Friday, August 28, 2015

Wednesday, August 26, 2015

Ubuntu: Start chromium in new profile / instance

chromium-browser --enable-udd-profiles --user-data-dir=~/.newchromeprofile

Sunday, August 23, 2015

Sunday, August 16, 2015

Mining monero through Tor in Ubuntu 14.04

Mining Monero through Tor can be easly done using proxychains-ng (also called proxychains4). sudo proxychains4 /opt/cpuminer-multi/minerd -a cryptonight -o stratum+tcp:// -u YOUR_WALLET_ADDRESS -p x
Instructions how to install proxychains-ng on ubuntu are here and how to cpu miner for monero are here.

Testing if it works

To check if it works, I will assume we use the following moneropool. First lets check IP address for the pool address: Note that you may have different IP addresses, as the pool is on the Amazon cloud and the IP can be different. Having the IPs lets use iftop to monitor our outgoing connections. If you dont have iftop, install itsudo apt-get install iftop First, lets check the iftop (run using sudo iftop) window when we run the minred miner without proxychains and torsudo /opt/cpuminer-multi/minerd -a cryptonight -o stratum+tcp:// -u YOUR_WALLET_ADDRESS -p x When using the minerd without tor, we should see Amazon servers in the iftop window since the miner connects directly to the pool:
As can be seen, some of the servers were found in the nslookup for the

Now, lets see what happens when we use proxychains:udo proxychains4 /opt/cpuminer-multi/minerd -a cryptonight -o stratum+tcp:// -u YOUR_WALLET_ADDRESS -p x
The Amazon's servers are gone from the iftop, since the minerd connects to the Amazon servers using our tor. Instead of Amazon names, we see an input tor node.

Saturday, August 15, 2015

Install and test proxychains-ng (or proxychains4) in Ubuntu 14.04

To download, compile and set-up do the following:

To test the proxychain
For example using iftop. Run iftop in a second terminal window: sudo iftop Now run elinks and check what you see in both the elinks and iftop. You should see your real IP in the ipleak test, and iftop should show that you are directly connecting to as shown below:

Now do the same through proxychain:proxychains4 elinks
And we should see that iftop shows we are connection to an entry tor node, and elinks should show are tor ID, instead of real one.

Ubuntu 14.04: compile CPUMiner / minerd (forked by LucasJones & Wolf) for Monero mining

To CPU mine Monero in a moneropool it is suggested to use cpuminer called minerd. To compile it on Ubuntu 14:04 or later, the following dependencies are required:

sudo apt-get install build-essential autotools-dev autoconf libcurl3 libcurl4-gnutls-dev
Example use: minerd -a cryptonight -o stratum+tcp:// -u YOUR_WALLET_ADDRESS -p x

Once you start mining using moneropool, you can check your status at anytime on their front page using your xmr address:
Just remember that their pending balance updates after a while. For me it took maybe 1-2h before I saw any pending balance after I had started mining. Hash rate updates very quickly though.

Just in case you get the error: possibly undefined macro: AC_MSG_ERROR
If this token and others are legitimate, please use m4_pattern_allow.
See the Autoconf documentation.

it means that you haven't install libcurl4-gnutls-dev.

xfce4: Lunch desktop file from command line

Example: exo-open /usr/share/applications/firefox.desktop