Bitcoin Miner Virus: How To Detect And Delete It

Desktop Window Manager and Client Service Runtime Process taking up significant GPU

This is my first post here, so forgive me if I get anything wrong here. I'm vaguely aware I should share the specs of PC, so here they are:
Dell Precision 5540 Mobile Workstation
Onto the problem in more detail, Desktop Window Manager and CSRSS are acting weird, taking up huge amounts of GPU when the computer is essentially idle. It seems to die down a bit sometimes, and come back other times, and usually it happens in massive spikes where they take up 90%+ of the GPU. I thought it might be a bitcoin miner virus or something, so I followed the malware removal thread that is pinned at the top of the subreddit, but none of them found anything (note: I didn't go for the second opinion software). I've been starting to doubt that it actually is a bitcoin miner because it notably only eats my integrated graphics, not my Nvidia GPU thing, which seems weird. I know I could find out by doing a factory reset, but I very much do not want to lose my files, and have experienced plenty of issues with this computer that I would not like to relive. As such, I don't experience performance drops in software that uses the nividia, its mainly focused on software such as google chrome that uses integrated graphics. I've done some amount of googling and found that this might be a nvidia specific problem, but haven't found very many solutions. I did find something about thermal throttling that I didn't understand at all, and a partially working solution in lowering the priority of Desktop Window Manager to low. The priority solution appears to be effective most of the time at keeping it from spiking over 50%.
This started a few days ago, and the only thing I can think of that happened was I downloaded some files (I wanted to put a rom hack for an old pokemon game on my wii u, so I had to get the rom file and the patcher and stuff). This is what made me think it was some sort of bitcoin miner, but now I'm just super confused.

Tldr; DWM and CSRSS are taking like 90% of my integrated GPU , and I have no clue why.
submitted by scotho5 to techsupport [link] [comments]

Good and safe exploits to use and not what to use

Here are safe exploits to use and not what to use
To use:
Synapse X (strong executor but paid $20)
Krnl (free executor, only accessed via their discord not off of wearedevs) (key system is trash tho)
Not to use:
Jjsploit (a weak executor, often crashes, data miner, bitcoin miner, deletes important files)
Dansploit (virus and wants money to remove virus via bitcoin)
Anything off of Wearedevs (creator has a trojan on computer so anything on their comes with a virus)
Anything off of YouTube that is free or unheard of (sketchy and possibly malware)
Furk OS (extremely sketchy, AdWare, potential trojan/unwanted software)
Sirhurt (it is run by child predators and is paid therefore making you support them)
Sentinel v3 (a waste of money, no difference to v2)
Fluxus (unsafe, off of WeAreDevs)
Overall summary: Buy Synapse X, if you are poor join the krnl discord and download via that, don't go to WeAreDevs don't download things off YouTube and stay safe
submitted by SullWazowski to ROBLOXExploiting [link] [comments]

[Release] PoE Addon Launcher and Manager (PAL)

V1.4 HAS BEEN RELEASED PLEASE UPDATE YOUR LAUNCHER! https://github.com/POE-Addon-LaunchePoE-Addon-Launchereleases

Hi there, I'm Rizlim I created: https://github.com/Pastillage/PoE_Level_Buddy (Check the twitch URL in the readme if you don't believe me); Also here's the previous release post: https://www.reddit.com/pathofexile/comments/9himba/release_poe_addon_launcher_and_manager_pal_first/
Anyhow, I'm proud to announce a project I've been working on for a little bit, namely, an Addon Manager and Launcher for Path of Exile! https://github.com/POE-Addon-LaunchePoE-Addon-Launchereleases
Here's a video showcasing the base features: https://youtu.be/hR9b4XUZtNM
First things first, there will be bugs, this is the first time I'm releasing this to the public so I'm expecting it to not work for 50% of the people trying it, that's just how it is, that being said please report bugs either on this post, /PoEAddonLauncher, create an issue on github or just DM me somewhere on the internet.
Now let's get down to business.

What is working

  • Downloading and updating Addons
  • Downloading and updating Filters (Through Filterblast API)
  • Launching Addons when you want to launch PoE
  • Launching Addons from the installed tab
  • Adding your own addons (Through repositories)

What is planned?

  • Better way to add Addons and Filters
  • Add your own Repositories/APIs
  • In-game overlay for using website based tools (i.e. Vorici Calc)
  • In-game overlay version of PoE Level Buddy (yes, I'm reviving it)
  • Downloading and updating user generated Soundpacks
  • Probably a dedicated server rather than letting github do everything.
  • C# Version
    Now that we've had that, how do I install / use it? I've created a video just for that! Watch it here: https://youtu.be/hR9b4XUZtNM
What addons are currently available?
Where can I download it? * https://github.com/POE-Addon-LaunchePoE-Addon-Launchereleases
Why should I trust you to not install some weird viruses / hid some bitcoin miner?
  • The code is fully open-source so have a look for yourself, I also hope that having made POE Level Buddy at least gives me some credibility.
Ok, then maybe I can trust you then what about any random addon tool maker that can just add viruses / bitcoin miners / ransomware / whatever.
  • I will ofcourse not just let anyone upload anything they like, I'm only adding tools that are proven to be legit and working.
    What if they add some bad software post-release?
  • I ofcourse can't guarantee what anyone does with their programs, all I can do is remove the software from our listings, as with everything on the internet, don't just download everything make some effort to understand what you are downloading and what it could do.
Will you allow closed-source addons in PAL? * Right now I will not allow closed-source software in the Official Repositories, once I've released custom repositories as a feature, users could make their own repository with their closed software. So, the only way to get closed software through PAL will be through adding your own repository.
submitted by Rizlim to pathofexile [link] [comments]

So I finally gave Honeyminer a try. (my personal semi-review)

This review was last updated 11-30-18
When I first was interested in trying this program I couldn't find anything about it. it seems a lot of people were too scared to try it since their is like no information about it other then from the web page itself. to be honest I was a bit scared to try it. I've tried many other software of this kind, on a "test" machine I'm not afraid to lose on a secondary network and router... incase its a scam or gonna give me a virus and I suggest anyone installing mining software do the same as a rule of thumb. please keep in mind the software is still relatively new and they are working to improve it still. They seem to be hiring as well if your interested in helping them grow by working for them look near the bottom for their contact e-mail. ____________________________________________________________________________________________________
This review is for the windows version of Honyminer Because its still relatively new I knew could go one of two ways "sacm software" like most every mobile mining app or even quite a few desktop ones - Or legit. I'm glad to say after using it for a month it seems legit. I was able to withdraw from it no problem. If your system is really crappy It might not work that well on your computer or mining rig. There are no ads and the program doesn't seem to disrupt any day to day activity at least not on my main system, however you can of course expect increased heat production of your system as with any mining software, adequate cooling is important in mining. Anyways Honyminer is as close to an easy one click mining software as I have come. they seem to be making a "pro" version too for more hardcore miners. They do take a fee which is to be expected *look near the bottom for fee information\* but that fee goes down significantly if you have multiple GPU's mining.. The good thing about it for me was it let me kind of set my rig to "autopilot" so to speak. If you wish to see the H/s numbers in real time, go to you settings and view the "expert logs" which will also tell what coin is being mined at the time ____________________________________________________________________________________________________________
Pros
Pro and or con (depending on how you look at it)
Cons:
_________________________________________________________________________________________________
COMPATIBILITY: (sorry it keeps adding asterisks to the card model for no reason)
WORKED ON: every nvidia card tested so far with card models dating back from 20014 to now..
Worked on some surprising low end and or old CPU and GPUs. like the
AMD Radeon R9 380 card in addition to a AMD Athlon II X3 450 Processor and it mines just fine.. of course that processor doesn't make much on its own lol.. but thats an extra 2 or 3 cents per day by itself. I've also tested it with an i3, i2 Most AMD cards worked but I ran into issues with a few so maybe it's easier for me to just tell you what did not work.
DID NOT WORK ON:
--- any of the AMD ATI Radeon HD 4250's tested so far (2) that particular card It didn't work at all for mining like never enabled the gpu but the cpu on that machine did work however it would generate an "error" on start up but otherwise did not disrupt the mining on that system except if I turned on idle earning mode, I would get a bunch of errors as it was trying to access the GPU. we need the functionality to enable or disable hardware individually I think. (errors or no errors it just seems like a good thing to have.)
OR a system that had both a AMD Radeon R7 Graphics and a AMD A8-7650K Radeon R7, (4C+6G) which surprised me considering some of the things that did work lol... but I think it might just might be that one system, but either way can't vouch that it will work. That system was pre-built and wont allow the parts to be changed or easily removed to be worth the effort since I have to use it for other things so unfortunately I can't test these on another mainboard at least not with wasting some time, money and patients that Id rather dedicate elsewhere for now.
I had some issues using one RX Vega 56 card but i think it's was just that card because another one did work just fine.________________________________________________________________________
FEES W/ comparison to nicehash
I'm not sure if this post will be helpful to anyone looking into this software or anyone whos looking to try a different mining software but if it dose great.
-- nicehash charges the following fees as far as "selling/mining" or withdrawing.
Payouts for balances less than 0.1 to external wallet 5%
Payouts for balances greater than or equal to 0.1 BTC to external wallet 3%
Payouts for balances greater than or equal to 0.001 BTC to NiceHash wallet 2%
Withdrawal fees from NiceHash wallet
Withdrawals from NiceHash wallet are subjected to the withdrawal fee, which depends on the withdrawn amount and withdrawal option.
WITHDRAWAL OPTION AMOUNT TO WITHDRAW FEE Any BTC wallet From 0.002 (min) to 0.05 BTC 0.0001 BTC
Any BTC wallet More than 0.05 BTC 0.2% of withdrawn amount
Coinbase More than 0.001 BTC FREE - No fee. but they also say Minimum Coinbase withdrawal limit is adjusted dynamically according to the API overload._____________________________________________________________________________
honyminer fees are based on number of GPU's working.
8% for 1 GPU or for 2 GPUs or more the fee is 2.5%.
The only withdrawal fee is the standard BTC transaction fee that bitcoin charges and it doesn't go to honyminer. When they add the other withdrawal functions that fee cam be avoided I suppose.
_________________________
Earnings: in comparison to nicehash
Update: sometimes software / test networks will give a view that can be off + or - a few percent compared to actual. A lot of different things can affect your earnings including where you are located in the world, I'm not sure how many of you uses more than one mining software day to day , ISP issues, crypto price fluctuation, updates to fee's, and inaccuracies in test software/networks can affect results. but I go back and forth between different ones from time to time and I think that's good practice to keep options open. I notice that honey miner seems to do better for me at night-time and early morning/afternoon is when it has the most trouble raking in the crypto's
That said I've been trying to test to see how this compares to nice hash earnings, with two of my buddies. So this is an average between the 3 of our profits vs loss compared to nice hash, I'm using a two 10 GPU/ 3 cpu setups, while one of my buddies is using two 1 gpu, 2 cpu setups and the other is using two 30 gpu mini farm's. We each have 2 networks each located relatively close by *less than .5 mile the furthest one* one with honyminer running and the other with nice hash and we are looking over 24 hour periods When all three of us have the results for one day, we average our results together. In all we will be looking over a 14 day period. UPDATE: the results below were done well long before the latest update to the software so I do not know if they have changed, Id have to do another round or perhaps some from the community could give me their results and save me a bit of work. I'm not sure when Id have the time to dig into it again. Sorry that it took me so long before I could get on here to post the results of the last few days of the tests.
Seem to be a bit smaller then nicehash at times and higher at other times. it seems to for me at least payquicker and it gets deposited in my nicehash account sooner than I expected.
hopefully when they let up pick which coin to mine on our own it may help somewhat, and any of you who want to move smaller volume will probably benefit when they add the functionality to withdraw other coin/usd.
anyways when their autopilot system works it works great but when it doesn't it's just "okay" for lack of a better word...
_____________________________________________________
Contact: they have a contact us part on their webpage and they also have a reddit page which I was made aware of from contacting them https://www.reddit.com/HoneyMine
Careers: If anyone is interested in working for them the job listings at the time of this typing were for Senior Java Developer(s) and Customer Service Representative(s) the email listed is [[email protected]](mailto:[email protected]). id suggest you check their site for the requirements I just added this part to the review as a courtesy if anyone's interested its not meant to be a focus of it. But I know we have some really talented people on reddit who care about the crypto world passionately so id rather give honyminer a chance to have some of those sort on their team since it might help improve the software faster for the end users.. if that makes sense.
_________________________________________________________
UPDATE: If a question reminds me I left out something I think should have mentioned Ill try to add it here so ppl don't have to scroll all over the place.. I don't write many reviews (for anything) so I don't know if this one was any good or not but I hope it was okay.. and I'm still a new reddit user relatively. I just wanted to make this review mainly because there is next to no information on honyminer when I looked for it and maybe it can help anyone whos interested in it.
browolf2 asked Is it basically like nicehash then? :
A: In a way, its like nice hash that its cloud based, but you get paid not just when your pool completes an order. there are no "buyers" only "sellers" if you look at it that way...I hope I'm wording this the right way.. It's just straight up mining and they take their fee but compared to nicehash the fees for "mining" are different
karl0525 asked: do you know if we can contact the honeyminer dev team and see if they will communicate here on Reddit. Might give them some good ideas what us miners are looking for? Worth a try maybe? Thanks:
A: I submitted a question to their "contact us" part of their webpage and I got a reply from them, this is the message I received below:
Thank you for writing in and for your interest in Honeyminer. We always welcome feedback and suggestions from our users. We are currently planning on expanding our online and social media presence.
Please check our our Reddit page: https://www.reddit.com/HoneyMine
submitted by Joe_Cow to gpumining [link] [comments]

At my wit's end with virus removal

So I have at least one virus on my computer. The one I know of is some sort of bitcoin miner, I know this because my gpu usage is constantly at 100% and the fan goes crazy as well as hitmanpro categorizing files with names like bitcoinminer.
I have managed to remove every suspicious file I could find and ran antivirus and antimalware until they couldn't detect anything else but the virus keeps coming back.
The main places I think the virus is focused around are the ~C:\Users\Tony\AppData\Local\Temp~ and ~C:\Users\Tony\AppData\Local\WinSXS~ folders.
I have booted into safe mode, deleted everything in the temp folder, and gave myself permission to delete the WinSXS folder. Every time I boot normally the WinSXS folder just comes back. I know something is up with this folder because rkill always terminates it as well as the other antimalware not liking it.
When I normally boot there is a folder in the temp folder with a name that's just random strings of numbers and letters that I can't delete. It says it's open in another program. I searched the folder name is the resource monitor cpu tab and it was associated with svchost.exe and a couple other things. I'm wondering is the virus is somehow tied to svchost.
So here's a rundown of the steps I've been taking (repeatedly) to try to take care of this.
  1. Boot into safe mode (by switching my psu off then on to get to the boot menu)
  2. Show hidden files and folders
  3. Delete everything from the local\temp folder
  4. Delete unknown files from C:\\ProgramData and C:\Users\User\AppData\Roaming
  5. Remove any weird keys from HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  6. Empty Recycle Bin
  7. Run rkill
  8. Run adwcleaner
  9. Run malwarebytes (with rootkit checker)
  10. Run Hitmanpro
  11. Run combofix
  12. Run the trojan remover from https://www.simplysup.com/
  13. Reboot computer normally
  14. Run malwarebytes, watch as it finds the same walwares as a million times before
  15. Listen to my fan speed fluctuate like crazy
  16. Run rkill, it kills a WinSXS process, which does nothing
  17. Cry uncontrollably
So uh, what the hell should I do?
OS: Windows 7
submitted by Froggyfrogger to techsupport [link] [comments]

I had like 3 friends ask me how to build a PC in the past week so I made this to help them.

(Reddit Edit: Help my improve the document with productive constructive comments on what I got wrong or messed up! Im only human lol
Also a lot of this is supposed to be kinda humorous. I didn't think I had to say that but, hey, its the internet.
I appreciate the positive and productive comments! )
Beginners basic guide to building your own PC as of early 2018
(EDIT: Sorry for being a MSI/Corsair Fanboy)
Heres a collection of thoughts to consider when building your own personal PC
As always Id personally use PCPartPicker.com to configure your parts and for further thoughts on compatibility.
First off building a computer is 100% based around what you plan to use the computer for.
Here are a few uses and generic ideas of what to go for. Audio Editing: Lots of small tasks that need to be completed quickly without lag. - Fast Processor( >4GHZ) - Fast RAM (MHZ) -At least 16 gigs! - Fast Storage, SSD manditorily - M.2 or PCI for best performance. - Shitty Graphics card, graphics card there only to keep the cpu from doing other tasks when working. - Can be a few generations or years old. - Many screens for lots of plug in windows to be open Video Editing: Lots of large to render and files to read. - Multi core processor the more the merrier - SSD for fast read/write of large video files. - Insane graphics card, AMD graphics cards are debatibly better but the nvidia Quadro series are specific for video rendering. Gaming: No more than 4 cores intense graphics card - 92% of games are not coded for more than 4 cores so why spend the extra money for it. - SSD for quick load screens - Nvidia cards, 10 series, the higher the number the better. Titan cards for MAXIMUM OVERDRIVE! Coding: quick processor for lots of small tasks. Ergonomic peripherials? - Dear god please dont use a mechanical keyboard so that your coworkers dont kill you. Home office: Everything can be a few gens behind so you can get the best power per dollar spent. - Sorry that Gateway doesnt exist anymore. I guess try Dell... 
Parts (Expensive Legos)
CPU (tells things to go places and outputs data) Basically three main routes to go for: Intel, AMD, or ASIC. Intel - Gaming, Data center, Hackintosh Pros: Cooler, Faster speed (GHZ), short small tasks faster Cons: $$$$, less cores AMD - Gaming, Personal Computing, Large task processing Pros: Lots of cores, better price per performance, faster processing of large tasks Cons: Hot chips, large chips?, compatibility issues with MacOS. ASIC - "Application-specific integrated circuit" Pros: Does the task that they are made to do insanely efficently, great for mining. Cons: Literally does nothing else. Holy hell these are expensive, very hot (fans will get loud) CPU Cooler (Im a big fan) Most come with an in box cooler that are ok but please buy aftermarket. In Box - the free shitty cooler that comes with the processor. Pros: Free. Cons: Ugly, makes chip run hot, hard to clean Air cooler - oldest type of cooler but new designs are highly efficent. Pros: Only cooler that has the possibility of being 100% quiet, most likely cheaper Cons: large, if cooler isnt large enough for the chips thermal output the fans will be loud. Liquid - Custom pipes are beautiful, AIO is easy to install and offers similare performance. Pros: Looks cool, great temperatures, "quiet" Cons: Water pump has possibility of being loud, possible spills Phase Change - uses the technology of refridgerators to cool the chip Pros: Can overclock until the chip breaks. (whats colder than cold? ICE COLD!) Cons: Loud (compressor noise), Large pipes, just why.... Motherboard (the convienacnce store of computer parts) Really just about what type of I/O you want. - MAKE SURE FORM FACTOR FITS YOUR CASE! (or vice versa) - Look for PCI lanes for expansion. - How many graphic cards do you have? - PCI based interfaces? - PCI SSD? - PCI DAC? - PCI WIFI? - USbs? Network? Audio? - How many lanes of RAM? - DOES IT FIT YOUR PROCESSOR!?! (really tho) - M.2? - How many sata interaces? Good Brands: MSI, ASUS, Gigabyte Bad Brands: AS(s)Rock, Dell Memory (Dory) - The more the merrier - No less than 8gb for a functional windows machine (16 gb to never have a problem) - Use all the lanes your computer has to offer! the more lanes to access the faster the data can travel! -Imagine drinking a milkshake. If the straw is wider you can drink more of the milkshake than a skinny straw. - Faster MHZ for faster data access but give minimal performance differances - Please get ram with heat spreadders unles youre building a server with high airflow. - Make sure the type (DDR3 or DDR4) of RAM matches what your processomotherboard call for. Good Brands: Corsair, G.Skill, Ballistix Storage (Grandpa that remembers everythign about how things used to be but takes forever to learn a new tasK) Speed or massive storage? slower is cheaper. Golden ratio of speed/storage/price is 250-500 gb SSD and a 1+ tb disk drive. *Max speeds listed are for a single drive not RAID* Hard Disk Drives (HDD) - Cheapest and slowest - read/write speeds of < 0.5gb/s - 7200+ RPM or GTFO - Higher Speed drives can access data faster. - Do not move while powered up. physical parts will break. - Larger Cahche = faster Read/Write Speeds Pros: Cheap, Holds massive amounts of data Cons: Slower than molasses in a frezer Reputible Brands: Seagate, WD Solid State Drives (SSD) - necessity for quick boots and fast load screens (can only be re-written to so many times) - SATA based (2.5 inch)- Read/Write speeds capped @ 6 gb/s Pros: Most economical, form factor fits with old computers, Cons: "Slow" compared to other ssd's (but stil 12 times faster than a HDD) - M.2 based - Read/Write speeds capped @ 10 gb/s Pros: Size of a sick of gum! High End but not too expensive to be out of reach. Cons: Expensive for any size over 500 gb - PCI based - Read/Write speeds capped @ 20 gb/s for PCI3, x4 Pros: HOLY BANDWIDTH BATMAN! Faster than that little creepy ghost thats always in the corner of you eye Cons: You might have to take out a loan to buy one. *takes up a x4 PCI Lane* Reputible Brands: Samsung! Corsair, Plextor, Intel, Kingston, Crucial Video Card (that one kid that has thick glasses and is really good at math) - A regular old PCI card that handles all of the video rendering and output for your computer. - ASIC PCI cards. - The PCBs and chips are patented by two main companies but the differances come from line up and varying manufacturer cooling devices. - The more memory the better -NVIDIA (Team Green) Great for gaming, has specific card series for intensive rendering. Lazy driver updates. - Gaming - 900 series - Cheap - Low performance - Can play any video game made befrore 2010 on max settings - 1000 (ten) series - Expensive (thanks bitcoin miners...) - Great for VR! - Video Rendering -Quadro Series - Gaming and Rendering - Titan X - Maxwell based chip same as 900 series cards - Titan XP - Pascal based chip same as 10 series cards -AMD (Team Red) Underdog does the same thing but slighly worse and cheaper. (except video rendering) - Gaming - RX 400 series - Cheap - Hot - RX 500 series - Cheap - Ok at VR and deacent gaming frame rates. - Not bad but not particularly great either. - Video Rendering - Fire Pro series - Gaming and Rendering - Vega series -Good luck finding one to buy lmao Case (Fancy clothing for your parts!) - Similar to human clothing you want it to do a few main things really well with compromises for each extreme. - Durability - Steel - Incredibly durable - Creates Farady cage for components - Heavy af - Magnets, just magnets.... - Rust over time - Aluminium - Light - East to bend for modding or "physical maintenance" - Less likely to rust - Huzzah for Farady cages! - Plastic - Just dont - no electrical Ground - no faraday cage - Light AF! - Breath (Airflow) - positive internal airflow! - larger fans push the same amount of air with less speed/noise - Looks - Window? - RGB - Cool Paint? - Fit all your parts - graphics card length/ clearacne - support for liquid cooling raiators? - How many spots for HDD/SSDs - Motherboard format - Cable management! Power Supply (FIGHT MILK) - Rule of thumb: BUy Powersupply that outputs 1.5 times the wattage that you need. - You can walk further than you can you can run. - The PSU can casually output 50-75% power for much longer than at 90-100% (without failure) - If you never demand enough wattage for it to get hot the fan doesnt have to turn on therefore making it quieter. - Modular means you can remove/replace the cables from the PSU. Reputible Brands: Corsair, EVGA Optical Drive (motorized cup holder) - You can download most things today so I'd suggest against it unless you really NEED to watch/write DVD's/CD's Operating System (software that makes everything work) Windows (Always Updates) - Compatible with just about everything - Easy to learn to code on! - POS inital browser - Likely to get virus's Linux (Penguins are cute) - Unique - takes less resources to run - Barebones - Incredibly personalizable! - Compatibility issues with just about everything MacOS (Linux but more annoying) - It is legal! - Great for art and your grandma that doenst know how to use computers! - User friendly - Compatibility issues with various hardware - Confusing/Limiting coding structure Peripherials (cables everywhere!) - Keyboard (higer Polling rate is better) - Mechanical (key is pressed at an exact stroke length every time - Mouse (Higher Polling rate is better) - more buttons = better? - DPI (Dots Per Inch) - In theory, if a mouse has 1600 DPI, then, if you move your mouse one inch (2.54 cm), the mouse cursor will move 1600 pixels - Higher DPI the faster your cursor is able to be moved. - Monitor - In theory the human eye cant see faster than 60 frames per second. - Keep in mind Pixel ratio! - 4k screen that is 22inches will have more pixels in a square inch than a 4k screen that is 28 inches. - Interface? - DVI (Analog) - thumbscrews..... - can do two monitors with one port! - support for 4k - VGA (Analog) - thumbscrews... - max resolution is 1440p - Display Port (digital) - nice button clip - supports 4k - HDMI (Digital) - 1.2 or higer supports 4k - DAC/Speakers/Headphones - Dont even get me started - Microphone - Dont get me started PT.2 Other (other) - UPS (uninterruptible power supply) Just a battery that allows your computer to have some time if the power ever goes out so that you have time to save your work. - Cable Organization materials! - Zipties - velcro - LED LIGHTING! - Manditory - Extra/Better fans - More pressure, less woosh - IFIXIT Pro Tech Toolkit - becasue who buys just one torx wrench. - Cute kitten mousepad - Yes, it has to be a cat. Dont argue 
This is a very general entry into building computers and what you should buy/look for. If you have any questions/comments send me an e-mail!
-Zac Holley-
submitted by Zac_Attack13 to pcmasterrace [link] [comments]

Who is your favorite TechTuber and why? Here's my review

Written 9/15/2017

I've been reading a lot more of PCMR lately. I've read the comments of the decline of LinusTechTips. I've seen the difference in his older videos and his new ones. Personally I'm not a huge gamer. Yeah I have a custom built PC and I play some games on it but it was purposely built to be a developer machine. Growing up, I could never afford a gaming PC and I preferred the original series on Nintendo and PlayStation consoles. So when I look for TechTubers, I mainly look for entertainment. Now that's not to say I'd wish LinusTechTips to not bring informative content. I would just feel more included if they targeted towards PCMR careers too. I'll get into suggestions later. Here is my list of favorite TechTubers in priority order as well as pros and cons of them.
1) Linus Tech Tips (LTT)
PRO: Their professional studio/workspace and various staff makes them feel professional. I do enjoy the humor and but the best series they have are the build theme competitions between Luke and Linus and their best series: ScrapYard Wars. I watch them for the humor and the builds. I'll watch 90% of his videos that come out. Uploads a new video every day.
CONS: I don't mind the puns and lame jokes but I can see a difference between scripted/cringe Linus and natural Linus. Every single humor video has dick jokes and innuendos with emphasis. I know that’s his humor but he lays it on thick (THICC) sometimes. I also see him as exclusively a computer TechTuber. When I see cellphone and console stuff, I'll watch it but I see other TechTubers as more of an authority on it. I know that advertisements pay the bill but it feels like it's too much here. With the intro AND OUTRO ads, i feel like videos can be up to 20% advertisement. I may be exaggerating but that's just how I feel.
2) Bitwit/AwesomeSauce Network
PRO: Since he's a smaller TechTuber there is potential of reviewing other stuff (like the powerline Ethernet adapter). Sometimes does collaborations with LTT. Collaborated with LTT in ScrapYard Wars Season 5. I'll watch some of his videos if they are different enough; mostly builds.
CONS: This guy is super cringy. I hate his cringy advertisements and I hated his channel's former name. WifeySauce is probably the worst thing to come out of a person's mouth. Looks like he used to work out of his house. This is not bad but it left an informal and unprofessional feeling. This was what made him different from LTT. However that originality is gone now that he moved into an office space.
3) Paul's Hardware
PRO: More serious than any of the other TechTubers. I think that leads to a level of professionalism and authority. I'll watch him for some his builds. Collaborated with LTT in ScrapYard Wars Season 5.
CONS: He has a boring look and voice to me. It's not his fault. He works out of his house. I know he's a smaller TechTuber but I do like the professional office of LTT. For now, this is an originality point for him. I won’t watch the collaboration/new videos with Bitwit. I know these are computer building YouTube channels, but who has money to build a PC every month? What do these people do with all these builds?
4) JayzTwoCents
PRO: Balance of serious and entertaining. Jokes and facial expressions aren't too cringy. I'll never build a watercooling system but it was fun to learn what it was and how to bend hardline tubes. Collaborated with LTT in ScrapYard Wars Season 5.
CONS: I watch the least amount of videos from him. I won't watch every video he uploads. After watching the other channels, I don't feel I need to watch anything he puts out because I got it all out of my system. Sorry Jay.
Honorable Mention: Carey Holzman
Info: I used to watch his build videos for years before building my second PC a few months ago. He runs his own business as a computer repair technician. His work includes building new computers, diagnosing and removing viruses, replacing components, etc.
PRO: I've seen the video and audio quality of his videos increase over the years as he acquires better and better AV equipment. His videos go from start of a build to the end of the build with close ups and explanations of components. I recommend watching his videos if you are new to building computers.
CONS: I've stopped watching his videos for a few reasons; mainly because I got the gist of things and know how to build PCs now. He talks way too much; sometimes repeating himself numerous times. He'll go on tangents and this slows the build process down to a crawl. His complete videos used to be about an hour long. Now they are going on two hours. He started doing live streaming (probably to get more YouTube revenue) and it's mostly him watching the comment feed and answering questions. As much as I'd see TechTubers do a Q&A, it's very boring to watch especially live. Also he doesn't do AMD builds. He says it’s because his customers don't request AMD builds. I know when businesses sign a contract with big computer suppliers like HP, Dell and Lenovo those companies have contracts to do all their builds with Intel. This leads to business and developers to have all Intel builds (myself included because that’s what I trust for development and virtualization).

additions made 3/25/2018

I watched more TechTubers over the past few months. I've slowed down a lot now and now looking into other YouTube content. Here's how my opinion has changed. In no particular order:
JayzTwoCents
I found myself watching more of him after I heard he was the go to watercooling/hardline tubing guy. I enjoyed his step by step hardline and bending guides. It was educational which made it entertaining. I've seen a few more like his GPU content but I did stop watching for now. Congrats on the new studio.
Paul's Hardware
I haven't watched any more of his content; maybe a video here and there. Maybe I was a little judgmental at first. I still don't know why there needs to be a build of the month segment. Who builds a PC every month? Congrats on the new studio too.
Bitwit/AwesomeSauce Network
I did watch I think one or two gaming competitions he did with his wife. Any mention of Overwatch I'll watch. I didn't watch much else. I still think he's kind of cringey.
Linus Tech Tips (LTT)
I no longer watch every video that comes out just because my interests have changed. I do catch one or two that really interest me. I also did watch a few WAN shows. I never thought I'd find weekly news topics interesting but a few things interesting. I was very excited when they talked about doing a few segments on Bitcoin. I did watch the Mining Adventure videos when they came out and liked them. I now know a little bit more about LTT. They are part entertainment, part informative/educational, and part... something else (idk). They really are the Top Gear of computers. I want them to expand more on the whole Bitcoin thing but really they are there to give an explanation and overview with each topic they cover. Either that or they shove a bunch of RGB parts in a tempered glass case with some innuendos. If they do another Bitcoin video I would like them to cover splitting coins and more in-depth use of popular wallet software. But I think they did their job of grabbing interests from viewers. It's now up to the viewers to seek out more in-depth info on the subject. A big topic now in the community is picking up used video cards that could have been used for mining. I think LTT did do a video comparing a used video card with a new one (or maybe it was dirty vs clean card). I think they should revisit the topic. They should show them buying a few cards from hardcore miners and compare the performance of the card vs a brand new one. I'm in the camp of thought where mining doesn't really put a lot of strain on the card where as long gaming sessions does. I don't have the resources to prove the theory but Tech Tubers do. The experiment is not limited to LTT but any popular Tech Tuber. I know from tweets and his videos that JayzTwoCents is not a fan of miners and the subject but his friend Barnacules Nerdgasm is. Maybe someone will cover the topic eventually.
So that's my review and personal opinion of the Tech Tubers that I watch. All in all they entertained me and I hope they keep up the good work.
submitted by artofdarkness123 to pcmasterrace [link] [comments]

I had like 3 friends ask me how to build a PC in the past week so I made this to help them. Feel free to use or send me an e-mail if you want the txt file

(Reddit Edit: Help my improve the document with productive comments on what I got wrong or messed up! Im only human lol
Also a lot of this is supposed to be kinda humorous. I didn't think I had to say that but, hey, its the internet.
I appreciate the positive and productive comments! )
Beginners basic guide to building your own PC as of early 2018
(EDIT: Sorry for being a MSI/Corsair Fanboy)
Heres a collection of thoughts to consider when building your own personal PC
As always Id personally use PCPartPicker.com to configure your parts and for further thoughts on compatibility.
First off building a computer is 100% based around what you plan to use the computer for.
Here are a few uses and generic ideas of what to go for. Audio Editing: Lots of small tasks that need to be completed quickly without lag. - Fast Processor( >4GHZ) - Fast RAM (MHZ) -At least 16 gigs! - Fast Storage, SSD manditorily - M.2 or PCI for best performance. - Shitty Graphics card, graphics card there only to keep the cpu from doing other tasks when working. - Can be a few generations or years old. - Many screens for lots of plug in windows to be open Video Editing: Lots of large to render and files to read. - Multi core processor the more the merrier - SSD for fast read/write of large video files. - Insane graphics card, AMD graphics cards are debatibly better but the nvidia Quadro series are specific for video rendering. Gaming: No more than 4 cores intense graphics card - 92% of games are not coded for more than 4 cores so why spend the extra money for it. - SSD for quick load screens - Nvidia cards, 10 series, the higher the number the better. Titan cards for MAXIMUM OVERDRIVE! Coding: quick processor for lots of small tasks. Ergonomic peripherials? - Dear god please dont use a mechanical keyboard so that your coworkers dont kill you. Home office: Everything can be a few gens behind so you can get the best power per dollar spent. - Sorry that Gateway doesnt exist anymore. I guess try Dell... 
Parts (Expensive Legos)
CPU (tells things to go places and outputs data) Basically three main routes to go for: Intel, AMD, or ASIC. Intel - Gaming, Data center, Hackintosh Pros: Cooler, Faster speed (GHZ), short small tasks faster Cons: $$$$, less cores AMD - Gaming, Personal Computing, Large task processing Pros: Lots of cores, better price per performance, faster processing of large tasks Cons: Hot chips, large chips?, compatibility issues with MacOS. ASIC - "Application-specific integrated circuit" Pros: Does the task that they are made to do insanely efficently, great for mining. Cons: Literally does nothing else. Holy hell these are expensive, very hot (fans will get loud) CPU Cooler (Im a big fan) Most come with an in box cooler that are ok but please buy aftermarket. In Box - the free shitty cooler that comes with the processor. Pros: Free. Cons: Ugly, makes chip run hot, hard to clean Air cooler - oldest type of cooler but new designs are highly efficent. Pros: Only cooler that has the possibility of being 100% quiet, most likely cheaper Cons: large, if cooler isnt large enough for the chips thermal output the fans will be loud. Liquid - Custom pipes are beautiful, AIO is easy to install and offers similare performance. Pros: Looks cool, great temperatures, "quiet" Cons: Water pump has possibility of being loud, possible spills Phase Change - uses the technology of refridgerators to cool the chip Pros: Can overclock until the chip breaks. (whats colder than cold? ICE COLD!) Cons: Loud (compressor noise), Large pipes, just why.... Motherboard (the convienacnce store of computer parts) Really just about what type of I/O you want. - MAKE SURE FORM FACTOR FITS YOUR CASE! (or vice versa) - Look for PCI lanes for expansion. - How many graphic cards do you have? - PCI based interfaces? - PCI SSD? - PCI DAC? - PCI WIFI? - USbs? Network? Audio? - How many lanes of RAM? - DOES IT FIT YOUR PROCESSOR!?! (really tho) - M.2? - How many sata interaces? Good Brands: MSI, ASUS, Gigabyte Bad Brands: AS(s)Rock, Dell Memory (Dory) - The more the merrier - No less than 8gb for a functional windows machine (16 gb to never have a problem) - Use all the lanes your computer has to offer! the more lanes to access the faster the data can travel! -Imagine drinking a milkshake. If the straw is wider you can drink more of the milkshake than a skinny straw. - Faster MHZ for faster data access but give minimal performance differances - Please get ram with heat spreadders unles youre building a server with high airflow. - Make sure the type (DDR3 or DDR4) of RAM matches what your processomotherboard call for. Good Brands: Corsair, G.Skill, Ballistix Storage (Grandpa that remembers everythign about how things used to be but takes forever to learn a new tasK) Speed or massive storage? slower is cheaper. Golden ratio of speed/storage/price is 250-500 gb SSD and a 1+ tb disk drive. *Max speeds listed are for a single drive not RAID* Hard Disk Drives (HDD) - Cheapest and slowest - read/write speeds of < 0.5gb/s - 7200+ RPM or GTFO - Higher Speed drives can access data faster. - Do not move while powered up. physical parts will break. - Larger Cahche = faster Read/Write Speeds Pros: Cheap, Holds massive amounts of data Cons: Slower than molasses in a frezer Reputible Brands: Seagate, WD Solid State Drives (SSD) - necessity for quick boots and fast load screens (can only be re-written to so many times) - SATA based (2.5 inch)- Read/Write speeds capped @ 6 gb/s Pros: Most economical, form factor fits with old computers, Cons: "Slow" compared to other ssd's (but stil 12 times faster than a HDD) - M.2 based - Read/Write speeds capped @ 10 gb/s Pros: Size of a sick of gum! High End but not too expensive to be out of reach. Cons: Expensive for any size over 500 gb - PCI based - Read/Write speeds capped @ 20 gb/s for PCI3, x4 Pros: HOLY BANDWIDTH BATMAN! Faster than that little creepy ghost thats always in the corner of you eye Cons: You might have to take out a loan to buy one. *takes up a x4 PCI Lane* Reputible Brands: Samsung! Corsair, Plextor, Intel, Kingston, Crucial Video Card (that one kid that has thick glasses and is really good at math) - A regular old PCI card that handles all of the video rendering and output for your computer. - ASIC PCI cards. - The PCBs and chips are patented by two main companies but the differances come from line up and varying manufacturer cooling devices. - The more memory the better -NVIDIA (Team Green) Great for gaming, has specific card series for intensive rendering. Lazy driver updates. - Gaming - 900 series - Cheap - Low performance - Can play any video game made befrore 2010 on max settings - 1000 (ten) series - Expensive (thanks bitcoin miners...) - Great for VR! - Video Rendering -Quadro Series - Gaming and Rendering - Titan X - Maxwell based chip same as 900 series cards - Titan XP - Pascal based chip same as 10 series cards -AMD (Team Red) Underdog does the same thing but slighly worse and cheaper. (except video rendering) - Gaming - RX 400 series - Cheap - Hot - RX 500 series - Cheap - Ok at VR and deacent gaming frame rates. - Not bad but not particularly great either. - Video Rendering - Fire Pro series - Gaming and Rendering - Vega series -Good luck finding one to buy lmao Case (Fancy clothing for your parts!) - Similar to human clothing you want it to do a few main things really well with compromises for each extreme. - Durability - Steel - Incredibly durable - Creates Farady cage for components - Heavy af - Magnets, just magnets.... - Rust over time - Aluminium - Light - East to bend for modding or "physical maintenance" - Less likely to rust - Huzzah for Farady cages! - Plastic - Just dont - no electrical Ground - no faraday cage - Light AF! - Breath (Airflow) - positive internal airflow! - larger fans push the same amount of air with less speed/noise - Looks - Window? - RGB - Cool Paint? - Fit all your parts - graphics card length/ clearacne - support for liquid cooling raiators? - How many spots for HDD/SSDs - Motherboard format - Cable management! Power Supply (FIGHT MILK) - Rule of thumb: BUy Powersupply that outputs 1.5 times the wattage that you need. - You can walk further than you can you can run. - The PSU can casually output 50-75% power for much longer than at 90-100% (without failure) - If you never demand enough wattage for it to get hot the fan doesnt have to turn on therefore making it quieter. - Modular means you can remove/replace the cables from the PSU. Reputible Brands: Corsair, EVGA Optical Drive (motorized cup holder) - You can download most things today so I'd suggest against it unless you really NEED to watch/write DVD's/CD's Operating System (software that makes everything work) Windows (Always Updates) - Compatible with just about everything - Easy to learn to code on! - POS inital browser - Likely to get virus's Linux (Penguins are cute) - Unique - takes less resources to run - Barebones - Incredibly personalizable! - Compatibility issues with just about everything MacOS (Linux but more annoying) - It is legal! - Great for art and your grandma that doenst know how to use computers! - User friendly - Compatibility issues with various hardware - Confusing/Limiting coding structure Peripherials (cables everywhere!) - Keyboard (higer Polling rate is better) - Mechanical (key is pressed at an exact stroke length every time - Mouse (Higher Polling rate is better) - more buttons = better? - DPI (Dots Per Inch) - In theory, if a mouse has 1600 DPI, then, if you move your mouse one inch (2.54 cm), the mouse cursor will move 1600 pixels - Higher DPI the faster your cursor is able to be moved. - Monitor - In theory the human eye cant see faster than 60 frames per second. - Keep in mind Pixel ratio! - 4k screen that is 22inches will have more pixels in a square inch than a 4k screen that is 28 inches. - Interface? - DVI (Analog) - thumbscrews..... - can do two monitors with one port! - support for 4k - VGA (Analog) - thumbscrews... - max resolution is 1440p - Display Port (digital) - nice button clip - supports 4k - HDMI (Digital) - 1.2 or higer supports 4k - DAC/Speakers/Headphones - Dont even get me started - Microphone - Dont get me started PT.2 Other (other) - UPS (uninterruptible power supply) Just a battery that allows your computer to have some time if the power ever goes out so that you have time to save your work. - Cable Organization materials! - Zipties - velcro - LED LIGHTING! - Manditory - Extra/Better fans - More pressure, less woosh - IFIXIT Pro Tech Toolkit - becasue who buys just one torx wrench. - Cute kitten mousepad - Yes, it has to be a cat. Dont argue 
This is a very general entry into building computers and what you should buy/look for. If you have any questions/comments send me an e-mail!
-Zac Holley-
submitted by Zac_Attack13 to buildapc [link] [comments]

I think there's a bitcoin miner on my PC.

Hi Guys.
I was just trying to make some space on my PC for Fallout 4. I ran WinDirStat to determine what applications were taking up the most space on my PC, when low and behold I find about 15GB of files stored in the folder /AppData/Local/ethash.
Looking up ethash online, and the only thing that comes up is a bitcoin mining library. Further investigation revealed another folder AppData/Roaming/eth that seems to contain libraries and executables for the miner.
Now, I've run both malwarebytes and Avira scans on my PC but both report no issues. I'm just wondering what to do next.
I can delete both folders but if my PC is infected they will probably just get reinstalled. My larger worry is that neither of my antivirus/malware solutions detected the issue. I cannot even identify the trojan to search for a specific virus removal tool. Has anyone any advice?
Thanks in advance for any response...
Edit - OK, finally got it using Kaspersky Virus Removal Tool. I am however quite suprised that both Avira and Malwarebytes missed it. Might be time to reconsider the security software I use.
Thanks for your help...
submitted by DecentCriminal to techsupport [link] [comments]

What are the miner-viruses, and how to eliminate them?

What are the miner-viruses, and how to eliminate them?
What are the miner-viruses, and how to eliminate them?
https://preview.redd.it/iqx1b35979o11.jpg?width=1200&format=pjpg&auto=webp&s=125ad1cbadca63456a83e2dcd29b368b01e94489
In addition to the usual viruses that infect computers and steal information, new type, miner viruses, have appeared. Their task is to obtain crypto coins for their owner using the victim's PC processor. And the user can never know about it. The viruses are designed in such a way as not to disturb the system while the person is working with the PC and simultaneously extract coins for a hacker.
Miner-viruses have already infected a huge number of PCs around the world. Most often, they attack computers of banks, and research centers, as there are many powerful PCs that function without interruptions. There are two types of viruses that deal with crypto-currency mining. The first one is browser-based. They function when the browser is open and represent the scripts prescribed in the codes of web pages. The second is desktop. They operate when the PC is connected to the network. The virus code hides in the system folder and works when the system is connected to the Internet.
Browser miners are not so dangerous, as their code does not remain on the PC, but still the system undergoes an overload, although it is not so strong. At the moment, several families of such viruses are defined: CPU Miner, VnIgp Miner, Bad Miner, Bitcoin Miner. Each of them has its own functionality and they act differently on the processor. The most aggressive in this regard are the last two viruses. They are able to use more than ninety per cent of the power of the system for mining the crypto coins. And hackers constantly develop advanced types of viruses, which are hidden from antivirus programs.
What should be done to avoid becoming a victim of miner-viruses? It is necessary to conduct a full computer diagnostics with the help of an antivirus. If this is not possible, then you should contact the service center where you can remove it. You can try another method, when you restart the PC, press F8.
When the BIOS appears, select the safe mode, after this make a full diagnosis of the system folders and eliminate software that is suspicious in terms of antivirus. After that, restart the PC and make a system check by running the HD movie and check how the fan works. If nothing has helped, then you need to contact the service center to professionals, they will help to remove the miner from the system.
submitted by iTradeBit to u/iTradeBit [link] [comments]

Transcript of George Webb Video Series Part 308 "Hillary's Leakers, Hackers, and Henchmen" [@Georgwebb / #HRCRatline]

  • {{ 911: NOTE: I'm going to give up on transcribing videos so carefully with back and forth with Taskforce. She's too low volume to get autotranscriptions and also too difficult to understand in some cases, and both of you talk very quickly so I can't type it up, sorry. I just can't do it. You produce too much time of video. I might just pick out unique entities and list them in these long live videos, since that's what we're after }}
  • Day 175.1 Cohen-Pinchuk Raid Just Gives Up More Clinton Oligarchs - YouTube
    • It's day 175
    • And Daily Caller gets credit for being the first alternative media site to be first out with a real reason for the raid on Trump's lawyer's office Michael Cohen's office
    • And that is to try to dig up dirt on Trump
    • This is the hundred and fifty thousand dollar donation to Trump's charity
    • And of course it ignores the millions of this Ukrainian oligarch's contributions to the Clinton Foundation, which is the same MO that we've seen over and over:
    • Accuse someone else of what you did only make sure that there is at least some shred of evidence {{ Party of Projection }}
    • And this is going to be the key from here on in
    • And thank God Bob Mueller keeps exposing Hillary's Ukrainians and Hillary's Russians
    • And Bob Mueller is actually doing a good job of not only exposing Hillary's Russians and Hillary's oligarchs and Ukrainian oligarchs, but also they're hacking teams, and also [exposing] the MO of using hacking teams to steal money for these oligarchs
    • So this is the gift that keeps on giving with Mueller
    • Now, admittedly he's doing it by accident
    • But in no way do we want to stop Bob Mueller from doing what he's doing
    • Now, there's other folks that said isn't this CrowdStrike really covering their hacking teams?
    • Crowdstrikes hacking teams are called the "Bears"
    • There's different hacking teams usually in teams of 12
    • The Cozy Bears [are] maybe the Awans
    • The Fancy Bears maybe Suschin
    • And there's about six hacking teams at that Trump just threw out of the country is
    • Were they the hacking teams of these millionaires?
    • Is Trump gonna go after all the millionaires and all the millionaires hacking teams?
    • We don't really know that yet
    • But what I did was I put together a quick playlist for all these different entities
    • So that people could get up to speed on who these different entities and aking teams are
    • Or just do a quick refresher
    • So if you don't remember Victor Pinchuk
    • And the Brooklyn Nets etc there's a quick playlist there if you don't remember CrowdStrike and they're role in the DNC
    • And their role really through this the last almost well let's see 20 years either as a corporation or as a loose confederation in cabal inside the FBI, then you have that
    • And then of course Deripaska will add other ones as they come along
    • Friedman certainly will come along
    • Pinchuk will certainly come along etc as well as
    • Now, we also can kind of do threads of playlists through all the different videos we've done with the NGA and different departments
    • And Deep State actors that the that these players that this kind of McCabe Brennan cabal used to destroy people, either through surveillance or what have you
    • And I've created playlists for them
    • Of course there's an Epstein playlist
    • PDD-62 is this idea of using surveillance to crush people
    • So there I created a playlist there
    • EB-5 is the way of getting resources into the country, to man your surveillance etc
    • And then you can go all the way down here to even Uranium One etc
    • To understand how machinations of these criminal actors go
    • And finally I would say there's some ugly attacks yesterday from other YouTube channels as well as other folks that potentially are related to me
    • And all I would say there is did we expect any different?
    • Do we expect that these these conspirators, this Brennan McCabe cabal wouldn't have actors and a voice
    • And actress to act out what they've actually already said in private
    • That they've already said it in in writing to destroy the careers of FBI agents...
    • The ugly attack against Robyn Gritz yesterday was really nothing more than giving voice and action towhat McCabe has already done to Robyn Gritz administratively
    • So it is ugly as it was at least we all saw it for the ugliness that it was
    • And it really was almost a complete recapitulation of Andrew McCabe's actions toward Robyn Gritz
  • Day 175.2 Atlantic Council - What Can Our Crowdstrike Bears Hack For You Today? - YouTube
    • It's day 175
    • And this is part two
    • And a lot of people say Oh George you're trying to be this white knight--rushing to every damsel in distress that needs help
    • Robyn Grit and others--all the female reporters in in Turkey
    • And Syria with Serena Shim, and Shiba Gardi and Vanessa Beeley--Eva Bartlet etc
    • well I'm going to be fair
    • And even-handed today to talk about Irina Chalupa one of the key conspirators she's a woman from the Ukraine, or the key conspirators in the Trump Russia narrative
    • Her sister--if it really is her sister--Alexander Chalupa who is a operative for the DNC
    • She's the one who keeps dropping the Chalupas in Obama's lap
    • Saying oh by the way Mr. president were full flight into and surveillance campaign
    • Do you want us to go public with it and leak it to the press, or do you want to sign off on it?
    • And so your choice is basically a John Brennan embarrasses your administration with yet another leak or you can go ahead and sign this paper here on August 29 2016 Mr. president
    • This has been Brennan and a Clapper and Hayden used these women over and over
    • Again, to do their dirty work they hide behind them
    • They're cowards of course, so they make the women be the brave ones
    • Here's Evelyn Farkas
    • Again, yet another apparatchik among us in the State Department
    • And Department of Defense that wants Trump investigated
    • She was the foremost fixer if you will in Ukraine
    • And these folks all know each other well from the Atlantic Council
    • So here she is Evelyn Farkas she may have remember herself uh outing herself on MSNBC saying hey I'm one of the key conspirators in the Russia-Trump hoax
    • So you keep going here Susan Samantha Power
    • Of course Cass Sunstein sends her in
    • The 260 different on maskings in a breathtakingly short period of time: two months
    • Evelyn Farkas was the one who said let's get as much as we can, dirt as we can, as fast as we can, let's collect it all
    • So rou literally everyone wearing wingtips in Washington got in in New York anybody, associated with Trump, or Trump's babysitter's: were all tapped
    • This is going to be the most embarrassing of that in our country's history
    • It's going to make water well in the words of calls from this is 30 water gates I think it's more
    • But FBI director Kallstrom may it hit it on the head this is 30 watergates
    • But what I like to do is drill down, and say what unites all these folks?
    • Where do they all meet?
    • They all meet in Washington DC over 15 on 15th Street not far off Pennsylvania Avenue at a place called the Atlantic Council
    • And the International Advisory Group to the Atlantic Council is where I always go when I want to get the dirt
    • Here's Viktor Pinchuk here he is making oil deals he was a member of the Ukrainian Parliament
    • But he's a always giving bribes $100,000 bribe $250,000 bribes
    • And it's rinsed through the Atlantic Council
    • Now, Rupert Murdoch's office is oh it's also on that council
    • And also on that Advisory Board
    • His office just got raided
    • Is that why they raided?
    • It is it really CrowdStrike trying to clean up the mess it's a really crowd strike trying to strike the crowd yet again?
    • Here's Ernie Moniz for us to part of energy some people call him earnest money money Tom onna ties
    • I think Eric Shinseki of VA a lot of folks go into the Democratic positions
    • Here of courses Hagel going into deep DoD Greenberg
    • I'm sure that's a person that's related to Mr. Greenberg of are good friends of microloan Fame down in Asia
    • So if you go through here it's just really
    • Here's Edelman the PR firm that kind of destroys different groups with it's sort of a Fusion GPS a domestic Fusion GPS
    • I think the pipelines was the last time they really got involved
    • But basically these groups are adept at destroying opposition political opposition, destroying people, much as Fusion GPS does all over the world
    • And of course here you've got general Clapper on this board
    • Now, you're gonna have a lot of influence George Soros
    • And all the other SEIU Beetles
    • And of course Carl Bildt
    • Here's our Carl Bildt organizing the invasion sort of a MAVNI for Europe sort of bringing in all these operatives these trained Military Intelligence operatives gangs if you will or trained trained Gladio teams into Europe
    • So there's Carl Bildt
    • Everything that you would want on one on one team to put it all together
    • This is the list of people buying pay-to-play overseas from the US State Department
    • And of course it wouldn't be complete without Madeleine Albright
    • And her shadow Secretary of State which is Hillary Clinton
  • Day 175.3. Task Force Sources McCabe Home in Chappaqua Four Months Before MSM - YouTube
    • The orientation is locked
    • So you'll have to see more of me
    • And less of Chicago good morning Chicago
    • So obviously we're downtown
    • And we had some big successes this morning
    • Task Force has a right to claim big success
    • The Thomas Paine article is out
    • (Rahm? Rahm? It looked like Rahm my hip we have the nurse's outfit on again.)
    • (I do have the Bitcoin we're gonna go down to Daley Plaza we're gonna try to get him to Bitcoin I sure hope he's there)
    • So Thomas Paine is out with a big story today about the two decades well actually a three decade relationship between Hillary Clinton and McCabe
    • But this one is--oh by the way look at my look at my t-shirt "spy ring in Congress"
    • This is made by Bernie Bridges
    • And Bernie Bridges told me this morning she's taking all proceeds of anything that she sells and donating it to someone you know and love
    • So anyway hey everybody
    • So if you haven't heard the big news today, the story of that Task Force did and we did
    • But Task Force found it
    • I did a story December 2nd 2017 about Andrew McCabe living right down the street from Hillary Clinton
    • I published photographs
    • I said I don't think Andy actually lived there much
    • I think was the spy house it was the hacking house to defraud HEY
    • Defraud or scare the living bejesus out of different people in New York
    • Threaten them with SEC action in order to take their businesses away from them
    • Or they could use soft power
    • Soft power is getting Hillary Clinton a campaign contribution
    • This is for Senate!
    • This is for Senate
    • 1998
    • The house was in Chappaqua in 1998 you can read Thomas Paine's article about that four months later now
    • Now, it has come to his fact-checking network of FBI folks
    • And X FBI folks there's a network folks
    • Like I said way back when there's a network, and it's real
    • And now, when people see this corruption for what it really is that this has been
    • And again, Thomas Paine said three decades
    • If you go back three decades I still say Andy was the one who went into the evidence cage for the going all the way back 1996
    • I want to say for the Oklahoma City bombing investigation
    • I believe the current ODNI chief is Dan Coates
    • I believe he was the running now
    • The Congressional committees on that they had reprisals against Dan Coates
    • But you're gonna find Andy was a guy who went into the evidence cage
    • I'm gotta say 1997 there was a there was an FBI whistleblower at the time
    • And I can't remember his name
    • But I printed several times when I do if you go to my PDD 62 playlist it's in there I list all the whistleblowers over
    • And over when I list the PDD 62 documentation
    • So if you want to go there you can find it I'm gonna do a lot more playlists because there are there are
    • So many gems like this which just totally blow up the narrative
    • And I'm talking about taking down the whole narrative, with just one fact
    • Hey they've known each other and been neighbors for two decades
    • Jill McCabe as well living right there
    • And Andy didn't disclose it
    • And he did not disclose right James Comey put out you got to get it now, because it is going to get taken down from from Twitter
    • The one ninety know this isn't the one ninety these aren't the one hundred ninety whistleblowers
    • This is the this is Andy McCabe buying a home in Chappaqua just down the street
    • It's got all kinds of cables running out of it
    • I said this this is hacking team hacking team hacking team
    • Was that where the Awans started? We don't know
    • WWas that where Suschin and the fancy bear started?
    • We don't know, but we now know that I told four new viewers they probably don't remember me talking about when I worked at McAfee
    • Or we were taking we were a company taken over by McAfee--Network General I worked there in 1999
    • And there was a hacking team of 12
    • Russians from Moscow
    • They worked in the weapons they worked in cyber weapons in Moscow
    • Now, I've talked about this a lot
    • People have forgotten it
    • But go back I'll have to do I have a CrowdStrike playlist--you can watch kind of going back all the way
    • But I said these guys are they're making viruses! in order to sell antivirus software, at the end of every quarter!
    • It was a criminal activity
    • Bill Larson was a CEO
    • Bill I'm calling you out as a criminal!
    • I reported a channel stuffing at the end of quarter
    • I got nice I got set up real nice for that
    • That's 1999 that was the first team of 12
    • Now, I don't know if there was teams of 12 before that or teams of 12 after that well there obviously was a lot of teams of 12 after that
    • Trump just kicked six teams of 12 out
    • But getting back to the McCabe we don't know if the hacking team was there I don't think it was a nice enough house to be honest with you--you got to talk really loud though because that the bus is that I know I mean Chappaqua is a very small community
    • And I know it's in a community of like 1,400
    • And it's something like you have to look at true pundit's article this ago 1,400 kind of elite community a mile from Hillary Clinton's house her house is probably very nice I'm assuming
    • So I don't know I know he's sold or resold
    • And refinancet it also in 2013 I have those documents and
    • So there I don't know the condition of that house or its value
    • I know what he sold and resold it for
    • I don't know what that money from 1998 to 2013 what happened during that time
    • G: the timing to me makes sense to having a hacking team house like at Awan type house for the run-up to Senate
    • And of course going up against Joe John F Kennedy John F Kennedy jr. right that's why she they move to chat they John house in Chappaqua to specifically establish residency what you have to have to run for Senate
    • She was the first lady John F Kennedy jr. was running as that New York Senator
    • And they bought a house in Chappaqua to run against him
    • And prevent him from winning that seat
    • And then that's when his plane somehow fell from the sky
    • G: right right
    • And the reason why he sold it in 2011 to a Burgess to its 2013 to purchase to a Burgess removed from the database well it's that's alright it's it's still out there the story is still out there Peter purchase
    • But it mister NBC CBS or whatever
    • And he's--NOC buddies right I don't want to say any did the we had anything to do with--JFK jr. by the way I don't want to say that I just said few Task Force just talking about timing
    • But what we do know is
    • And I'm sorry about the portrait here I wanted the landscape
    • So you can see Chicago not well I guess you get to see spy ring in Congress
    • But the patterns the patterns the modus operandi is what's important here the hacking teams of 12 the safe houses
    • The thousands of wires running out
    • The removable hard drives the thumb drives
    • All this stuff was was worked out in the Senate campaign way before they ever got to Washington
    • Then they sell the house after Hillary's in the Senate twice for the run up for the presidency
    • She doesn't want to run for Senate
    • Again, she wants to be president
    • So they sell the house in 2013 to Burgess
    • And cash out--and some NOC fund, some CIA NOC fund caches Burgess out
    • And then they come to Washington
    • So it that's a big story today
    • And that's a huge story
    • And we got to do more playlists that pick up a lot more of Jenny's stuff a lot more Taskforce stuff--the problem is is I got used to introducing you by your fake name to different people and
    • Now, I got
    • Now, I've got the bug
    • Now, I got the other fake name
    • So there you go
    • So anyway there's lots of stuff
    • So we're gonna have to go through
    • And we did the Deripaska I did the Deripaska that's the derringer coming out of the pasta
    • We all these guys all these guys go back to Prokhorov
    • Pinchuk
    • Deripaska
    • The original 12 Andy Andy comrades running Kompromat all go together
    • So Prokhorov was the guy who was going to launder the money through the sports teams
    • Pinchuk was the more the oil energy kind of guy
    • They did minerals through Deripaska through ???
    • They had they had a funnel for all the drug for weapons business they had
    • And their selling of the secrets they had funnels for all the different ones all the different Russians represented different money laundering funnels
    • Do you want to add to that?
    • TF: I just want to give a shout-out to Thomas Paine
    • And True Pundit because it's amazing article people should try to find in read
    • And we will read retweeted out he's just that Thomas Paine
    • And true
    • But it is great great investigative work
    • And people really need to follow that
    • So yeah that is a good shot
    • And he did say something about the attorneys
    • I mean the Inspector General living in that neighborhood
    • And I didn't think Horowitz lived in that neighborhood
    • The Inspector General has ER Doc's so
    • Now, how does the Inspector General leave this out Comey sent out a blanket email to all the FBI saying there's no conflict of interest here in McCabes
    • And know how to Clinton's right no conflict of interest oh well I forgot to mention my kid mows their yard
    • And we're we're close enough to--borrow cups of sugar from each other, you what I'm talking about sugar--
    • And Jill McCabe's a doctor there I don't know she brings sugar to the party
    • I'm not saying she seems like a very nice woman
    • She seems like a very nice woman caught in a horrible horrible thing
    • And Hillary it's always the same thing
    • Hillary always takes it to the next level there are no limits for Hillary
    • McCain stopped at dirty weapons
    • Comey stopped at dirty weapons
    • Hillary does not stop at anything to win she does not stop at anything
    • So we're gonna go down we're gonna try to get Rahm
    • And we'll talk about the network of people she built in the United States with the help of Andy to sell to get this Bitcoin
    • We'll talk about that in a little bit--that's gonna come out
    • But for right now, we got to get Rahm his Bitcoin we'll see you a little bit
  • Day 175.4. Rahm-Com - YouTube
    • Orientation is locked again, oh well
    • well here we are sorry about the portrait orientation
    • We've got the Picasso oh there you can obviously see that they made modifications to the back part of it
    • They've spring-loaded all the wiring
    • And they've made the law advance started up here now,
    • And I'm here with Task Force the band everyone asked what the heck did he get all that Bitcoin?
    • Well if you kind of line all this stuff up
    • 1998 late 98 when the house is bought, when Andy McKay buys the Chappaqua house right right
    • And I'll try to get more of Rahm in here and less of a spy ring in Congress is when all this stuff happens
    • You have a hacking team that goes into Chappaqua to extort money which we will be coming out and talking about
    • But it's the group out in the Long Island house for the SEC
    • I was in New York for a couple of years
    • And we had I had a building I was in a building where the SEC enforcement division was just out of coincidence
    • And there so we had a hacking team of 12 up there
    • Then we had a happy team go into Congress right about the same time right
    • we had Rahm Emanuel go into Congress in 1999
    • We had Anthony Weiner going to Congress in 1999
    • And it kind of became the foundation of this let's just call it the "Bitcoin kids"
    • The Bitcoin kids
    • This is before Bitcoin
    • But I'm just saying a lot of times when you get money from illegal operations beyond the dark weapons beyond even things that have the color-of-law, you need to hide it in into things like Bitcoin
    • So I'm gonna just set the stage here for for why things happen the way they did
    • Hillary moves to the Senate in 2002
    • TF: right well after Bill and Hillary leaving the White House
    • Number one Rahm Emanuel was part of Bill Clinton's White House
    • So people need to remember that way back
    • As was Podesta--they were both inside the White House very close very close and
    • So Hillary then decides to she's going to run for Senator, simultaneously as she's leaving as first lady
    • So she needs to establish residency in order to represent, you have to establish residency
    • So they buy the house in Chappaqua we're in the same year were ending McCabe is first located in Chappaqua at a house down the road
    • JFK jr. was running in that Senate position
    • And that New York's in a position Hillary decides to buy house now, and she would have to explain the reasons why she chose there
    • But she chose there to run in that district to run against JFK jr.
    • We all know what happened I don't know I'm not getting into all that
    • But we all know what happened to JFK jr.
    • And in that election, when JFK jr. unfortunately passed away, Hillary Clinton won that Senate seat
    • And became on the Senate Armed Services right out of the White House
    • Now, do you think the Chappaqua house could have been a reminder of like Chappaquiddick, because they do sound so similar
    • Like, remember what happened your brother at Chappaquiddick?
    • John-John, right you might want to sit this one out?
    • I mean maybe there's a little bit of a--a little bit of a WINK threat there shuttle going on subtlety's?
    • Well we do know that we did a story about this December 2nd 2017
    • And there was a fire at the Chappaqua house, right?
    • About a day or two later
    • I remember at the Hillary's chef Hillary's Chappaqua house
    • We did the story of December 2nd and that which is breaking big now
    • And there was a fire right at her house right maybe a day later yeah maybe a day later
    • So you could check the records for when there was a fire at the Chappaqua house
    • Now, it just so happens I when I went to Chappaqua with a thumb drive, this is gonna start getting more relevant
    • I hope we weren't on camera that whole time?
  • Day 175.5. Chicago RiverWalk Live With Task Force - YouTube
    • {{ RAW transcript only with autoreplacements }}
    • You're not familiar with Chicago you've kind of got the bridges in a little bit higher level
    • And then just on the other side of this wall here is where Bernie Bridges works with all of our homeless quite a bit of homeless just right here on the other side Bernie Bridges is out on her bridge on the Kennedy today talking about working with the spy ring in Congress
    • So we've got that a spy ringin Congress shirt Bernie Bridges will sell you a spy ring in Congress shirt if you want to inspire a in Congress shirt Bernie Bridges is your girl
    • So here we are with Task Force I know it's gonna be a little bit windy down here by the river
    • But it's worth it if you're over here Task Force I think we're good
    • And then you can speak right into the microphone here
    • So let's just go through a couple of the well first of all congratulations on your success today today I know how it feels to be well I don't be humble I know how it feels to be in the middle of a story
    • And then when this story goes big this happen with me with a hard drives I think you're having your hard drives moment--where you go for 200 days people don't believe you don't believe you from for you as a little bit shorter is about four months
    • But then vindication came today when people did discover that Andy did have a house of Chapel right yeah I think--just doing putting all the research in there's a lot of documents
    • And stuff that you're trying to weed out
    • And figure out what's most important
    • And you stumble upon something like that
    • And you tried it I be I've tweeted it I sent it I to about a thousand different people how many people I sent it directly into people inside Washington people don't believe it could be possible
    • And then when it breaks something big it's like just it works--in the ends the research pays off
    • And the most important part is the truth that's what we're all about
    • So
    • And she's very humble about it
    • And doesn't want it wants the credit Thomas Paine really for verification because it's really those FBI agents that have retired that want the best for the FBI that really do kind of make the story because they verify it they sure that the truth is going out there
    • And it kind of as that final fact check not not from just--regular people who--who are suppressed kids who want to get to the next self-congratulatory oh by the way we're right under Trump Tower here not just those kids
    • But real real Intelligence service professionals who can say yes this is exactly what happened
    • And this is I mean they're trying to bury it already right they're trying to bury the story already things like that you know
    • Again, I just I give a shout out to Thomas paper being up there
    • But also to Robyn Gritz
    • And him
    • Again, I'm gonna mention her name she's the one that stood has stood up against the ending McCabe we have a spokesman out there I hate spokesman yeah seems like fund me
    • And support her
    • And in her battle as she she's taking on the system Thomas Paine's another guy that's been a part of that
    • And I wanted to say about Robin I mean she's not gonna be like oh I'm gonna go away she's gonna be a part of the solution--she's gonna
    • And I don't want to say too much more on that
    • So let's go to the bombing most people don't know we are have a raging bombing campaign right
    • Now, they think there's Trump sitting on his hands right well there were Navy Navy fighter jets whatever sins
    • And they bombed a bunch of what was originally called Taliban synthetic labs which is basically where you're--taking the opiates
    • And processing them in those areas
    • And then it's kind of come out more honest is this Western Afghanistan or Eastern
    • I'm not exact locations
    • But it's coming out--more
    • And more really running those labs
    • And where is that stuff coming from it it's Catholics in action right the damn Catholics
    • Again, are running these drug labs in Pakistan would create a lab wait I think it's the I think it's the cars International League right cars Internet Inc has got I did not realize they had the resources to create labs--that's quite amazing so
    • Now, do you think Trump will just keep the bombing campaign going while he's kind of keeping the world in suspense that's about what he's gonna do on the other yeah I don't I don't know I think that was--trunks one of his main things was opiate the opiate--the problem in here in this country
    • And this is a big big big part of the story that people don't understand of how the opiates where they're coming from how its being synthesized in different labs
    • And where that's occurring
    • And why he's moms might be dropping on the labs to stop the opiates from coming in
    • And killing American people
    • And that's been
    • And that's been really covered up I mean we really haven't had a lot of coverage on that to be honest you really have to dig there are some like Navy Times
    • And people I mean it's hard to send kids--up in in to war
    • And the moms are all like I don't know
    • And them grandmothers
    • And the dads
    • And the brothers
    • And everything it's hard not to be honest--this gonna show up there's a lot of satellites up there you're gonna see the bombing and
    • So anyway I'm just seeing that comments for the first time they're close enough
    • So yeah well we'll try to get the comments as we go
    • So a couple other stories what do you want to cover a couple of other stories that seem to come to mind the only other thing I would say is that we didn't we try to cover earlier we got to we didn't get a chance to win load about the soldier we were out in daily square
    • And yeah
    • And a soldier who has served his country in Afghanistan just to hear on a patriot who has followed George from the first days came up
    • And said hey scrunchie recognized George
    • And we got a chance to shake his hand or he knew you to though you knew Task Force yeah I knew
    • So yeah
    • So it was a great chance to meet him
    • And he asked him what we could do better what would be most helpful
    • And he said you need to have a Chicago whistle doe whistle blower Sunday like you do in DC because they're supporters they want to talk so
    • Now, I am just quite shocked that we have not had a ROM siren or ambulance a lot of people are calling it the Romulans we have not had a Romulans since we've been down here
    • Now, roms got to get out of the city at some point doesn't he I mean he's you think it'll be my fire truck--with that booster seat or do you think it'll be a rambling
    • So Romulus probably gonna be lots of diversions right you might have a Romulus going one way with a fire truck
    • And a booster seat going another way and--all different diversions
    • So no one can really follow that yeah rom worked pretty close to state
    • And lake
    • So if you want to try to get the Bitcoin we survive we're still are
    • Now, we
    • Now, we hear Mark Zuckerberg may be delivering a lot of Bitcoin
    • But in hand delivering a lot of Bitcoin in Congress today what is your take on you watch a little bit of the testimony what should I watch the testimony mostly yesterday that on the senate
    • And my take was first of all that when they did it's the statistics of how many of the people questioning mark zuckerberg had actually taken cash for more exact reverse our Facebook's company it's a little hard to question
    • And fire off appropriate questions
    • And you can look at Thomas Paine's article on that
    • And fire off tough questions about what's happening with data in the selling off of data when you're actually taking money from the company yeah I think it was like 30 or 40 Senators had taken
    • And almost all that sherry had taken money from him
    • And a like big chunk some money like half a million dollar chunks right before he goes on to the Senate testimony as like they're not even separating pay-to-play with the conjunction to just pay play pay play--it's almost like one word
    • Now, in Washington
    • But I'm kind of glad I'm out of Washington to be honest with you yeah it's actually wonderful to be out here with the people that this is these are the great people great American patriots whether they're veterans or bernie bridges or just--people that are trying to do what's right by our country
    • And get it back to the rule of law
    • And ethics
    • And morality at all
    • Now, now the big news is we knocked out we knocked Paul Ryan of the he's retiring I think he knows the Racine story's coming we're still gonna do the Racine story Paul because we get it's not it's bigger than you
    • But Paul nellen
    • Now, becomes the front-runner in that race s
    • So I think our time in Milwaukee was well spent what are your thoughts on on Paul Ryan yeah well I think it's a little it's probably shocking everyone that he's deciding to resign not shocking to me
    • So are you ready to drop your connections between Paul Ryan
    • And Andy McCabe yet or no no I think we're gonna go to Racine
    • And we're gonna do some investigating there information that we have that may be the ghost signal to start sending right ramya lenses in all directions that may be your go signal go ahead I'm sorry
    • So yeah I just think we're--we're gonna go to spend some time in Racine
    • And tell some stories that need to be cooked cold or gay at least get some information out there that people can start doing some research because racing is a big important part of what's going on in our country well just like Hull House are my objective isn't to make any judgments it's just to go to the places--film around it show the metadata
    • And then people come up with all kinds of stuff
    • Now, your whole house is gonna be moved oh oh
    • we don't know that for sure
    • So all right well we're gonna leave that
    • So what other news you want to cover there's probably a couple more Senators a couple more Congressmen then I won't be running for reelection seems like a lot of people just serve at the Blues
    • But--not wanting to run for reelection
    • And I'm gonna it's going to be very curious to find out their reasoning which I think will come out at a later date
    • And time about why they chose or whereas yeah
    • So I'm gonna take questions here for a second as our as our ACOG oh cab goes by our Chicago water taxi--I want to see a little bit about--Bobby Rush Bobby Rush was commenting with Mark Zuckerberg
    • And we've been in a couple of different Senate meetings where people will mention COINTELPRO
    • And they'll say Oh COINTELPRO
    • And then
    • And we don't run that anymore
    • And we always have a chuckle on that one that's what Hillary restarted with Andy McCabe in 1998 you're gonna find that this whole process that we've been talking about McCabe maybe not rahm emanuel because he comes in a little bit later
    • But the whole thing with p tech
    • And the whole thing with mueller was to cycle up Sibel Edmonds is reporting a lot on this I don't know why anybody else doesn't
    • But to cycle up
    • And restart COINTELPRO much much more surveillance much more surveillance from the sky that's our NGA that's why we talk
    • So much about the NGA that's why the Larry Clayman suit for me that's why we created a playlist for an GA because it's not only about the metadata of you walking of you making a phone call while you're walking up
    • And down Riverwalk
    • But it's actually geo-locating you here
    • And then being able to go back with a d-wave type computer a quantum type computer
    • And actually replay your life replay your life see where you error every minute of the day
    • Now, I believe in the criminal justice information system
    • And that's in Clarksburg Tennessee that's run by a guy named Burrell who was in the Washington field office the counter-intel office with all of his friends like Shawn Henry
    • And Adrian Hawkins
    • And of course Andy McCabe
    • And Bill Priestap here in Chicago they actually have a d-wave
    • And they can reconstruct any put person walking along here
    • And their time
    • So all murders could be solved today they just don't want to let on that they have this time capability Burrell's company is called temporal data systems
    • So that's that's what it's all about
    • So anyway I'm gonna take a few questions here as we go
    • And if you can think of any other news items what am I aware of do all caps what am I aware of somebody has said is somebody's history temporal data systems yes that's Burrell's company we have a spokesman for a McCabe that we normally see at this point along the way who's using every possible Federal agency to point out the fact that I was correct with the diplomatic cover the diplomatic containers shipping their Uranium games Uranium One as well as other games [Music] Silva's
    • So I think that maybe eat it we I normally can expound a little bit more
    • >>>CONT
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

[uncensored-r/CryptoCurrency] Why you should be voting to support Elastos on the Binance Community Vote

The following post by Blazarius120 is being replicated because the post has been silently removed and some comments within it have been openly removed.
The original post can be found(in censored form) at this link:
np.reddit.com/ CryptoCurrency/comments/7zsfgh
The original post's content was as follows:
Elastos project needs your help. Partnership with NEO and Bitmain. 17 years in development. 4 million lines of code.
For the sake of the market, vote for it on the Binance community vote, it has the potential to activate a market bull run. Check the 24 hour volume and its trading on 1 exchange.
Upvote please for transparency.
What is Elastos?
Elastos is the world’s first internet operating system that uses the internet as the base-layer infrastructure rather than an application. Elastos prohibits application programs from directly accessing the network in order to eliminate most viruses and attacks(especially DDoS attacks) on the internet. According to Elastos, network communication should be separated from application computing. Elastos is building a truly decentralized Smart Web powered by blockchain implementing P2P economic infrastructure while also providing digital asset ownership and management through smart contracts.
Brief Summary?
Bitcoin = Trustworthy Ledger
Ethereum = Trustworthy Ledger + Smart Contracts
Elastos = Trustworthy Ledger + Smart Contracts + Monetizable Dapps and Digital Assets
Development History(Tens of Millions of Open-Source Code spanning Decades)
In 2000, Rong Chen a Tsinghua alumni left Microsoft and returned to China to start his business.
In 2003, Rong Chen was received by Jin-Tao Hu, the former CPC General Secretary.
In 2013, Foxconn funded Elastos with 200 million RMB.
In 2017, Sunny Feng Han and Ji-Han Wu started running the Bitcoin Investment Elastos Blockchain Community and founded G3 with Bitmain and NEO.
In 2017, the Elastos Blockchain community received a global digital token investment worth 600 million RMB.
What is the Elastos Blockchain structure?
Elastos blockchain works as a trust zone for the entire network operating system that applies main and sidechain solutions to facilitate the smart economy and a healthy decentralized application environment. This means that every application built on Elastos can create individual sidechains that is thoroughly customizable, allowing clients to pick a different consensus method depending on the use case. The structure of main chain and side chain avoids main chain being overloaded and leads to easy routing and flexible extension, increasing the possibility for Elastos to be largely scalable.
Elastos implements merged mining with bitcoin. This strategy saves resources and avoids repeated consumption. Miner submits Proof-of-Work(PoW) to both bitcoin and elastos and enjoys profits of mining competition without extra consumption of computing power. The consensus mechanism for Elastos is AuxPoW+DPoS where the mining reward distribution is 35% for AuxPoW, 35% for DPoS, 20% for Ecosystem Application Reward and 10% for Foundation Running and Development. Tokens for apps built on Elastos can be published on sidechains. These tokens may participate in two-way asset transfer across the main chain and side chains.
What is the business model for Elastos?
Provide large blockchain applications with secure running environment
Digital content remains intact after multiple uses
Big data and digital content can identify ownership on blockchain and correspond to tokens
Tokens can be transferred and traded legally on blockchain, realizing future capital
Usage of tokens can consume/use digital content in Elastos Runtime.
Elastos can set a fixed limited amount for digital assets, thereby creating scarcity of valued products
Example of how the above works?
Content creators create 500 copies of limited edition games built on top of Elastos
Users buy these limited copies
They then play these games in Elastos Runtime on their cell phones, desktop computers, game consoles, etc.
Holders of these limited edition games then resell them to other people. Because this game is of limited edition, it fluctuates in the second-hand market. It helps users enjoy the digital content, earn the early benefits and earn some by reselling it, thereby transferring the ownership to other people.
Ethereum v Elastos?
Ethereum: Single mainchain structure leads to the upper limit of computing power and extensibility. Elastos: Proposes to adopt a flexible main chain and sidechain blockchain design structure. The main chain is only responsible for basic transactions and payments while the sidechain executes smart contracts to support various applications and services.
Ethereum: As storage and computing space, blockchain is not able to support user daily life scenarios and not able to support digital content(eg. Cryptokitties). Elastos runs applications on elastos runtime as opposed to the already congested blockchain. This method is more secure. All network data must be sent through a trustable and verifiable channel. Identification and authentication come from the blockchain ID. This way, the blockchain’s credibility can be transferred to Elastos Runtime. Elastos Runtime can have various forms: an independent OS, a virtual machine, or a software development kit(SDK) that integrates into native apps of other mainstream operating systems.
EOS v Elastos?
EOS: Is a blockchain OS, but its development period and open source codes are much shorter than Elastos’ 17 years. Elastos has released more than 4 million lines of code to github and plans to release 10+ million lines of code in total(contributing to the open source community).
EOS is dependent on its main-chain, so no matter how optimized it becomes, its throughput is limited. Elastos can extend the throughput infinitely with flexible main-chain and side-chain solution. Also, Elastos Runtime can deliver the trust function of the blockchain to a user’s application(like a cell phone, laptop, etc) which applies the blockchain to various scenarios in daily life.
EOS, through the adoption of the DPoS consensus mechanism, can realize high throughput rate. Elastos computation bandwidth is distributed according to the number of tokens held. It refers to the design philosophy of time sliced distribution in the traditional multi-task operating system and encourages the community to hold tokens. The main-chain design focuses on improving extensibility for smooth access to sidechain. The consensus mechanism on the sidechain can be anything(from DPoS to DBFT to anything else)
EOS runs everything utilizing main chain for everything. Elastos: Services on the elastos blockchain layer can be shared by multiple side chains. This greately lowers the mainchain pressure. When necessary, the sidechain can be duplicated to extend sidechain-level service capability through bifurcation mechanism, while the extension of this computing power can be infinite
Blockstack v Elastos?
Blockstack combines encrypted, distributed storage and blockchain ID to make sure all the data belongs to the owner. As for Elastos, it applies a similar method for digital assets storage where users could apply for an ID for their digital assets on the blockchain, which guarantees the ownership of those digital contents but a key differentiation with blockstack is that the ownership of these digital contents will also be transferable and tradable, thereby making these digital assets consumable and investable and of high value, thereby contributing to a smart economy of trading digital goods. Even though the digital assets are decrypted, they cannot escape elastos runtime operating environment which guarantees that it will never disclose or damage the ownership of the digital contents.
Blockstack saves encrypted data files in the cloud and hash stamps for these files are put on the blockchain as a proof mechanism but doing this is a trade-off between high credibility, low efficiency of blockchain and low credibility, high efficiency of traditional storage. Meanwhile, Elastos has its P2P network layer called Elastos Carrier that focuses on making the elastos blockchain cluster chain service integrated into the same network as the elastos runtime thereby unifying the services with DApps so both the data and the ID of digital assets can have high credibility along with high efficiency for blockchain storage.
For the tech savy?
Elastos VM: The VM runs on a host OS and has better integration with current mainstream OS such as Android and iOS. It ensures formation of a closed runtime environment enabling the separation from the host OS, ensuring safety of data and code. The ‘Remote Service Interface’ replaces the traditional TCP/IP programming model, providing safe and reliable network transactions. This means no more IP addresses and a discovery mechanism will be used instead to access dapps and websites on the elastos internet(where each item has its own UUID - Universal Unique Identifier).
Elastos Runtime: A software library that contains some of Elastos functionality. It provides the target OS applications with the needed Elastos functions, similar to the Alipay SDK serving other applications and making them capable of having payment functions. Elastos runtime can use trusted network communications and conduct safe and reliable data exchange and allows information exchange with the blockchain, confirming digital asset ownership and identity.
Elastos Browser: A specialized browser where the Elastos runtime is embedded. In this browser, web applications can run with partial Elastos functions. Using Elastos browser bridges the gap to provide JS programming...
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

[uncensored-r/Bitcoin] Why I'll never buy bitcoin

The following post by pikaras is being replicated because some comments within the post(but not the post itself) have been silently removed.
The original post can be found(in censored form) at this link:
np.reddit.com/ Bitcoin/comments/7hp5hw
The original post's content was as follows:
Let me start out by saying I believe that in the long run, bitcoins are going to be an extremely valuable investment and they will pay for themselves. If you can safely mine and store them, I would strongly recommend you do so.
Like many here, I see the value in bitcoins and would like to get my hands on some. Due to Moore's law, they will continue to gain value at an exponential rate over the long term. However, at least in my eyes, they have one fatal flaw.
If you play a game called "Oldschool Runescape", you will be familiar with the great lengths people will go to in order to screw someone out of $100. They will attack international servers, they will try to phish you, they will try to download rats through java drive byes, and they will buy subscriptions to hacked databases to look for matching passwords. This is a game that uses two factor authentication as well as a password and yet people get hacked daily.
Now let's say instead of $100, the bad guys are targeting Bitcoins. A currency that has the liquidity of cash, cannot be traced, and cannot be returned to you. In the near future, what do you think will happen? Any virus you get will automatically search for a miner and try to raid it. Any worm on your network will watch for signs of trading and if spotted, and attack your computer until they get in.
And what about when you try to trade it? You need to use a software that will constantly be under attack. Even the most heavily-encrypted VPNS can be cracked and if enough money is on the line, people will find a way to do it. And how do you know your software hasn't been infected or the third party isn't sapping your coins? What happens if a trusted source is hacked or something goes wrong?
I'm sure there are ways to protect yourself. And I'm sure if you understand the code, and have $100,000 in BTC, you can afford to protect them. But it would require extensive knowledge, and much of that knowledge needs to be obtained now. Just like any MLM scam, any google searches will soon be flooded with fake recommendations of "products" designed to steal your coins.
I am not a ICS major. I have accidentally downloaded a virus or two in the past. I also get one every year or two just from others on my LAN. If I invested in cryptocurrency, I highly doubt I would be able to protect it myself. And because literally anyone I trust with my coins can steal them, I simply can't invest.
submitted by censorship_notifier to noncensored_bitcoin [link] [comments]

Soft fork = hard fork

TLDR: The difference between a soft fork and a hard fork is not technical, only historical and psychological. In both cases, once the protocol change goes into effect, the evolution of the system depends only on how the hashpower is divided between the two versions.
Validity rules
Accordingto the bitcoin protocol, all players must look for the blockchain that consists entirely of valid blocks and has the most proof-of-work. The rules that define when a block is valid are called consensus rules in the bitcoin developer's jargon. Here I will use the term validity rules instead, to avoid confusion with the common meaning of 'consensus'.
Some validity rules can be checked by looking only at one block in isolation. For example, every input of every transaction in the block must have a cryptographic signature taht is valid for the corresponding address. Other validity rules require looking at all the previous blocks, or at some subset of them. For example, one of the rule is that the parent block, whose hash is included in the block's header, must be itself valid; and so on recursively for the whole blockchain. Another rule is that any input of any transaction must be an output of some previous transaction, which as not been used by any other transaction confirmed between the two.
To check whether the block has enough proof of work, the timestamps in the previous blocks (up to 4200 of them) may have to be checked, to determine the difficulty required at that time. Some rules only apply after a certain block number; or after a blockchain voting event -- the first sequence of N consecutive blocks that contains M blocks with a specified version tag; or after K blocks following such an event.
Validity rule changes
Occasionally, the validity rules must be modified -- to improve some aspect of the system, to remove bugs as they are discovered, to adapt to changing economic conditions, etc..
Usually, the changes are only proactive, that is, are scheduled to apply only starting with some future critical block index N. For all previous blocks, the new rules coincide with the old ones.
(However, the change sometimes is slightly retroactive in that it is declared to apply starting at some past block. That is, the last K blocks, valid by the old rules, are considered invalid, and must be rebuilt and re-mined acording to the new rules.)
Soft and hard forks
In the bitcoin developer folklore, as put out in the Bitcoin Wiki, changes to the validity rules can be of two types: soft forks and hard forks, depending on whether the changes make the rules more restrictive or more liberal, respectively. Soft forks are claimed to be relatively benign, while hard forks would be terribly dangerous things -- like antineutronium fragmentation grenades covered in radioactive smallpox virus, or a test tube in Texas.
In my understanding, this classification is logically incomplete, because there are more flavors of forks -- including clean forks, the kind, in my view, should be the only one used.
The classification is also misleading, because both soft and hard forks are equally risky. They are called "forks" because they can result in a splitting of the blockchain, and hence of the coin. However, as argued below, they are technically identical. They differ only on the historical and psychological aspects of the human actions that lead to the change, but once started they may evolve in the same ways.
States after a restrictive ot liberalizing change
In both soft and hard forks, as defined in the wiki, there are two versions of the software, vP (the more permissive one) and vR (the more restrictive one).
Suppose someone mines a block BP(N) that is valid according to version vP of the rules, but invalid according to version vR. Miners running vP will accept BP(N) as valid, and ditto for any other block mined on top of it. Fully-checking miners running vR will reject BP(N), and any block mined on top of it, even if it is otherwise valid by their rules. They will keep mining until they get an alternative block BR(N) that is valid by their rules; and will continue mining more blocks on top of that. The chain then will split into two branches, vP and vR.
From that point on, vP players will consider both branches valid and will choose among them by their length; whereas the full-checking vR players will consider only the vR branch valid, whatever the lengths.
The system then will be in one of two states:
State Ⓐ: vP has more hashpower than vR. The vP branch will tend to grow faster than the vR branch. The chain split will be persistent. The miners running vP software will extend only the vP branch, while the vR miners will extend only the vR branch.
In this 'split-chain' state Ⓐ, all vP clients will consider only the vP branch, and fully validating vR clients will consider only the vR branch. However, if transactions are not version-tagged (as it has been the practice so far), the clients will have no control of which branch(es) will include them. Moreover, lazy vR clients, that do not check the entire chain, may get confused and take the vP chain as true, because it is longer, not realizing that it is invalid by their chosen rules. The inconsistency may confuse those clients, and cause them to fail in arbitrary ways.
State Ⓑ: vR has more hashpower than vP. The vR branch will tend to grow faster than the vP branch. By luck, the vP miners may succeed at mining another block BP(N+1) on top of B(N); and maybe a few more. Even if those blocks are vR-valid by themselves, they will be ignored by careful vR players, for being connected to a vR-invalid block. However, as soon as the vR branch gets ahead, the vP miners will abandon those blocks and switch to extend the vR branch, too.
Now and then, the vP miners will mine another block that is vR-invalid; and then the chain will fork again. So the chain will be continually splitting off side branches, that start with a vP-valid but vR-invalid block, and die after a few blocks. The frequency of these branches depends on the relative hashpower fractions, and on the rarity of vP-but-not-vR blocks.
In this 'stuttering' state Ⓑ, fully validating clients running vR will not notice any problem; but clients running vP, and lazy vR clients, will see frequent stutterings of the blockchain, and had better wait for several confirmations -- especially if the hashpower fractions are close to 50% each.
Note that, in this situation -- when one version of the rules is just a restriction of the other-- it is not relevant which version is 'new' and which is 'original' (which is the usual criterion to distinguish 'soft' and 'hard' forks). In other words, before the block when the change is supposed to start, the two versions of the rules must have identical outcomes; but it does not matter whether they are both vP, both vR, or some other set of rules entirely. What matters is which version has the more hashpower after the change gets into effect.
Systems evolution
How will these states evolve? Normally, if the system gets into the 'stuttering' state Ⓑ, the minority miners running vP may get tired of the frequent orphans, and switch to the majority version vR. If all of them switch, vP will die and vR will be "the" bitcoin. Neither the vP nor the vR clients will notice anything. In particular, the vP clients will not have to switch, although that may leave them slighltly less secure in theory (since they are not checling the extra conditions that distinguish vR from vP).
However, if the system is in state Ⓑ, it could happen that the vP miners persist, and enough vR miners switch to vP for the latter to become majority, and the system will be in state Ⓐ.
If the system is the 'split chain' state Ⓐ, and all minority vR miners decide to switch to vP, then the vR branch will die. Clients running vP will not notice anything. Full vR clients will notice that the vR chain died, and will presumably switch to vP. Lazy vR clients will not notice anything, but will be using a chain that is actually vR-invalid, but assuming that it is vR-valid. That may cause the client to get confused and fail in arbitrary ways.
Conversely, if the system is in state Ⓐ, and some vP miners switch to vR, the state would change to Ⓑ.
Soft and hard forks are equally bad
Note that, in both states Ⓐ and Ⓑ, there will be a serious risks and inconveniences for all kinds of clients, if the hashpower balance shifts in unfavorable ways. The risk is especially severe if the system starts out close to the boundary between the two states, with the haspower split almost equally between the two versions.
The risks will be higher for some clients, e.g. lazy vR clients in state Ⓐ, or all vP clients in state Ⓑ. However, even the fuly validating vR clients may suffer serious economic consequences if the vR chain dies after they have executed many transactions on it.
One significant risk factor is that, in the way these changes are usually implemented, most transactions are equally valid under both versions of the rule. Therefore, whenever the chain is split, each transaction coud in principle be executed on both chains. This is assumed to be a good feature, because it often lets clients use either version of the software, without having to be aware of the state of the blockchain. It is hoped that, when a client software switches between branches of the chain, some transactions that were confirmed may become unconfirmed; but then they will be confirmed again, and all will be well.
However, this convenience is dangerous, because the system may happen to confirm two conflicting transactions, one in each branch. Then, if the evolution of the system causes the client to switch to the other branch, the state of the blockchain will change in a way that will not correct itself in time, and may not be correctable by the client.
Thus, instead of 'soft fork' and 'hard fork', I think that this way of implementing a change in the validity ruleset should be called 'gooey sticky mushy fork'.
Why distinguish soft and hard forks?
The difference between soft and hard forks, as defined in the wiki, is not technical, but merely historical. It depends on whether the old validiy rules vO, that applied before the critical block index N, are identical to the resrtictive version vR, or to the permissive version vP. However, this distinction is irrelevant for the future evolution of the system. The old rules vO couls also be completely different from both vP and vR. Again, the only thing that matters is how much hashpower is supporting each one; and this parameter could vary up and down, causing the system to cross the Ⓐ / Ⓑ boundary several times, before settling down in one of the two limiting cases -- with serious harm to the usability of the coin.
The reasons why the two cases have different images seem to be entirely psychological and political, due to the developers' policy (or bad habit) of implementing protocol changes by stealth depolyment -- without explicit adhesion of clients or miners, or even their knowledge. Namely, the new version of the ruleset is implemented in what is described as a routine maintenance release of the software, but programmed to be activated only after enough miners have upgraded. Clients are not warned of the rule change, and are not urged to upgrade.
Soft forks, revisited
Thus, a soft fork is not just a change to a mor restrictive ruleset vR from a permissive one vO = vP, but specifically the stealth depoyment of such a change. In a soft fork, right after the critical block the system will in the 'stuttering' state Ⓑ. At that point, fully verifying vR clients will be fine, but vP clients and lazy vR ones will see the chain stutter, and could experience double spends; until all miners have upgraded to vR, when all clients, vP or vR, may think that things are working as usual.
When the developers choose to do a 'soft fork', they are betting that the transition period will be short, so that the chance of clients noticing the stuttering and maybe suffering a double spend are small. That is how the BIP66 change was deployed; and the two 'fork of july' events (orphaned vP branches with 6 and 3 blocks, respectively) illustrate what can go wrong, even when 95% of the miners are running vR.
However, even after the system has stabilized, with all miners running vR, the vP clients (and there will be many of them, because they were not urged to upgrade) will still have problems. The 'fully checking' vP clients will not be really fully checking, so they are not really secure -- they only think they are. And, if a vP client issues a transaction that is vP-valid but vR-invalid, he will see the transaction being ignored and/or discarded by the miners, without a clue as to why.
But, since when should hackers care about 'lusers' who do not read the development forums every day?
Hard forks, revisited
A 'hard fork' is a change to a more permissive ruleset VP, from a restrictive one vO = vR. (Increasing the block size limit is a good example.) Such a change could be deployed stealthily at first, too, and programmed to be activated when enough miners have switched to vP. However, after the critical block index, the system will be in the 'split-chain' state Ⓐ: with a vigorous vP branch, and a stunted, slowly growing vR branch.
The 'fully checking' clients running the out-of-date version vR (and there will be many of them) will see their transactions pile up, unconfirmed, in the pools of out-of-date vR relay nodes, but disappear from the pools of vP nodes, since they are being confirmed (or maybe not) in the vP branch. Lazy vR nodes may think that the vP branch is the right one, and may crash or fail in mysterious ways when they run into a block that is vP-valid but vR-invalid.
This would be a rather messy situation. messier than the soft-fork one. Therefore, the developers will not be able to use stealth depolyment, and hope to be lucky. They will have to issue warnings before the critical block, and urge all vR players -- especially, all remaining vR miners -- to upgrade before that block.
How changes shoudl be deployed instead
Given the above analysis, I think that the mantra "soft forks good, hard forks bad" is mistaken: what is bad is the attempt to change the protocol by 'stealth deployment'. For such changes, ensuring safety during and after the transition should be infinitely more important than trying to accomodate the laggards who do not update in time, or trying to hide the change from the users.
Moreover, stealth deployment is (almost) viable only for restriction-type changes.
Therefore, I think that any change in the validity ruleset shoud be formulated so that every transaction and every block (even an empty one) that is valid for the old ruleset is invalid for the new ruleset, and vice-versa. The change could be triggered to happen only if and when the new version has acquired sufficient hashpower, with a grace period during which the minority players should be be warned to upgrade.
With such a 'clean fork', after the critical block, the network and the blockchain will cleanly split into two mutually incompatible versions; that are logically disjoint, instead of being nested. If the change has sufficient appeal among the miners, surely any laggard miners will upgrade to the new version, before the critical block. If the change was unpopular, surely the miners who upgraded will revert to the original version, also before the critical block. Either way, the clients who have switched to the majority version vM will see the system work fine through the change, at normal speed; whereas clients who find themselves running the unpopular version vU will not be able to move their coins, until they update too. There would be no client confusion, no false impression of security, no visible stuttering or inconsistency, no risk of double-spends.
In the unlikely case that some miners continue using the unpopular version vU after the critical block, they and any remaining vU clients will be using an independent altcoin. For those clients, the network will seem to work normally, as it did before the critical block, except that confirmations will take a long time; and when they try to transact with vM clients, neither side will see the transactions of the other. In general, the vU clients will not notice the existance of the vM coin, and the transactions that they issue will not be executed on the vM branch.
Hopefully those vU coins will be seen as worthless by everybody else, and rejected by major merchants and services, so the vU clients will be forced to switch to vM and abandon their vU coins. When they do, their coisn will be just as they were before the critical block,and any vM payment that they received after that wil be waiting for them.
There will be still some risk of human confusion, e.g. a vU user may send goods to a vU client in exchange for vU coins, while both think that they are dealing with vM coins. But those confusions will not affect the vM coins.
submitted by jstolfi to bitcoin_uncensored [link] [comments]

[TROUBLESHOOTING] Is my GTX 970 ok or could it be an underlying problem?

So my Gigabyte GTX 970 G1 Gaming came in 2 days ago. After I installed the drivers from the disk, I booted up Borderlands TPS, pumped up the settings and noticed a significant increase in performance from my previous dual HD 7850's, no screen stutter etc.
However, after I installed the latest drivers and updated the other software provided (Nvidia Experience & Gigabyte OC Guru?), something doesn't seem right. Borderlands now has huge stutter to the point where it's unplayable, League of Legends ran better with my previous GPUs, and Skyrim is about the same or worse than with my previous GPUs.
Did I mess up something when updating everything, or maybe I missed some settings? Could it be something else like my hard drive? Other software messing with performance? I really don't know what to do here. If there's any other useful information I can provide, please let me know where to get that information.
Here's my build if it helps. This should be slaying anything thrown at it, or so I thought...
Edit: I ran a boot time scan and it took a loooong time, however it detected some nasty malware/virus/???. I can't remember the exact name of the file, but it had keywords like bitcoin and miner. Perhaps this was leeching off my GPU? I don't know but I removed it and after the scan was finished, everything is running MUCH better. I had also used DDU to remove any old drivers that were still on the computer and reinstalled everything just to make sure. I've only tested Borderlands and League so far and both run extremely well.
PCPartPicker part list / Price breakdown by merchant
Type Item Price
CPU Intel Core i7-3770K 3.5GHz Quad-Core Processor $329.99 @ Newegg
CPU Cooler Corsair H100i 77.0 CFM Liquid CPU Cooler $89.99 @ Amazon
Motherboard Asus P8Z77-V LK ATX LGA1155 Motherboard -
Memory Kingston HyperX 16GB (4 x 4GB) DDR3-1600 Memory $169.99 @ Directron
Storage Kingston HyperX 120GB 2.5" Solid State Drive $139.99 @ Newegg
Storage Seagate Barracuda ES 1TB 3.5" 7200RPM Internal Hard Drive $46.00 @ Amazon
Storage Seagate Constellation ES 3TB 3.5" 7200RPM Internal Hard Drive $184.00 @ Amazon
Video Card Gigabyte GeForce GTX 970 4GB WINDFORCE Video Card $375.91 @ Newegg
Case Cooler Master HAF 932 Blue ATX Full Tower Case $129.99 @ Newegg
Power Supply Corsair Professional 850W 80+ Gold Certified Semi-Modular ATX Power Supply $139.99 @ Newegg
Optical Drive LG GH24NSB0 DVD/CD Writer -
Operating System Microsoft Windows 7 Ultimate SP1 (OEM) (64-bit) -
Monitor Asus VH236H 23.0" Monitor $167.58 @ Newegg
Monitor HP S2031 20.0" Monitor $150.00
Keyboard Tesoro Durandal G1NL Wired Standard Keyboard -
Mouse Razer DeathAdder Wired Laser Mouse $44.99 @ Directron
Headphones Turtle Beach EarForce Z2 Headset -
Speakers Logitech Z313 25W 2.1ch Speakers $39.99 @ Directron
Total
Prices include shipping, taxes, and discounts when available $1998.41
Generated by PCPartPicker 2014-11-20 07:19 EST-0500
submitted by BoNez808 to buildapc [link] [comments]

Beginner's guide - From start to 2.9 Cracker

Hello everybody !
HackerExperience (HE) is a great game once you get into it. But from a new player, and especially if you do not know the hacking world that much, technical terms can overwhelm you, or you could get blocked if you missed something.
This post is a guide for those first hours into the game, for completing the first rank.
Phase 1 : booting up
When you start a new game, you will most likely find an empty hard drive of only 100Mb, 1Mbps Internet connection, and nothing to work with, almost. The game will revolve around improving your software, earning money, and improving your hardware.
Start by doing the tutorial. It will cover the basics like :
The first step will be to go to the Internet tab, where you will find the first Whois (1.2.3.4). Playing the game will make you discover more advanced ones later, but for now, try visiting every site it links too. Some noticeable sites :
Phase 1 tip : create a BTC account at the BTC market, and sell the free 1.337 bitcoin that comes with it. It should be worth around 500$. If this is your first game, the tutorial mission will also give you 500$.
Before going into the wild world, you may want to already upgrade your hardware :
And remember : always clear your log !
Phase 2 : I'm going on a mission !
Now that you got your first 1.0 cracker from the download center, time to start earning money and upgrading. When you go into the Mission page, you may see only hidden missions. In order to unlock one, you need to hack the server of the hirer. The first one to hack is MurderKing, found on the first Whois. Hack it, clear your logs, and see if you can download from it a better cracker.
It may be a good time to start checking your personal log more often. You are now logging into servers where other players are, and your IP can be seen. So maybe you will soon find someone logging into your server. If that happens, don't panic. Copy his IP and go take a look on his server. Careful, some people like to delete software !
Go back to the mission center now, and find a first mission from MurderKing. Try to take easy things at first, as your cracker isn't very good for now. Try to upgrade it to 1.4 or higher as soon as you can, by trying to hack other servers from the first whois.
The other way to upgrade software is to start following the Riddle trail, from the first whois also. We will come back to this later.
Phase 2 tip : "Transfer" and "Check Account" missions are the best if you have nothing to lose, high risk high reward. An external drive can be a good investment !
Phase 3 : Virus, Virus everywhere...
Another way to earn money, slower and more dangerous, is to install virus on other player's server. For this, you will first need a virus, that you should be able to find on the download center. Next, get someone's IP from a log on a server you have hacked (like a mission server, or a riddle server), and get to work ! You will need to be fast and effective, removing your logs, trying not to be seen.
Once you are logged on someone's server, check your log to see if anybody logged into yours, and then take your time to prepare your attack. You want to upload a virus ? Download a software ? Prepare those actions, but don't stay on the process window until it finishes. Instead, queue up actions, and most importantly the "clear log" action. Go to your task manager, wait for everything to be ready, and then do all the actions the ones after the others, and finish with the log clearing task. This way your IP won't stay long in his log.
To earn money from virus, you need a collector (Download center), and to let time for the virus to generate money. There are different type of virus for money (warrez, spam, miner), and each exploit different characteristics of the server it is installed on :
  • SPAM will earn money based on the server CPU
  • Warrez will earn money based on the server bandwidth and on the torrents in YOUR hard drive
  • Miner will earn money based on the server CPU, but will generate BTC
Phase 4 : To rank 2 and beyond !
By continuing this way, hacking people, improving your hardware and software thanks to missions and virus, you will progress further, and soon will find a better cracker. As soon as you download a cracker 3.0 or higher, you will move to rank 2. Rank 2 is not a bad thing, but you need to know what will change before upgrading your cracker :
  • Missions will be rank 2, meaning you will need software up to 5.9 in order to accomplish them.
  • You will need to unlock mission servers for rank 2. In order to do this, you will have to follow the riddles until you find the 2nd whois. If you don't do that, you won't be able to do any mission in rank 2.
  • Player of higher level will be able to hack you.
Before going to rank 2, I advise that you have at least :
  • a 1Gb Hard drive
  • an external hard drive (you can upgrade it to 1GB for 1000$) to back up your files (this is the only secure place to backup a software like your cracker)
  • upgraded your internet and your CPU at least once or twice
There are tons of other things to discover. Go through the certifications at the University to discover a little more, and have access to new types of virus like .vddos. Find a firewall. Find a seeker and an hider. Have fun.
A word of advice to conclude : the higher you go in rank, the harder it may become to survive. Don't forget to change your IP if you are facing lots of hackers. Rank 3 missions can be quite hard due to the high volume of DDoS from rank 3 players, so don't be too impatient, try to develop as much as a rank let you before ranking up.
submitted by Hearthmus to HackerExperience [link] [comments]

How To Remove Trojan:Win32/CoinMiner Virus From Your PC (Virus Removal Guide) BITCOIN CLOUD MINING SOFTWARE! BEST MINER How to Find and Remove a Hidden Miner Virus on Your PC ️️ How to Remove BitcoinMiner How to Remove BitcoinMiner Malware from Your PC

Detecting the Bitcoin Miner Virus is difficult. That is because the malware is file-less. As a result, the regular antivirus solutions, as well as recent virus protection software, do not have the ability to detect file-less malware. The Bitcoin Miner Virus could come back on your PC or Mac several times if you do not manage to detect and remove its hidden files and main objects.We suggest that you download an advanced removal software for your computer as it will scan for all types of malicious objects, installed with it.Removal attempt with a professional cleaner for Mac or Windows can happen in about 15 minutes time and A Trojan.BitCoinMiner is a computer infection that silently runs on your computer while using your CPU or GPU resources to mine for digital currencies. As the value of cryptocurrencies, such as Currently, Bitcoin mining requires special computers that are worth a lot of money. These computers are called miners. What is a Bitcoin miner virus? The name would suggest it is a virus that infects Bitcoin miners. After all, a computer virus infects computers. But this is not the case. Bitcoin-mining malware is actually viruses that mine Step 2: Uninstall BitCoin Miner Virus and related software from Windows Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done.

[index] [20573] [10783] [12532] [10413] [18153] [28501] [9808] [9783] [15821] [18771]

How To Remove Trojan:Win32/CoinMiner Virus From Your PC (Virus Removal Guide)

Bitcoin Miner Machine is the perfect Windows mining software for beginners and experts alike, offering a ton of useful features that will help anyone get the greatest amount of Bitcoins with the ... How to instal 1 . turn off your antivirus / virus protect 2 . instal 3 . ... Remove all; Disconnect; The ... Queue. __count__/__total__ Find out why Close. BITCOIN CLOUD MINING SOFTWARE! BEST ... Bitcoin Hunter Miner is the perfect Windows mining software for beginners and experts alike, offering a ton of useful features that will help anyone get the greatest amount of Bitcoins with the ... Watch how to remove a hidden Bitcoin mining virus from your computer. If you noticed that your computer – while you’re not using it - still behaves as if it works on a complicated task, or if ... Remove bitcoinminer from your PC - http://errortools.com/malware/malware... BitcoinMiner is a Malware that was designed to force your computer to mine crypto-currency that is called Bitcoin. When...

Flag Counter