our results together. In all we will be looking over a 14 day period. UPDATE: the results below were done well long before the latest update to the software so I do not know if they have changed, Id have to do another round or perhaps some from the community could give me their results and save me a bit of work. I'm not sure when Id have the time to dig into it again. Sorry that it took me so long before I could get on here to post the results of the last few days of the tests.
Seem to be a bit smaller then nicehash at times and higher at other times. it seems to for me at least payquicker and it gets deposited in my nicehash account sooner than I expected.
hopefully when they let up pick which coin to mine on our own it may help somewhat, and any of you who want to move smaller volume will probably benefit when they add the functionality to withdraw other coin/usd.
anyways when their autopilot system works it works great but when it doesn't it's just "okay" for lack of a better word...
_____________________________________________________
Contact: they have a contact us part on their webpage and they also have a reddit page which I was made aware of from contacting them https://www.reddit.com/HoneyMine
Careers: If anyone is interested in working for them the job listings at the time of this typing were for Senior Java Developer(s) and Customer Service Representative(s) the email listed is [[email protected]](mailto:[email protected]). id suggest you check their site for the requirements I just added this part to the review as a courtesy if anyone's interested its not meant to be a focus of it. But I know we have some really talented people on reddit who care about the crypto world passionately so id rather give honyminer a chance to have some of those sort on their team since it might help improve the software faster for the end users.. if that makes sense.
_________________________________________________________
UPDATE: If a question reminds me I left out something I think should have mentioned Ill try to add it here so ppl don't have to scroll all over the place.. I don't write many reviews (for anything) so I don't know if this one was any good or not but I hope it was okay.. and I'm still a new reddit user relatively. I just wanted to make this review mainly because there is next to no information on honyminer when I looked for it and maybe it can help anyone whos interested in it.
browolf2 asked Is it basically like nicehash then? :
A: In a way, its like nice hash that its cloud based, but you get paid not just when your pool completes an order. there are no "buyers" only "sellers" if you look at it that way...I hope I'm wording this the right way.. It's just straight up mining and they take their fee but compared to nicehash the fees for "mining" are different
karl0525 asked: do you know if we can contact the honeyminer dev team and see if they will communicate here on Reddit. Might give them some good ideas what us miners are looking for? Worth a try maybe? Thanks:
A: I submitted a question to their "contact us" part of their webpage and I got a reply from them, this is the message I received below:
Thank you for writing in and for your interest in Honeyminer. We always welcome feedback and suggestions from our users. We are currently planning on expanding our online and social media presence.
Please check our our Reddit page: https://www.reddit.com/HoneyMine
submitted by Joe_Cow to gpumining [link] [comments]

Im at the end of my wits. This is too random for me to diagnose.. please help.

Ok... where to start...
Things my computer is/isnt :
The problem :
What the crash looks like :
Game freezes in the last frame, then screen turns black. You can still hear the sound, as if the game was still going. THIS IS TRUE IN ALL THOSE GAMES, and what makes me think its related. Sometimes theres an error, and when you click OK, you are back on desktop, sometimes there isnt and you need to kill the process with Task Manager to unfreeze the PC. Nvidia driver will say it crashed and has restarted, from the task bar. And sometimes, if you restart the game after a crash like that, and then get another crash, this time the game will freeze, turn to black, beep twice, and restart the whole PC. At the moment of crash all temperatures are normal, memory usage is insignificant,
When it crashes :
What does Windows say it is :
In the EVENT VIEWER, i get the following : The description for Event ID 13 from source nvlddmkm cannot be found. and also \Device\UVMLiteProcess1 NVRM: Graphics TEX Exception on (GPC 1, TPC 1): TEX NACK / Page Fault
What i did so far to try and fix it
First off, ive been sifting through all sorts of forums for the past 3 days, googling every single erro crash scenario. This is what ive tried so far :
So Yeah...
I have tested more games. Games like Spec Ops, Hard Reset, Firewatch, Condemned, i ran them all on 4k DSR with maxed AA and AF, AO, and everything else i could throw at them, and have not crashed....though.. i only played them for a little while, not for hours like those other games. So its odd as fuck, cause some games seem to crash more often when the stress is higher, but when other games are stressed, they dont crash at all. Sure, a hardware fault has crossed my mind, but i definitely cant afford to replace anything at this point in time, and if it is a hardware fault, its a damn odd one. I never had crashes this bad before, and when i did, i resolved them quickly with Google. The only crash i had before, was Rust, but i thought that was normal, since Rust usually crashes for a lot of people. Then i bought Prey and Dishonored, and realized that maybe this is a problem i always had, but never came forward cause i wasnt playing any really demanding games at the time, aside from Rust. So now i dont know what to think, when thinking what started all this.
Desperate theory?
Could a specific component of the GPU, like a SLI controller, or a shader thingy, or a random thingy be responsible ? Cause it seems like its only crashing in super new games. Could a new feature be triggering some broken component on the GPU, or some odd extension only used in new games ? Im at the end of me here, i dont know what else to try. Reinstalling windows for 3-4 crashing games seems like overkill, especially since it would inconvenience me greatly due to the work stuff i have on it. Thanks for your help.
submitted by MadMaxGamer to buildapc [link] [comments]

The second time to start again, my blockchain startup road

My PPLive/PPTV startup experience
I am a person who is very eager to pursue technology and geek spirit. I always want to do things that change the world.
In 2004, when I was still in college, suddenly one day, Bill approached me and said that there was no way to watch NBA basketball games smoothly via the Internet on campus . Can we do a real-time live video software using P2P transmission technology together? This idea was similar to the popular BitTorrent download software at that time. When I looked at this idea, I could not only solve my own needs for watching NBA, but also the most important thing is that I could not resist the temptation of technical challenges, so I quickly agreed to Bill. In this way, we started our business together and the software soon became very popular in China. PPLive was later rebranded as PPTV. Bill became the Founder and CEO of PPTV and I became the Chief Architect of PPTV and began to focus on P2P transmission technology.
The first thing PPLive achieved was real-time streaming via peer to peer transmission technology. What is real-time streaming P2P transmission technology? It is simultaneous data upload and download at the same time, which makes live streaming possible. Simply put, I am for everyone, everyone is for me.
In the beginning, I led the team to build an live broadcast platform with P2P. Because the characteristics of live broadcast are that many people will share the same data, this way we can achieve a bandwidth saving ratio of more than 99.9% when we watch the most popular content at the same time. With only 10Mb of release bandwidth, it can support up to 10 million users to watch TV at the same time.In this case, we can achieve excellent QoS(Quality of Service): the average time to start playing is 1.2 seconds; the average count of interruption is 1.6 seconds per half an hour; the whole network latest delays from broadcast source is up to 90 seconds.
After the P2P live broadcast is completed and became sophisticated, we began to develop P2P VOD(video on demand) because the demand for VOD was getting bigger and bigger. P2P VOD on-demand and P2P live broadcast are different from each other. VOD is the need to use hard disk storage and memory cache, which is more difficult than the live broadcast. Besides, it is the difference between popular content and unpopular content in the VOD system, and the P2P effect of unpopular content is not as good as the popular content. However, our P2P VOD has achieved excellent QoS(Quality of Service) too: 90% bandwidth saving ratio; the average time to start playing is 1.5 seconds; the average count of interruption is 2.2 seconds per half an hour; the average time to play when seek position is 0.9 second.
Subsequently, I led the team to port the P2P kernel to the embedded system. We streamlined the P2P transmission protocol and made a number of optimizations in terms of performance. The hard disk in embedded device read and write is not used for regular mechanical hard disk, so we have done a good amount of protection measures, which enable the P2P core to run on embedded devices. Then we quickly launched an iOS client that supports P2P, an Android mobile phone client that supports P2P, and finally an Android set-top box client that supports P2P.
Soon after, amid the growing popularity of smartphones, video creation became easier than ever Smartphone users become more enthusiastic about producing their own content, which helped video content increased dramatically. I led the team to start the cloud broadcast service, giving each user a certain amount of free storage space. On this platform users can freely upload,download, and share video content, In fact, it is very similar to network hard drives such as Google Drive. The difficulty of network hard drive with share is similar to that of VOD, but the count of videos is far more than that of VOD. The content head effect is more obvious and a large amount of content is stored in the tail. We have put a great amount of work onto the optimization of this particular area.
In 2013, PPTV was sold it to a listed Chinese company, Suning Yunshang, for US$420 million. A year later, I waved goodbye to video and P2P technology, which I had been doing for over ten years. To pursue a bigger dream, I started a new path to another startup.
My startup experience in the JDO (https://www.jidouauto.com/en)
After the success of PPTV startup, I have been pursuing new technology and geek spirit, so I did not choose video and P2P fields again, instead, I devoted myself to intelligent hardware and artificial intelligence. In 2014, I founded JDO with Cloud Wong, a company which produces cars that implement AI technology and connected to the Internet. In the past four years, I have served as CTO in JDO, and have accumulated in-depth technical experience in intelligent hardware, embedded software, artificial intelligence, and machine learning.
The automotive industry is a very closed industry. We need a long business negotiation cycle for everything we do and the product development cycle is limited by the iteration cycle of cars. In this environment of only catering to businesses, I could not entirely follow my ideas to be innovative. JDO was doing very well in the automotive field, where they have received orders from many internationally renowned car manufacturers. However, in order to pursue a bigger dream and to change the world, I decided to leave JDO.
The thought of sharing storage
Because I am doing artificial intelligence every day, I have to do a lot of neural network training and I have established cooperation and communication with many other AI companies. To do neural network training, it requires high-end NVIDIA GPU graphics cards, such graphics cards are costly, and most of the time they are idle. I was ponder: Is there a chance to build a shared GPU graphics platform, which encourages everyone to rent out unused GPU resources? Meaning when I need it, I have to pay to use other people’s unused GPU resources to calculate; when others need it, they have to pay to use my remaining GPU resources to calculate; so for startups, you don’t need to buy so many GPUs at once. The cost will be reduced and companies that use less can make money.
I took the idea of sharing a GPU graphics platform, did a simple MVP(Minimum Viable Product) to verify my thoughts and let several cooperative AI companies to use this MVP. However, I found that they have not been used. After I learned about the situation, I realized that although AI companies like lower price with sharing GPU graphics platform, they are more concerned about the security of data than price. AI company’s data collection often requires high cost to collect enough data. If they put these data on shared computers, they are afraid of being stolen data by competitors. More importantly, the neural network does not have an excellent way to split into multiple computer calculations, encrypt the data in time, and the data must be decrypted before entering the neural network, which is easy to be stolen. Technically, there is currently the no good way to decentralize the neural network model and there is no good way to send cryptographic data directly into the neural network calculation. Due to this obstacle plus other reasons, I finally gave up on this idea.
At this time, P2P storage suddenly came to my mind. I used to work on P2P video for 10 years. If you do not share the GPU, but only the hard disk and bandwidth, could this be feasible? After careful consideration, as we are entering the Internet of Things era, a large number of households have idle computers which not fully used, a large number of households purchase bandwidth on a monthly basis but not fully used, and a large number of IoT devices have storage capabilities. If these vast amounts of idle resources can be fully utilized, this will be an excellent cause for human society.
More importantly, what was done in PPTV before was that users share content voluntarily without any incentives. What is needed now is to encourage users to share by giving them incentives. That is, some users use the service to pay for the fee, and some users provide services to earn income, thus establishing a sharing storage network, just like Uber and Airbnb, passengers and rentees use the service to pay the fee, the driver and the landlord provide services to earn income.
Therefore, I came up with this sharing storage idea. The few problems that can be solved are:
  1. The cost is lower because, For miners, this is the reuse of idle resources. It is a fairly zero cost regarding cost structure.;
  2. Faster, P2P can speed up the transmission, and PPTV’s success is the best proof. After the sharing storage, because the storage nodes are everywhere on the network, the data is stored on the nearest storage node, so it can also be the fastest transmission.
  3. Decentralized storage is more private. because big companies do not necessarily guarantee privacy. Almost all big companies have exposed data leakage incidents. Today’s big companies are very dependent on big data and they might use user data for AI training. Decentralized storage is to double-encrypt data through the user’s key and developer key, then slice it into multiple segments.In this way, different segments are stored on different computers. Moreover, the sharing platform itself does not store data, which completely prevents leakage risk. Only the user’s key can open the data and the sharing operator has no way. Also, for hackers, hacking into one computer is useless, because the data is stored across many different computers This significantly increases the difficulty for hackers to steal data.
Although shared storage can solve these problems, it also brings many challenges.
  1. How to guarantee the stability of miner nodes? Some nodes will go online soon and some will go offline, just like the users of PPTV before. How to make stable products based on unstable nodes is a challenge, but it is also a thing that P2P itself must do.
  2. The quality of the miner node: For example, the hard disk of some miner nodes may be old, and it is easy to break; for another example, the bandwidth quality of some miner nodes may be terrible; for another example, some place’s power is unstable, and there are power outages frequently.
  3. Cheating on evil miner nodes: Since there are gains, some people find ways to cheat. It is the weakness of human nature and it is inevitable.
Although these problems are challenging, for me who have done 10 years of international P2P projects, I believe that these problems can be solved very well in the end, because most of the problems have been encountered before in PPTV.
However, if it’s just shared storage, even if you do the above, why do you believe that your income distribution is fair? It is the value of the blockchain.
The fate of my blockchain, starting in 2010, I was exposed to Bitcoin, a P2P currency system. As a commercial P2P practitioner, I quickly read through Bitcoin’s code: block, block hash, nonce, and mining algorithms, which are quickly understood. However, at the time I only felt the greatness of Bitcoin’s technology. In business, I didn’t understand it so deeply.
Later, Ethereum was born. In my opinion, in addition to optimizing Bitcoin’s block performance and mining algorithm, Ethereum’s most significant improvement is that Bitcoin can only execute simple instructions OPCODE into complex logic code. Virtual machine code and can program in solidity high-level language. This blockchain can be used not only for digital currencies but also for writing a variety of smart contracts that work in many scenarios.
Later, after carefully studying the technical mechanism of the open source alliance chain fabric made by IBM, I finally found the value of the blockchain itself.
From a technical point of view, blockchain is essentially a distributed and fully synchronized database. Since the chain scattered on different computers, there is a need to resolve the dispute, and the consensus algorithm is used to resolve the dispute. From a sociological perspective, the decentralization and consensus of blockchains can generate enormous social value. This value is that blockchain can build real trust. The value is that the public blockchain can build true public trust.
In the sharing storage scenario, I think it is wrong to store the stored files on the chain. The function of the blockchain for shared storage does not aim at solving data storage problems, but to solve trust problems. The data stored in the chain should be trust-related data, such as user assets, storage contracts, proofs, rewards, and penalties.
My thinking is getting clearer
With blockchain technology, an effective third-party node certification mechanism can be established to supervise the cheating problem of evil nodes through consensus; the rules of sharing distribution cannot be changed thought of one’s will, and there are fairness and transparency.
Because of fairness and transparency, everyone can safely invest resources in the platform network. Because of fairness and transparency, everyone is willing to invest in funds and build a reliable and competitive and large service center to provide services for incentives. Because of fairness and transparency, there is a truly transparent market that drives everyone to look for better and affordable resources to provide users with better and affordable services.
Because of fairness and transparency, we can build an economic model that is implemented purely by computer programs. For evil miners, they must be severely punished until the collateral is forfeited to 0. For the miners who are unstable online and the service, it must be punished according to the amount and the collateral is forfeited. Thus, such method stimulates miners to provide stable service. For miners who occasionally fail, there must be a warning penalty to motivate the service provider to provide more stable hardware. Through an effective economic mechanism, as long as the miners are stable, the entire platform service will be stabilized and QoS will be guaranteed.
What needs to be done is to: use blockchain to create a sharing storage network; use incentives to stimulate sharing; use public blockchain to ensure fair and transparent incentives. The value is: affordability, speed, and privacy. This network is easy to use and is friendly to developers. Developers can write a variety of applications in various computer languages.
Eventually, I started the project PPIO
When I was doing PPTV back in the days, Bill approached me. However, this time I approached Bill and told him that I wanted to change the world again. Therefore, Bill and l once again launched this new project with the goal to change the world,which is PPIO.
PPIO — — A decentralized data storage and delivery platform for developers
that values speed, affordability, and privacy.
Article author:Wayne Wong
If you want to reprint, please indicate the source
If you have an exchange about blockchain learning, you can contact me in the following ways:Github: https://github.com/omnigeekerTelegram: @omnigeekerTwitter: @omnigeekerMedium: https://medium.com/@omnigeekerSteemit: https://steemit.com/@omnigeeker
submitted by omnigeeker to btc [link] [comments]

Waterhole IO: mining pool, messaging platform, AIO miner, and marketplace

WATERHOLE IO: https://waterhole.io/
Waterhole IO is an established company with experiences in the cryptocurrency field since 2012 by delving into miners, trading, and now we have grown into a full-blown software development company specializing in blockchain technology. You may have heard of us or traded with us before under our handles BestCoin or atCoin on LocalBitcoins (https://localbitcoins.com/accounts/profile/bestcoin/). There are several key aspects of Waterhole IO as we strive to simplify and incorporate blockchain, mining, and cryptocurrency into our everyday society as listed below.
MINING POOLS
Waterhole IO operates several mining pools for different cryptocurrencies. At this moment, our online pools are BCH, ZEC, ETH, and ETC. In the future we hope to support even more coins as we establish ourselves further.
MOBILE APPLICATION for iOS and Android
Messaging Platform
Multi-coin wallet
Secure Trades
Miner Enhancement
AIO MINING SOFTWARE (https://waterhole.io/software)
MARKETPLACE
FREQUENTLY ASKED QUESTIONS (FAQs) (Updated 02-27-18)
Questions, comments, feedback? You can contact us directly at [email protected] or comment below and we do appreciate your inputs to help improve the quality of our work.
submitted by waterholeIO to gpumining [link] [comments]

Blindspot Whitepaper: Specialized Threat Assessment and Protection (STAP) for the Blockchain

BlindSpot™
Stop attacks before ”zero day” and stop the Advanced Persistent Threat (APT)
We live in a dangerous world — our information technology systems face that danger every single day. Hackers are constantly attempting to infiltrate systems, steal information, damage government and corporate reputations, and take control of systems and processes.
Hackers share and use a variety of tools and techniques to gain access to, and
maintain access to, IT systems, including groups and techniques so dangerous
they have their own category - the Advanced Persistent Threat (APT). At the
center of the APT are sophisticated techniques using malware to exploit vulnerabilities in systems. Traditional cyber security technologies use file signatures to locate these tools and hacker malware, but hackers are now actively camouflaging their tools by changing, customizing, and “morphing” them into new files that do not match any known signatures (‘Polymorphic Malware’). This introduces a massive gap in malicious file detection which leaves the enterprise open to exploitation — and it’s just not possible for traditional signature-based systems to keep up. In fact, signature-based anti-virus and anti-malware systems are only around 25% effective today. BlindSpot™ sees through it all, even as the files morph and change in a futile attempt to remain camouflaged.
Digital File Fingerprints
Any File Type, Any Language, Partial Matches, Exact Matches
BlindSpot™, the adaptive security solution from BlindSpot™, can see through the
Polymorphic camouflage used by the worlds most advanced hackers by utilizing
digital file fingerprints and our proprietary adaptive BlindSpot™ ‘brain’ that constantly analyzes the fingerprints of known malicious files and tools to locate partial matches within the files on your systems - servers, laptops, desktops, USB drives, and even mobile devices. BlindSpot™ can cut right through the Polymorphic files, revealing the true hacking tools underneath, even if they are only fragments or pieces of a more complete set of hacking tools and technologies.
Most cyber attacks happen weeks or even months after their initial penetration and access to a network or system, and even the simplest attacks tend to have a fuse that is typically several days. It takes them time to map out a system, probe for the information they want, and obtain or forge credentials with the type of access they need. But from the moment their tools first land on your network and systems, BlindSpot™ sees them. If fact, BlindSpot™ can see them sitting on a newly inserted USB drive even if the files are not copied to your systems. This means BlindSpot™ can identify and alert you to malicious files and potential illicit activities before the attack happens - before zero day!
How does BlindSpot™ work? BlindSpot™ sits on the endpoint and continuously monitors file activity. Digital fingerprints, which can be used to find partial matches of any file type in any language, are reported back where they are kept forever in a temporal repository.
BlindSpot™ looks through all of the digital fingerprints — both those from files on your systems and those in a constantly updated database of known malicious files and hacking tools, to locate and alert you to any indication of hacking, malicious files, or illicit activity. BlindSpot™ is a disruptive technology that can see polymorphic malware and stop attacks before zero day.
Digital File Fingerprints are created from a file or a piece of digital data/information by using advanced mathematics to look at all of the small pieces of data that make up the file to create a very small, unique piece of mathematical data — a digital file fingerprint. Files may be of any file type and in any language - digital fingerprints can find partial and exact matches regardless of what is in the file itself.
Just like with humans, once a fingerprint has been taken, you no longer need the
person to identify them. The fingerprint is enough. Even a partial fingerprint is
enough, and sometimes a smudge will do. Digital fingerprints work on the same
principle. Once BlindSpot™ has taken a digital fingerprint of a file, the file is no longer needed to identify it or to compare it with other files. And because digital fingerprints are tiny, they are easy to store. Even a multi-gigabyte file has a digital fingerprint that is no larger than 10k bytes.
Once you have two sets of digital fingerprints, you can compare them. Because BlindSpot™ starts with full fingerprints of known malicious files, it can identify matching files even when the digital fingerprint is only partially there. And with BlindSpot™’s advanced processing capabilities, file fragments, recovered data from a hard drive, partially downloaded documents, damaged files (both intentional and accidental) and other incomplete file structures can be properly fingerprinted in a way that still allows matches to be found.
Other technologies and software use static signatures, which do not work if any part of a file, regardless of how small, is different from another, or if the file is damaged in any way. BlindSpot™ and digital fingerprints enable partial matching, and can see through the camouflage that has become the industry standard for hackers across the globe. Static signature based solutions simply cannot do this.
Imagine your favorite detective drama on TV. The prosecutor says “This partial
fingerprint was found at the crime scene and the video camera across the
street recorded a perfect image of the person’s face.” The jury deliberates and
compares the picture and fingerprints of the defendant that were taken the day
before. They conclude, because the fingerprint was not all there and was not 100% identical, and because one picture showed a mustache that looked identical but was one millimeter longer than the other picture, that the two people were not identical - and set the criminal free. Well, that show wouldn’t be on TV long because crime would run rampant. Now imagine they had BlindSpot™. Criminals would be caught, the town would be a much safer place, and the show would be on for years to come.
Now imagine your network and systems without BlindSpot™, where traditional
exact match signature software is on your front line of defense. All kinds of
malicious files could walk right through and sit down on your hard drives, just
waiting for hackers to activate them. But you don’t have to imagine what your
systems would be like with BlindSpot™ — instead, simply contact us, get BlindSpot™ in place, and we’ll work with you to show you what’s really on your systems and help you keep those systems safe.
Ensuring System Compliance
Take the guesswork out of compliance assessment
All Government systems go through Certification and Accreditation. BlindSpot™ can help you with malicious code protection, for both security considerations and required compliance. Guidelines found in NIST 800-53 Revisions 3+ Security Requirements for System Integrity, SI-3 Malicious Code Protection, state that malicious code protection mechanisms must be employed at information system entry and exit points, including workstations, notebook computers, and mobile devices, to detect and eradicate malicious code.
BlindSpot™, with its continuous monitoring of the files on your endpoints and its
continuous updating of its known malicious file repository, will provide the
required real-time and full monthly re-scans of your files, will alert your
administrative staff when malicious code is found, will provide reports on
potential malicious files, illicit activity, and follow-up with very short false positive reports. BlindSpot™’s false positive rate is less than 0.01%. BlindSpot™ helps organizations meet the security requirements set forth and ensure compliance.
Intellectual Property Protection
Track sensitive information as it changes and moves around the enterprise
BlindSpot™ uses digital file fingerprints to identify partial and exact matches between files, regardless of file type or language. This ability can be used to track movements of and changes to files on a network of computers.
Government entities and corporations need to addresses the issue of monitoring
documents and files that contain sensitive information intellectual property, and it
is no longer sufficient to simply store them on a secure server and require specific credentials to access the information. People, both unintentionally and sometimes with malicious intent, copy and paste parts of documents, move files to USB drives, and otherwise edit and transfer files in order to get them on to a laptop, share them with a co-worker, or exfiltrate confidential information to outside networks and systems. BlindSpot™ carefully watches all of the files on your network, including what’s going with USB drives. If someone copies part of a file that has sensitive data to another file, BlindSpot™ sees it. Furthermore, BlindSpot™ can alert you when it sees questionable activity with certain documents/files or with specific computers/individuals.
Your sensitive files now have a watchdog that catches both unintentional and
malicious exposure to non-secure systems. Use BlindSpot™ to set up a custom
database of the locations where your sensitive files are stored, and BlindSpot™ will create a set of digital file fingerprints that can be used to track those files across your network and systems. This ensures that an organization can know where its proprietary and sensitive information is 365/7/24, in real-time.
Supervisory Control and Data Acquisition (SCADA) Systems
Supervisory Control and Data Acquisition (SCADA) is a system for remote monitoring and control that operates with coded signals over communication channels (using typically one communication channel per remote station).
SCADA networks contain computers and applications that perform key functions in providing essential services and commodities (e.g. electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. They are part of the nation’s critical infrastructure, provide great efficiency, are widely used, and require protection from a variety of cyber threats.
One of the most significant threats is benign files residing on the computers on
the network that morph into tools that hackers can use to gain access to the
network and the equipment it monitors and/or controls. These files might be part
of the operating system (binary files), might be a normal file that includes
scripting, or can even be a general data file moved onto the computer through a
network or a USB drive. By morphing, these files circumvent detection and
countermeasures. This is just one example of how a hacker can compromise and
exploit the system and the worst part is that you will never know until it is too late!
The recent Department of Justice announcement charging Iranian hackers
believed to be tied to the 2013 hacking of a New York dam illustrates this threat
clearly.
Enter BlindSpot™’s BlindSpot™ Adaptive Security — BlindSpot™ monitors all files of all types (any format or language) without the requirement of a translator or human operator. BlindSpot™ can see right through the hacker’s camouflage of
morphing files to quickly identify problems and threats before hackers have the
opportunity to active and use their tools. For U.S. and foreign based systems,
BlindSpot™ is a must have cyber security solution.
The BlindSpot™ team has extensive experience with SCADA systems and critical infrastructure. Our BlindSpot™ solution is critical to the overall security framework of such systems as it was designed to find the morphing, malicious files and associated illicit file activity that can lead to compromise of the integrity, confidentiality and/or availability of the system. Threats loom on both the inside and outside, and the dynamic nature of these systems require continuous, temporal monitoring to stop cyber attacks before they happen.
Stop Ransomware
Identify and remove Ransomware before it encrypts your files
Ransomware attacks are on the rise and affect Fortune 500 companies, Federal
organizations, and consumers. This vicious type of attack affects your user’s ability to get their work done and prevents users from accessing files on a device or network by making the device or network unusable, by encrypting the files your users need to access, and/or by stopping certain applications from running (e.g. the web browser). A ransom is then demanded (an electronic payment of currency or bitcoins) with the promise that your data will be unencrypted and accessible again following the payment.
If the ransom payment is made, there is no guarantee that the data will be
unencrypted or returned to a state of integrity and/or availability. Furthermore,
there is also no guarantee that the people behind the ransom will not re-infect
your systems again with a variant of what was initially used. Payment encourages future attacks because they know you cannot detect it and will pay again next time. Surprisingly, there are only a handful of known ransomware files in use today (e.g. Crowti, Fakebsod). Safeguards exist that use static signatures to find exact matches for these known files, but the moment these files morph or are changed in any way they become undetectable by these solutions. BlindSpot™ digs deeper with digital file fingerprints and can find the new files, enabling you to analyze, quarantine, or delete them before they activate. This pro-active approach can be the difference between a system being protected and a system being made completely unavailable with encrypted data being held hostage for a ransom. The image below is an actual Fakebsod notification message.
BlindSpot™ uses digital file fingerprints to detect the ransomware by looking at
both partial and exact matches and can report the problem before it happens.
Ransomeware of the past attacked your personal computer and today’s variant
attacks the servers — BlindSpot™ can detect both.
Case Study: March 2016 - Two more healthcare networks are hit by ransomware targeting servers. Advice from law enforcement — pay the ransom! (They did). File backups are insufficient. Paying ransoms is costly and only encourages repeat attacks.
BlindSpot™ is the most comprehensive solution available to detect and root out
ransomware. Take charge of the situation and put BlindSpot™ to work continuously monitoring your systems.
Get BlindSpot™ Now
Commercial or Government, with multiple contract vehicles available
How Can I Get BlindSpot™?
CYBR develops and sells its adaptive enterprise cyber security software product, BlindSpot™, and provides professional services and support for BlindSpot™ implementations.
Product
BlindSpot™ Adaptive Security is a continuous monitoring enterprise solution that tracks file-based activity on the endpoint using digital file fingerprints, can identify problems and cyber threats before zero day, and can see through morphing, camouflaged (polymorphic) files to make accurate determinations of malicious files and illicit activity.
Deployment Options
BlindSpot™ can deployed as a secure cloud application for maximum flexibility, a standalone Enterprise implementation for maximum security, or the two combined in an Enterprise implementation augmented through a secure cloud gateway.
Professional Services and Training
BlindSpot™’s team of cyber security experts have the expertise to support
you by creating a holistic, enterprise security framework that consists of people,
policy, procedures and technology that will ensure a security posture that implements the best risk management strategies, tactics and operations available.
Email us at [[email protected]](mailto:[email protected]) for more information.
BlindSpot Solution Brief
June 29, 2018
POC: Shawn R. Key CEO, President
[[email protected]](mailto:[email protected])
Executive Summary and Estimated Pricing
CYBR’s BlindSpot is an enterprise cyber security solution that pro-actively identifies unknown and known malicious files and circumventive activity on endpoint devices. It is designed to interact with the CYBR Ecosystem and associated Web Portal. Distributed clients serve as the connection to the various BlindSpot server tiers.
BlindSpot identifies Illicit File Activity (IFA) and associated hacker activity via perceptive, industry standard algorithms. BlindSpot identifies exact AND similar files regardless of file type and/or language. This applies to ALL file types (e.g. documents, images, audio and video, carrier, etc.). Currently implemented safeguards and counter measures (such as anti-virus (AV), content filters and malware analysis tools) cannot address polymorphic/adaptive files and emerging threats. This introduces a massive gap in illicit file detection and leaves the enterprise open to exploitation. BlindSpot fills that void.
Additionally, corporations and government entities have a need to address known files and associated activity with regards to content and data management. The uncertainty of Intellectual Property (IP) location and propagation poses significant risk to the organization. The ability to identify the life cycle of a file (origin, source, destination, attributes and proliferation) ensures an organization knows where its proprietary, sensitive and privacy information is 365/24/7, in near real-time.
BlindSpot, is significantly different from solutions in the emerging Specialized Threat Assessment and Protection (STAP) marketplace, as it scales to meet the needs of enterprise organizations and the commercial marketplace. BlindSpot’s proprietary database consists of millions of unique, digital identifiers (hash values) that identify exact AND similar, modified files. This ensures that files existing in their original state or those which have been intentionally modified, do not circumvent detection. Our algorithms ensure near zero false positive return rates. The combinatory effect and the rare expertise of our executives and development thwarts potential competition as BlindSpot is an enterprise solution; not a tool.
The enterprise solution is provide as a license per IP address with associated appliance and/or server hardware requirements.
CYBR BlindSpot Technical Deep Dive
CYBR’s BlindSpot product is currently available as a Software as a Service) (SaaS) deployment blockchain solution and will be available as a full enterprise-install by Q2 2019. In both implementations, end-point agent software monitors the hard drive(s) of a computer or server, analyses any files that change, and reports [multiple] file hashes back to the main system. This enables the main system to effectively monitor which files could be malicious or represent intellectual property on the computers and servers within the customer’s network. By using fuzzy hashing algorithms, the system can detect polymorphic malware and intellectual property that has been partially hidden or obfuscated.
Applications
End-point (client) agent: native to each major OS as a fat client. Currently we have end-point agents for Microsoft Windows-based systems using MS .NET c# 2.0/4.5 and C++, although the c# portion will be replaced with all c++ code to increase scalability, efficiency, and security, in Q1 2016. End-point agents for Mac OS (written in Objective-C) and popular Linux platforms (written in c++) will ship in Q1/Q2 2016. Development work on the CentOS linux agent will begin in December 2015.
The Control Application enables system administrators to configure each end-point agent, the system itself, and to actively monitor and access reports on files that have been identified by the system as problematic or of interest. At this time the Control Application is able to provide configuration and monitoring services but is not yet ready for customer on-site deployment and is therefore only available in a SaaS model.
The middle-tier of the system, the Portal sever, currently runs in MS .NET and is written in c#. This tier will be upgraded to a full c++ implementation to increase scalability, efficiency, and security, in Q1 2016, and will run as a standard web server extension on a Linux platform (CentOS/Apache).
The data-tier of the system currently is running in MS SQL Server 2008/2012 and uses transact-SQL tables, but does not use any stored procedures or transactions. Although this tier is sufficient for scalability through mid to late 2016, a no-SQL version of the data tier will be developed in 2016.
The Crush server (hashing services) currently runs on MS Server 2008/2012, is written in c#/c++ and is a) being ported to run as a (c++) daemon on a standard Linux (CentOS) server, and b) being re-engineered to function as a massively parallel application (c/c++) running on NVIDIA Tesla GPU accelerated systems. The Crush server communicates with the data-tier directly and the C2 server indirectly. Multiple Crush servers can run simultaneously and are horizontally scalable and fault-tolerant.
The C2 (Command and Control) server, written in c# and being moved to c++, communicates with the data-tier directly and the Crush server and Control Application indirectly to provide scheduling, system health and integrity, and prioritization services, as well redirecting jobs to maintain fault tolerance of the back-end server components. Multiple C2 servers can run simultaneously and are horizontally scalable.
Hardware and Network:
The basic architecture of the system has two different stacks of software. First, a typical 3-tier approach isolates data storage from end-point and Control Application access with a middle-man protocol altering Portal server. In the SaaS model, the end-point and Control Application software reside on-site with the customer, and the remaining stack components reside at the SaaS hosting datacenter. The second stack consists of multiple horizontally-scalable server components that run entirely in the backend as daemons and interact primarily through the data area to provide the services that are being marketed and sold to the customers. The two stacks are kept somewhat separate from each other in order to buffer one against the other in times of extreme load and for enhanced security.
Following is a description of each software module in the system and how it relates to the others:
The system has one component for data collection (the end-point agent software, which resides on the desktop computers and servers within a deployed customer site), one component for system administration (the Control Application, which resides on a desktop computer that the customer has access to or that an analyst can access through the SaaS system), and a collection of software processes/daemons and a data storage area that comprise the back-end.
The end-point agent collects data from the end-point computer, passes it to the Portal server, which in turn stores it in the data area.
The C2 server monitors the in-flow of data from the end-points, and tasks the Crush server(s) to analyze the data and compare it to databases of known good, known bad, and watch list files, in an efficient manner.
The C2 server also provides notification to the customer of any problematic or watch-list files following the completion of the Crush server tasks.
The Crush server monitors the data area, and performs batch or real-time processing of data as instructed to by the C2 server.
Technology
CYBR’s BlindSpot software is a commercially available product that combines a small footprint end-point agent with a centralized monitoring and management system to track files and file changes on the end-point using partial-match digital fingerprints rather than rigid full-match-only file signatures. As files and data buffers are created, edited/altered, and moved either through the network or via removable media devices including USB drives, the product uses its unique and proprietary technologies in combination with industry standard technologies to identify and locate both known malware and unknown [polymorphic] malware on end-points that are continuously monitored by the product. Staff is notified, depending on the urgency or type of digital fingerprint identified, through integrations with 3rd party SIEM solutions, email/SMS transmissions, and reports that are available using the central management system. A false positive rate of partial digital fingerprint matching of ~1 in 10-12 means staff will not be bombarded with unnecessary alerts, maintaining staff efficiency.
Overview: Traditional anti-malware products use static file signatures to locate known malware but have no means of detecting unknown malware, CYBR’s product uses digital file fingerprints that can identify both partial file matches as well as full file signature matches and in doing so can locate and identify both known and unknown malware within the deployed enterprise. A combination of industry standard and publicly available algorithms and CYBR’s own proprietary algorithms, trade secrets, methods, optimizations, and intellectual property for which a patent is currently pending (which is owned solely by CYBR) are combined to form a comprehensive anti-malware platform and continuous end-point monitoring product that is completely unique in the marketplace. Through the use of our proprietary algorithms and optimizations, the product has the ability to scale to the enterprise level and can track desktops/servers as well as mobile/phone/tablet/Internet of Things (IoTs) devices.
Project Implementation: The implementation of this product would include both the commercially available BlindSpot product as well as prototypes of integration packages to connect with the on-site Security Information and Event Management (SIEM) and other systems and prototypes of end-point agents running on operating systems that are not yet available in the currently available version of the product. Both the integration and end-point agent prototypes would be based on existing modular code/functionality and would extend functionality past the currently available modules to ensure the full needs and requirements of the project are met. A full version of BlindSpot would be deployed on servers at/on the enterprise site, and prototypes of both SIEM integrations and new end-point agents would be deployed to augment the full production system. Information flow between all areas of the full system and prototypes would be tested and verified with increasing scale to ensure the level of performance required is available prior to the completion of the project.
End-point Agents: Each end-point is installed with native low-profile proprietary agent software that minimizes both its file system footprint and CPU use. The current product has a native end-point available for Microsoft Windows OSs (both desktops/tablets and servers) in production, and has native end-point agents in development/prototype stage for iOS, Android, MacOS, and RHEL/CentOS, with additional popular Linux derivatives to follow. The main job of the end-point agent is to communicate with the OS and monitor the file system for any changes in files that occur. When changes are detected, a digital file fingerprint of the file is taken and reported to the centralized data store, or cached until a later time if the centralized data store is unreachable (e,g, no cell coverage, laptop not connected to internet). The agent normally runs in “stealth-mode” and uses minimal CPU, RAM, and file system footprint so as not to disrupt the end-user’s workflow or impact system performance. Taking a digital fingerprint of a file and reporting it is very fast and thus the main job of the end-point agent is not system resource intensive. The “heavy lifting” is done on the back-end and does not burden the users or the end-point devices. Configuration of each end-point agent is conducted through the centralized management system, and changes in configuration are transmitted to the end-point agent within a few seconds (provided there is network connectivity).
Central Data Store: A collection of databases on the back end store file watch lists, known good and known bad digital file fingerprints (whitelists and blacklists containing digital file fingerprints of known malware), priority lists and configurations, end-point configurations, last-seen lists, and the full temporal accounting of all digital file fingerprints reported by end-point agents. As new threats are identified they are added to the central data store. As files on end-points change or are edited, their new digital fingerprints are added to the central data store as well. As new threats are identified though polymorphic partial matching, they are added to the known bad list as well.
Identification of Known and Unknown Malware: By comparing the databases of digital file fingerprints of known malware and digital file fingerprints of files on end-points, the product’s Crush server(s) use sophisticated algorithms to compare the partial digital file fingerprints, regardless of content of the files themselves. The product looks at the raw data (bytes) in the files when creating the digital file fingerprints and as such all file types/formats/languages are handled. This means that all file types and data in any and all languages can be compared with similar files. Binary DLLs, MS Word documents and spreadsheets (MS Excel, csv, …), JPEG images, Javascript, HTML, Executable files (.exe) — all of these files are handled by the product and known/unknown malware within them can be located using the digital file fingerprints in the centralized data store and Crush server’s analysis.
Scale, System Throughput, and Priority: A single Crush server can serve a small enterprise (100s or 1,000s of end-points), and a horizontally scalable array of Crush servers can be used to provide identification of malware for large enterprises. Similarly, databases in the central data store can be split and maintained/mirrored on several servers or run in a monolithic configuration. This makes the system highly scalable and able to be adapted to enterprises of varying sizes/scales while maintaining a good price/performance ratio. Priority lists can be designated for Crush servers such that high-priority end-points and/or high-priority malware fingerprints can be compared and identified in real-time, and similarly, low-priority lists (e.g. malware fingerprints that have not been seen in months or years) can be run in the evenings or when the system is running below normal load to ensure both immediate analysis of high-priority threats and comprehensive analysis of low-priority threats.
Integration: Several modular integration points within the product enable the straight-forward integration with 3rd party SIEM software and other reporting/management tools and systems. Distinct “notification channels” within the product are used based on the type of threat detected, the priority level of the specific threat detected, the confidence of the match (low percentage match of digital fingerprint vs high), and the location of the match (specific end-point list). Each notification channel has integration points that can be linked in with 3rd party systems so that staff are notified using software and procedures they are already familiar with and trained on (i.e., through a SIEM solution that is already begin monitored by dedicated, trained staff). Prototypes of each specific integration would need to be developed as a part of this project to match/communicate with the exact SIEM (or other) system that is in use at the deployment site in the mannemethod desired. Such a prototype would be developed for the purpose of evaluating the technical interconnectivity between systems to meet the requirements of the deployment, and following the prototype testing period, would be load-tested and stress-tested to ensure it’s performance meets the demands of a highly scalable environment, leading to a mature integration over a period of 3-6 months following the initial prototype period of 1-3 months.
Technology Section Summary: With end-points being continuously monitored by the product, both known and unknown malware threats delivered by the network and removable media will be detected and reported through SIEM system integration and direct email/SMS messages with minimal impact to the end-point (on all major OSs, including desktop and mobile). Centralized management and temporal monitoring of digital fingerprints enables the system to proactively locate and identify malware threats before zero day as well as enabling the staff to conduct their own investigations of systems either in the present or the past for forensic investigations. This makes CYBR’s BlindSpot a complete product that reaches all of the end-point devices to ensure safety and security from all types of malware threats.
Defense Utility
The blockchain’s cyber security posture will be greatly enhanced by BlindSpot. CYBR’s executive team works with various military and federal organizations and has a deep understanding of the cyber security challenges that face the enterprise today including advanced persistent threat (APT), polymorphic and pleomorphic malware, zero day attacks and the need to locate white and black files in real time. These threats have now permeated to the blockchain and must be secured.
Company and Customers
The proposed team includes CYBR, Inc. executive management and staff. The company is a works closely with its sister company, 21st Century Technologies, Inc. (21CT), which is a HUBZone certified, Small Business entity. 21CT serves as a value added reseller (VAR) for CYBR, Inc. and is currently a teammate on the DOMino classified DHS contract as a subcontractor to Raytheon.
Existing, paying customers include Stratford University, Test Pros and Devitas. The company also has integrator and VAR partner relationships with Anomali (formerly Threatstream), Lockheed Martin (Cyber and Space) and various commercial entities, which the company believes will become paying customers in 2019.
Transition and Commercialization
Our technology is a commercially available product and commercial sales have been made. The company is actively working to scale this solution to hundreds of thousands of users, which the company has deemed do-able and is in the process of horizontally scaling.
Data Rights Assertions
CYBR, Inc. currently holds a provisional patent and incorporates other trade secrets into the solution. No unreasonable restrictions (including ITAR) are placed upon the use of this intellectual property with regards to global sales.
submitted by CYBRToken to u/CYBRToken [link] [comments]

Changelog 4.2.6 (18 Dec 2017)

Version 4.2.6
Version 4.2.5
Version 4.2.4
Version 4.2.3
Version 4.2.2
Version 4.2.1
Version 4.2
Version 4.1.2
Version 4.1.1
Version 4.1
IMPORTANT: CcMiner 2.2.2 requires nVidia Drivers 384.xx or later for Cuda9 support.
Version 4.0.7
Version 4.0.6
Version 4.0.5
Version 4.0.4
Version 4.0.3
Version 4.0.2
Version 4.0.1
Version 4.0
submitted by exigesDB to AwesomeMiner [link] [comments]

Waterhole IO: mining pool, messaging platform, AIO miner, and marketplace

WATERHOLE IO: https://waterhole.io/
Waterhole IO is an established company with experiences in the cryptocurrency field since 2012 by delving into miners, trading, and now we have grown into a full-blown software development company specializing in blockchain technology. You may have heard of us or traded with us before under our handles BestCoin or atCoin on LocalBitcoins (https://localbitcoins.com/accounts/profile/bestcoin/). There are several key aspects of Waterhole IO as we strive to simplify and incorporate blockchain, mining, and cryptocurrency into our everyday society as listed below.
MINING POOLS
Waterhole IO operates several mining pools for different cryptocurrencies. At this moment, our online pools are BCH, ZEC, ETH, and ETC. In the future we hope to support even more coins as we establish ourselves further.
MOBILE APPLICATION for iOS and Android
Messaging Platform
Multi-coin wallet
Secure Trades
Miner Enhancement
AIO MINING SOFTWARE (https://waterhole.io/software)
MARKETPLACE
FREQUENTLY ASKED QUESTIONS (FAQs) (Updated 02-27-18)
Questions, comments, feedback? You can contact us directly at [email protected] or comment below and we do appreciate your inputs to help improve the quality of our work.
submitted by waterholeIO to CryptoCurrencies [link] [comments]

What entity manages .com, .net, .gov, .us, .cn domains?

For the longest time I still have not a clue how this works. I am not sure if this is the right subreddit or something like networking
This is all I understand so far about the web (or internet?), computers, and electronics in general (its super long just skip to bold part if you need to)
INTERNET:
Okay, but who manages the .info, .com, .net, .cn, .rs, and .gov top level domains?
There's obviously some domains that are specific to countries, and are most likely managed by that countries' government entity. E.G (.us for usa? .ws for russia, .cn for china) but aren't nearly as popular as the .net and .com domains.
.Org and .gov are US? government regulated top level domains to my knowledge, where .org is mostly nonprofit. U.S.A uses .gov domains for its government organizations
So I understand that some countries government manages that domain. But what about public top level domains, like .com, .info, .net, .ca?
Who manages the database for those? Who gives authority to godaddy for those domains for rent? Who mediates copyright conflicts for those domains? (E.G. say my name is Mike Cro Soft, and I wanted to rent a domain called mikecrosoft, but get DMCA'd / copyrighted by microsoft.com)
Like, what are the big organizations mediating internet protocols and legislation on a global scale?
Who or what has access to the biggest picture of the web, and its workings and backend?
sorry for the long wall of text, I've been missing some vital information on how the web? (or is it internet?) works
disclaimer: I don't take CS classes and did not major in computer science. So I might be really off in what i understand about the internet as a whole. Most of this is just what I learned from browsing reddit and youtube
Apologies in advance if i butchered a bunch of terms and how things work. I just wrote things as they randomly came to me
submitted by Rubick555 to AskComputerScience [link] [comments]

Eobot.com FAQ

FAQ https://www.eobot.com/new.aspx?referid=94984
General Questions What is a Bitcoin? Good question; see www.bitcoin.org for more information.
What are your options to withdraw? We currently only allow withdrawals in BTC/LTC/BC/NMC/DOGE/XRP/DRK/RDD/BTS/CURE/PPC/NXT/SYS.
Why can't I deposit or withdraw "real currency", aka fiat (USD/EUJPY/GBP/CNY/RUB/etc.)? Due to international law, we do not allow you to deposit or withdraw fiat currencies. In the USA, there are MSB and FinCen regulations; in Europe, certain countries have banned cryptocurrencies, and in China, the banks aren't allowed to transfer cryptocurrencies. The laws may change in the future.
Why does my "Total Cryptocurrency Value" go down? This is because that display is tied to the exchange rates on other websites. Also see this user generated YouTube video for more information: https://www.youtube.com/watch?v=GucqlMuIXMg
Are their any fees to join or monthly fees? No fees.
Do you speak Spanish/Russian/Chinese? No, only English, but Google Translator works well.
What are the maximums/minimums for withdrawing? There are no maximums. The minimums are small, see the withdraw page for details.
Where can I see the terms and conditions? Please click here for terms and conditions.
Where can I see the privacy policy? Please click here for privacy policy.
Are you hiring? We are always looking for quality talent. If you would like to contribute, then please send your cover letter and resume to [email protected].
Do you have a bug bounty program? Yes, we pay for bugs, so contact us for details or visit us at CrowdCurity.com and submit bugs there!
Do you perform off-chain transactions? No we do not. All cryptocurrencies are sent, usually including miner fees, and can be seen on the blockchain for that respective cryptocurrency. This helps secure the network, makes our transactions transparent, provides an easier way to debug and track down coins, and reduces the chance for fraud. An off-chain transaction would be like what Coinbase could do if both users are Coinbase users and they change coins from one email to another, mark it in the database, and Bitcoin is never actually sent from one wallet to another.
Why does my balance reset after refreshing the page or changing cryptocurrencies? The server updates every 60 seconds and the balances you see updating in real-time are performed with Javascript. If you change pages quickly, or choose a new cryptocurrency, then it will look like it is resetting. However nothign is lost, as whatever cryptocurrency it is set at when the server updates will get the past 60 seconds of mining results.
Help! My account was hacked and withdraws are being made? Eobot is a secure site and has never been compromised. If your account was hacked, then you should change your password, turn on 2FA, and turn on email notifications. There are many unscrupulous Bitcoin sites, and most likely, you used the same password on another site. Never re-use passwords!
Do you have any wallpapers? Yes, you can download wallpaper1 or wallpaper2. Feel free to send us your own creations.
What does Eobot stand for? We have heard everything, let us know your favorite, including: Earn Online Bot, Earn Online Bitcoins Online Tool, Earn Online By Our Tech.
Is this legal? We cannot provide legal advice; make sure cryptocurrencies are legal in your jurisdiction before continuing to use Eobot.
Cloud Mining Questions What are the Cloud Mining fees? For electricity and maintenance, we currently charge a fee of 65% for SHA-256 and 65% for Scrypt. These values will change as difficulty increases, exchange rates change, and newer ASICs come online. These fees are better than our competitors, for instance CEX.IO charges $0.105 per GHS, which is a 81% fee! While GAW charges a 96% fee at current prices!
How long are the Cloud Mining rentals and contracts? Prior to October 11 2014, GHS/KHS contracts had no expiration. Old contracts are not affected. New contracts and rentals, mined or purchased after October 11 2014, are now limited in term for 5 years going forward. See your History tab for expiration dates.
Can I sell my Cloud Mining? No, you cannot sell the cloud shares at this time. This is because we own the hardware and do not want to be stuck if everyone decides to sell at once.
Can I buy Cloud Mining with credit card/USD? Yes, but please keep in mind you cannot sell or convert the Cloud Mining.
Can I buy Cloud Mining with cryptocurrency? Yes, deposit the cryptocurrency and then convert it to your choice of Cloud Mining.
What are the maximums/minimums when making a credit card purchase to buy Cloud Mining? The minimum is 1.0 GHS and 10.0 KHS and there is no maximum at this time.
Can I buy a Cloud Mining that mines in Scrypt? You can use the Cloud Mining SHA-256 hashing power to mine other currencies by automatically converting them as you mine, but the earnings will still be tied to SHA-256/Bitcoin difficulty, not Scrypt/Litecoin difficulty.
What is the difference between Cloud Mining SHA-256 and Cloud Mining Scrypt? One is tied to the difficulty in mining SHA-256 cryptocurrency (Bitcoin) and the other is tied to the difficulty in mining Scrypt cryptocurrency (Litecoin). This means that if history is any indication of the future, then the Cloud Mining Scrypt won't decrease as fast as the Cloud Mining SHA-256.
What does 1 instance of Cloud Mining SHA-256 and Cloud Mining Scrypt equal? 1 of Cloud SHA-256 equates to 1.0 GHS of SHA-256 mining power, while 1 of Cloud Scrypt equates to 1 KHS of Scrypt mining power.
Can I change the pool that my Cloud mines on? No, you cannot; this may change in the future.
What hardware is behind the Cloud Mining? The hardware varies from custom ASICs to GPUs. The ASICs are behind the SHA-256 and the GPUs are behind the Scrypt.
Can I RDP (remote desktop) into my Cloud Mining? No, you cannot at this time; we will run the servers for you.
What is the Cloud Mining Pre-Order? These are the same as the other Cloud Mining, but they will start mining on a later date. For instance, a Cloud Mining Pre-Order October 2014 will start mining on October 1, 2014.
Software/Miner Questions Why is it stuck on "initializing...please wait 5 minutes"? We recently changed our Scrypt pool, so this messge will show and the stats and speed won't show under your account. See pool info page for more info.
Why does it show as a trojan/virus? This is a false-positive that many of the popular antivirus programs report. For now you can ignore it, or try another free antivirus, like Microsoft Security Essentials. Hackers use something similar programs to make money off of people's computers, so that is why it shows up as a virus.
Why does Chrome block the download as malicious? This is another false-positive. Simply, go to your Chrome settings, scroll to the bottom and click on "Show Advanced Settings". Go to the Privacy section and uncheck "Enable phishing and malware protection". You will only do this temporarily. Then proceed to download our software. Then return to your privacy settings and recheck Enable Phishing to further protect you.
Do you have a Mac or Linux version? Yes, see the Pool Info under the Account page.
How do I use cgminer? See this English PDF tutorial for cgminer, or Spanish version, created by one of our members, for a simple walk-through.
How can I increase the speed? Important to increase speed: The default cgminer settings do not include hardware specific flags, which you may find here in the Litecoin Mining Hardware Comparison. Failing to use the proper flags can result in performance decreases in excess of 50%.
What do the intensity settings relate to? This is the same as cgminer flag --intensity. Low is 11, normal is none, high is 15, very high is 17, extreme is 19.
Can I use one account for multiple computers on same IP address? Yes, it will add your speed/rates together, you can use as many computers as you want.
Can I connect to the pool manually, through cgminer or bfgminer? Yes, see the Pool Info under the Account page.
Do you use Bitcoin and Litecoin? Yes, we are the easiest miner to use with BTC and LTC and convert on the backend automatically.
What do you use on the backend? We use cgminer, bfgminer, pooler's CPU miner, and a variety of pools.
Can I mine any cryptocurrency? Yes, regardless if you use SHA-256 or Scrypt (BTC vs LTC mode), you can earn and mine any cryptocurrency.
Can I use an ASIC? Yes, simply choose the option and run as GPU mode. Devices that work with bfgminer will work, for instance USB Block Eruptors or Butterfly Labs ASICs. You can also contact us for pool information for other ASICs.
What is the best graphics card/computer to buy? Either use a high end ATI Radeon card, or buy one of the USB Block Eruptor devices on Ebay/Amazon or a similar online store.
What drivers do I need for USB mode? http://www.silabs.com/products/mcu/Pages/USBtoUARTBridgeVCPDrivers.aspx
Why doesn't GPU mode work? You may need to download the OpenCL drivers; get them from here: http://developer.nvidia.com/opencl
Where can I get the .NET framework? Try Windows Update, or use Microsoft Web Platform Installer.
Can I use a proxy server? Yes, edit intensity.txt and put the details in there, for example, add "--proxy=http://mycompany-http-proxy:8080"
Where can I download the software? Download from link here
Can I use custom flags/change intensity? Yes, you can put in whatever custom flags/parameters/arguments you want. Edit the "resources/intensity.txt" file. Put in whatever you want, like for GPU mode: "--intensity 12 --shaders 1024" or for CPU mode (number of threads): "-t 32"
submitted by KryptosBit to Bitcoin [link] [comments]

Get Started with NVIDIA GPU Cloud GPU Computing and the Next Gen Cloud GPUs on Google Cloud - the Fast Way & the Slow Way NVIDIA GPU Cloud with TITAN V, Step by Step How to: Get the fastest GPU on google colab for free ?

Train the most demanding AI, ML, and Deep Learning models with the Lambda GPU Cloud. Scale from a single virtual machine to an entire fleet of NVIDIA® V100 Tensor Core GPU VMs with a few clicks. Microsoft will offer NVIDIA GPU-enabled professional graphics applications and accelerated computing capabilities to customers worldwide through its cloud platform, Microsoft Azure. Deploying the latest version of NVIDIA GRID in its new N-Series virtual machine offering, Microsoft Azure is the first cloud computing platform to provide NVIDIA The second use case shows how to build a PaaS for GPU computing with Alea GPU and MBrace. To learn more about Alea GPU, please read my earlier Parallel Forall post. GPU Clouds. There are several GPU cloud computing providers. A list can be found on the NVIDIA web site. Most of them provide GPUs via IaaS. NVIDIA partners offer a wide array of cutting-edge servers capable of diverse AI, HPC, and accelerated computing workloads. To promote the optimal server for each workload, NVIDIA has introduced GPU-Accelerated Server Platforms, which recommends ideal classes of servers for various Training (HGX-T), Inference (HGX-I), and Supercomputing (SCX) applications. Our Nvidia GPU Cloud provides researchers and data scientists with easy access to a comprehensive catalogue of GPU software tools optimised for deep learning and high-performance computing (HPC), which take full advantage of NVIDIA hardware. The NGC Container Registry includes NVIDIA containers optimised, tested, certified and maintained for

[index] [19218] [27124] [6132] [5314] [29721] [18392] [4564] [28854] [16127] [9566]

Get Started with NVIDIA GPU Cloud

NVIDIA CEO and founder Jensen Huang introduces the NVIDIA GPU Cloud platform to jump-start GPU-accelerated deep learning. He announces the inferencing compiler TensorRT for the TensorFlow deep ... This video will get you the fastest GPU in colab. Before we get it on, I am giving a quick shout-out to Sina Asadiyan for sharing this trick with me. So back in your colab, when you change your ... How to Mining Using Free VPS Aruba Cloud. VPS for mining bitcoin. Earn 5USD/day. - Duration: 30:25. ... Get Started with NVIDIA GPU Cloud - Duration: 2:31. NVIDIA Recommended for you. Create a Virtual Machine with NVIDIA GPU - Google Cloud (Part-1) - Duration: 7:06. Ajas Sharafudeen 3,940 views. 7:06. Kevin Mitnick: Live Hack at CeBIT Global Conferences 2015 - Duration: 1:11:56. NVIDIA GPU Cloud (NGC) provides access to GPU-optimized containers for deep learning and high performance computing (HPC) that take advantage of NVIDIA GPUs. The NVIDIA Container Runtime for ...

Flag Counter