Author

Topic: CCminer(SP-MOD) Modded NVIDIA Maxwell / Pascal kernels. - page 717. (Read 2347641 times)

hero member
Activity: 710
Merit: 502
Hi sp_

0.1 BTC for you
TxID: cf4e935a8aebce8bc1126740c07f5952014c994830f091c4f8d370ae6c78bcd1

if you have a (private) optimized linux version for quark/lyra2v2 i would like to have it Grin, otherwise, for the opensource 1.5.79 Smiley

I compile for lubuntu 14.04 x64.
excelent job btw with 1.5.78
thanks!
indkt.
legendary
Activity: 2002
Merit: 1051
ICO? Not even once.
Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

Any chance you mined Oxen?

Some people confused ccminer having malicious code instead of Oxen which was malicious.



cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later.

it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing

They obviously publish a clean surce with dirty binaries from a the private, malicious source. People would be fine compiling the clean source but they rarely do it themselves on windows.


That will be very interesting. It might even convince me to make the switch from 7 to 10.
legendary
Activity: 1470
Merit: 1114
Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

Any chance you mined Oxen?

Some people confused ccminer having malicious code instead of Oxen which was malicious.



cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later.

it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing

That's the theory, but how many people actually inspect the code before they compile it? Most assume "someone" has
already inspected it. Heartbleed was open source and was built into many different OSs for 2 years beofore it was
discovered. MS and Red Hat and Ubuntu and... must have inspected openssl before using it in their product, didn't they?
full member
Activity: 224
Merit: 100
Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

Any chance you mined Oxen?

Some people confused ccminer having malicious code instead of Oxen which was malicious.



cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later.

it's not about antivirus, it's about code checking, no virus can be hidden if you have the source and you know what you're doing
legendary
Activity: 2716
Merit: 1094
Black Belt Developer
people should just mine on linux and learn to "configuremake" ;-)
legendary
Activity: 1484
Merit: 1082
ccminer/cpuminer developer
you are wrong, it was infected scam wallets like Intellect, and Oxen recently. And it was not teamviewer but MS Remote destkop.

The method by users with quoted links in the forum seems different.
legendary
Activity: 2590
Merit: 1022
Leading Crypto Sports Betting & Casino Platform
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.

cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?!

There are a few people who got robbed that way (search reddit).

It actually seems teamviewer is the culprit here.

Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ...

Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid.
(the default 6 letter pw can be changed to a 10 letter pw including special characters)

there are options on teamviewer to remove the possibility to access your computer, you simply choose to negate any connection to that computer from remote
legendary
Activity: 1764
Merit: 1024
Sp_ I noticed that when I start mining decred sometimes some of the cards won't start hashing and their GPU usage stays 0. This seems more frequent with release 7 but it's also there with release 4.
The cards are not crashing or anything, the miner just doesn't start using them. If I restart the same .bat it sometimes work.

Lowering or increasing intensity or poolside difficulty had no effect. Different pools also had no effect. Issue is the same on 750 Ti and 970 on all of my rigs so it's likely the issue is not exclusive to me.


Here's a graph just to shows what I mean:


Explanation: the graph represents a bunch of 1 minute mining sessions with 10 second breaks between them on a loop. So the spikes are the 1 minute sessions and the small drops are the 10 second breaks (just for visibility purposes) and the big drops are when some of the cards are not hashing.

The .bat file had no extra parameters for ccminer.

Not the same thing, but I noticed one of my six GPUs has a oscilating pattern to it. Obviously reduces hashrate. I'll screenshot it next time. Not runnign celerons or dual core processors, so that's not it.
legendary
Activity: 2002
Merit: 1051
ICO? Not even once.
I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?!

There are a few people who got robbed that way (search reddit).

It actually seems teamviewer is the culprit here.

Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ...

Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid.
(the default 6 letter pw can be changed to a 10 letter pw including special characters)

I doubt it's Teamviewer because it increases the amount of time you have to wait to try again after unsuccessful tries but it's possible.

But, you can change the default password's length to 10 characters which includes symbols in Options\Security > password strength.

And you can also disable incoming connections from outside your local network. It also makes windows much more responsive and don't use your bandwidth and of course it's completely safe from the outside (Options\General - Incoming LAN connections > accept exclusively). In this case you can also use local IP addresses to connect for example in shortcuts like this which is pretty convenient:

"C:\Program Files (x86)\TeamViewer\TeamViewer.exe" -i  192.168.1.x --Password doesnt_matter_local_only_password
sr. member
Activity: 506
Merit: 252
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.

cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

I read somewhere that you got "robbed" by someone copying your wallet dats and actually got into your system with teamviewer?!

There are a few people who got robbed that way (search reddit).

It actually seems teamviewer is the culprit here.

Imo someone is bruteforcing teamviewer accounts. The attacker only needs to bypass the loginlimit somehow ...

Don't forget the basic teamviewer password is only 6 letters, so even if you set a permanent login password that is way longer that basic 6 letter pw is still valid.
(the default 6 letter pw can be changed to a 10 letter pw including special characters)
legendary
Activity: 1484
Merit: 1082
ccminer/cpuminer developer
and the worst is when you get that after the compilation Wink auto deleted by your antivirus "adware"
legendary
Activity: 1470
Merit: 1114
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.

That's unfortunate. Was it from a known dev like SP or some nobody? I'd like to be able to trust CMB, they have been a
good source for Windows binaries, particularly for different architectures. Binaries are always a risk so trusted sources
are critical and it appears CMB is not one of them.

The fact is many AVs flag uninfected miners as malware because some people use them to mine in
botnets. There's nothing better than a cloud of false positives to hide a real threat.
legendary
Activity: 2002
Merit: 1051
ICO? Not even once.
This is the blocking sync issue on 2 core celeron rigs. I think i can turn of the flag for the first minute of mining and then switch it back on afterwards. 100% cpu usage down to 0.

Yep, dual core pentiums (G3420). If I start the miner with affinity to only use 1 core it's even worse so it confirms it.

Now that I know what caused it I found a quick workaround that works perfectly which is to start two instances of ccminer.
For example one with -d 0,1,2 and the other with -d 3,4.

I only noticed this with decred but I'm wondering if other algos affected?
sp_
legendary
Activity: 2954
Merit: 1087
Team Black developer
Sp_ I noticed that when I start mining decred sometimes some of the cards won't start hashing and their GPU usage stays 0. This seems more frequent with release 7 but it's also there with release 4.
The cards are not crashing or anything, the miner just doesn't start using them. If I restart the same .bat it sometimes work.

Lowering or increasing intensity or poolside difficulty had no effect. Different pools also had no effect. Issue is the same on 750 Ti and 970 on all of my rigs so it's likely the issue is not exclusive to me.
Here's a graph just to shows what I mean:


Explanation: the graph represents a bunch of 1 minute mining sessions with 10 second breaks between them on a loop. So the spikes are the 1 minute sessions and the small drops are the 10 second breaks (just for visibility purposes) and the big drops are when some of the cards are not hashing.

The .bat file had no extra parameters for ccminer.

This is the blocking sync issue on 2 core celeron rigs. I think i can turn of the flag for the first minute of mining and then switch it back on afterwards. 100% cpu usage down to 0.
legendary
Activity: 2002
Merit: 1051
ICO? Not even once.
Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.

Any chance you mined Oxen?

Some people confused ccminer having malicious code instead of Oxen which was malicious.



cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Apparently people can hide their malicious stuff with FUD crypters so the virus can't be detected and can be triggered anytime, even like months later.
legendary
Activity: 1504
Merit: 1002
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.

cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?

Hrmm at this point I cannot remember the title but I remember it said tpruvot 1.7 or so.  Obviously a scam since when after the fact I went to the github and saw tpruvot wasn't even on 1.7 - lol - hind sight is always 20/20.
full member
Activity: 224
Merit: 100
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.

cryptomining blog really? that site is huge for mining, how they can not check for malicious code, are they stupid? what was the miner with the virus?
legendary
Activity: 2002
Merit: 1051
ICO? Not even once.
Sp_ I noticed that when I start mining decred sometimes some of the cards won't start hashing and their GPU usage stays 0. This seems more frequent with release 7 but it's also there with release 4.
The cards are not crashing or anything, the miner just doesn't start using them. If I restart the same .bat it sometimes work.

Lowering or increasing intensity or poolside difficulty had no effect. Different pools also had no effect. Issue is the same on 750 Ti and 970 on all of my rigs so it's likely the issue is not exclusive to me.


Here's a graph just to shows what I mean:


Explanation: the graph represents a bunch of 1 minute mining sessions with 10 second breaks between them on a loop. So the spikes are the 1 minute sessions and the small drops are the 10 second breaks (just for visibility purposes) and the big drops are when some of the cards are not hashing.

The .bat file had no extra parameters for ccminer.
legendary
Activity: 1504
Merit: 1002
@sp - I cannot download your open source miners because it says it has detected a threat and the software contains a malwaregen32?  Why does it find that?  Is it a compressed file?

Old news, many AVs do that with miners, whitelist it.

Sorry - I am a little paranoid after losing all of my coins in mid January.

how did you lose your coins???

virus

Yes a virus that was attached to a new miner listed on Cryptomining Blog.  It had a trojan with keylogger built in.  Unfortunately I wasn't running AV or anti keylogger at the time (I know stupid of me) and got wiped out.  So like I said.  I am paranoid now.
Jump to: