It was the Bitcointalk forum that inspired us to create Bitcointalksearch.org - Bitcointalk is an excellent site that should be the default page for anybody dealing in cryptocurrency, since it is a virtual gold-mine of data. However, our experience and user feedback led us create our site; Bitcointalk's search is slow, and difficult to get the results you need, because you need to log in first to find anything useful - furthermore, there are rate limiters for their search functionality.
The aim of our project is to create a faster website that yields more results and faster without having to create an account and eliminate the need to log in - your personal data, therefore, will never be in jeopardy since we are not asking for any of your data and you don't need to provide them to use our site with all of its capabilities.
We created this website with the sole purpose of users being able to search quickly and efficiently in the field of cryptocurrency so they will have access to the latest and most accurate information and thereby assisting the crypto-community at large.
bitcoinminer2@ubuntu:~$ ps aux | grep pushpoold
1000 3004 0.0 0.0 13124 1032 pts/3 S+ 15:14 0:00 grep --color=auto pushpoold
bitcoinminer2@ubuntu:~/POOLINSTALL/pushpool-0.5$ ./pushpoold -E
bitcoinminer2@ubuntu:~/POOLINSTALL/pushpool-0.5$ [2011-06-26 23:15:47.680372] Listening on host :: port 8342
[2011-06-26 23:15:47.680703] Listening on host :: port 8341
[2011-06-26 23:15:47.680835] Listening on host :: port 8344
[2011-06-26 23:15:47.680934] Listening on host 127.0.0.1 port 8338
static int check_hash(const char *remote_host, const char *auth_user,
const char *data_str, const char **reason_out)
{
...
if (hash32[7] != 0) {
*reason_out = "H-not-zero";
return 0; /* work is invalid */
}
if (hash[27] == 0)
better_hash = true;
...
return better_hash ? 2 : 1; /* work is valid */
static bool submit_work(const char *remote_host, const char *auth_user,
CURL *curl, const char *hexstr, bool *json_result)
{
...
/* validate submitted work */
check_rc = check_hash(remote_host, auth_user, hexstr, &reason);
...
/* if hash is sufficient for share, but not target,
* don't bother submitting to bitcoind
*/
if (srv.easy_target && check_rc == 1) {
*json_result = true;
sharelog(remote_host, auth_user, "Y", NULL, NULL, hexstr);
return true;
}
static int check_hash(const char *remote_host, const char *auth_user,
const char *data_str, const char **reason_out)
{
...
if (hash32[7] != 0) {
*reason_out = "H-not-zero";
return 0; /* work is invalid */
}
if (hash[27] == 0)
better_hash = true;
...
return better_hash ? 2 : 1; /* work is valid */
static bool submit_work(const char *remote_host, const char *auth_user,
CURL *curl, const char *hexstr, bool *json_result)
{
...
/* validate submitted work */
check_rc = check_hash(remote_host, auth_user, hexstr, &reason);
...
/* if hash is sufficient for share, but not target,
* don't bother submitting to bitcoind
*/
if (srv.easy_target && check_rc == 1) {
*json_result = true;
sharelog(remote_host, auth_user, "Y", NULL, NULL, hexstr);
return true;
}
start /DC:\Phoenix phoenix.exe -u http://NH2LwYuL585o6sgiikAG42sbmAhGwj8Vsd:[email protected]:8344/;askrate=10 -k poclbm VECTORS BFI_INT AGGRESSION=11 WORKSIZE=128 DEVICE=0 FASTLOOP=false
root@ubuntu:/# sudo ufw allow proto tcp from 192.168.1.12 to 192.168.1.13 port 8344
Rule added
root@ubuntu:/# sudo ufw allow proto tcp from 192.168.1.10 to 192.168.1.10 port 8344
Rule added
root@ubuntu:/# sudo ufw --dry-run allow http
*filter
:ufw-user-input - [0:0]
:ufw-user-output - [0:0]
:ufw-user-forward - [0:0]
:ufw-before-logging-input - [0:0]
:ufw-before-logging-output - [0:0]
:ufw-before-logging-forward - [0:0]
:ufw-user-logging-input - [0:0]
:ufw-user-logging-output - [0:0]
:ufw-user-logging-forward - [0:0]
:ufw-after-logging-input - [0:0]
:ufw-after-logging-output - [0:0]
:ufw-after-logging-forward - [0:0]
:ufw-logging-deny - [0:0]
:ufw-logging-allow - [0:0]
:ufw-user-limit - [0:0]
:ufw-user-limit-accept - [0:0]
### RULES ###
### tuple ### allow any 8342 0.0.0.0/0 any 0.0.0.0/0 in
-A ufw-user-input -p tcp --dport 8342 -j ACCEPT
-A ufw-user-input -p udp --dport 8342 -j ACCEPT
### tuple ### allow any 8341 0.0.0.0/0 any 0.0.0.0/0 in
-A ufw-user-input -p tcp --dport 8341 -j ACCEPT
-A ufw-user-input -p udp --dport 8341 -j ACCEPT
### tuple ### allow any 8344 0.0.0.0/0 any 0.0.0.0/0 in
-A ufw-user-input -p tcp --dport 8344 -j ACCEPT
-A ufw-user-input -p udp --dport 8344 -j ACCEPT
### tuple ### allow any 8338 0.0.0.0/0 any 0.0.0.0/0 in
-A ufw-user-input -p tcp --dport 8338 -j ACCEPT
-A ufw-user-input -p udp --dport 8338 -j ACCEPT
### tuple ### allow tcp 8344 192.168.1.13 any 192.168.1.12 in
-A ufw-user-input -p tcp -d 192.168.1.13 --dport 8344 -s 192.168.1.12 -j ACCEPT
### tuple ### allow tcp 8344 192.168.1.10 any 192.168.1.10 in
-A ufw-user-input -p tcp -d 192.168.1.10 --dport 8344 -s 192.168.1.10 -j ACCEPT
### tuple ### allow tcp 80 0.0.0.0/0 any 0.0.0.0/0 in
-A ufw-user-input -p tcp --dport 80 -j ACCEPT
### END RULES ###
### LOGGING ###
-A ufw-after-logging-input -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
-A ufw-after-logging-forward -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
-I ufw-logging-deny -m state --state INVALID -j RETURN -m limit --limit 3/min --limit-burst 10
-A ufw-logging-deny -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
-A ufw-logging-allow -j LOG --log-prefix "[UFW ALLOW] " -m limit --limit 3/min --limit-burst 10
### END LOGGING ###
### RATE LIMITING ###
-A ufw-user-limit -m limit --limit 3/minute -j LOG --log-prefix "[UFW LIMIT BLOCK] "
-A ufw-user-limit -j REJECT
-A ufw-user-limit-accept -j ACCEPT
### END RATE LIMITING ###
COMMIT
Rules updated
root@ubuntu:/#
sudo ufw allow
telnet localhost
sudo iptables -A INPUT -p tcp --dport 8344 -j ACCEPT
sudo ufw allow
telnet localhost