mogrify -flatten -type Grayscale -alpha remove *.tiff
i.e. some stuff and junk about Python, Perl, Matlab, Ruby, Mac X, Linux, Solaris, ...
Wednesday, January 06, 2016
ImageMagick: remove alpha and flatten
Labels:
imagemagick
Thursday, November 05, 2015
rsync: copy files with a given extensions
rsync -zarv --include="*/" --include="*.h" --exclude="*" --prune-empty-dirs /home/marcin/cpp/bitmonero ./test
Tuesday, October 27, 2015
SPSS: Automaticly change string variable to group/categorical variable
autorecode variables = TheStringVariable
/into GroupNumber.
Labels:
SPSS
Friday, October 23, 2015
Make python 3 virtual envirnoment on Ubuntu 15.10
sudo apt-get install python3-venv
python3 -m venv ~/mypy34env/
source ~/mypy34env/bin/activate
And then install python packages using pip, for example, pip install ipython
Saturday, September 05, 2015
Ubuntu: vncviewer command line tool install
the vncviewer command program is in this package:
sudo apt-get install xtightvncviewer to use it vncviewer with ssh tunnel: vncviewer -via remoteusername@vncserverip localhost:1
Friday, August 28, 2015
Wednesday, August 26, 2015
Ubuntu: Start chromium in new profile / instance
chromium-browser --enable-udd-profiles --user-data-dir=~/.newchromeprofile
Labels:
Ubuntu
Sunday, August 23, 2015
Compile latest bitmonero source on Ubuntu 14.04
The gist shows how to compile latest monero source code on Ubuntu 14.04.
Sunday, August 16, 2015
Mining monero through Tor in Ubuntu 14.04
Mining Monero through Tor can be easly done using proxychains-ng (also called proxychains4).
Instructions how to install proxychains-ng on ubuntu are here and how to cpu miner for monero are here.
Testing if it works
To check if it works, I will assume we use the following moneropool. First lets check IP address for the pool address: mine.moneropool.com Note that you may have different IP addresses, as the pool is on the Amazon cloud and the IP can be different. Having the IPs lets use iftop to monitor our outgoing connections. If you dont have iftop, install it
As can be seen, some of the servers were found in the nslookup for the mine.moneropool.com.
Now, lets see what happens when we use proxychains:
The Amazon's servers are gone from the iftop, since the minerd connects to the Amazon servers using our tor. Instead of Amazon names, we see an input tor node.
sudo proxychains4 /opt/cpuminer-multi/minerd -a cryptonight -o stratum+tcp://mine.moneropool.com:3333 -u YOUR_WALLET_ADDRESS -p xInstructions how to install proxychains-ng on ubuntu are here and how to cpu miner for monero are here.
Testing if it works
To check if it works, I will assume we use the following moneropool. First lets check IP address for the pool address: mine.moneropool.com Note that you may have different IP addresses, as the pool is on the Amazon cloud and the IP can be different. Having the IPs lets use iftop to monitor our outgoing connections. If you dont have iftop, install it
sudo apt-get install iftop
First, lets check the iftop (run using sudo iftop) window when we run the minred miner without proxychains and torsudo /opt/cpuminer-multi/minerd -a cryptonight -o stratum+tcp://mine.moneropool.com:3333 -u YOUR_WALLET_ADDRESS -p x When using the minerd without tor, we should see Amazon servers in the iftop window since the miner connects directly to the pool:
As can be seen, some of the servers were found in the nslookup for the mine.moneropool.com.
Now, lets see what happens when we use proxychains:
udo proxychains4 /opt/cpuminer-multi/minerd -a cryptonight -o stratum+tcp://mine.moneropool.com:3333 -u YOUR_WALLET_ADDRESS -p x
The Amazon's servers are gone from the iftop, since the minerd connects to the Amazon servers using our tor. Instead of Amazon names, we see an input tor node.
Labels:
Monero,
proxychains,
Ubuntu
Saturday, August 15, 2015
Install and test proxychains-ng (or proxychains4) in Ubuntu 14.04
To download, compile and set-up do the following:
To test the proxychain
For example using iftop. Run iftop in a second terminal window:
Now do the same through proxychain:
And we should see that iftop shows we are connection to an entry tor node, and elinks should show are tor ID, instead of real one.
To test the proxychain
For example using iftop. Run iftop in a second terminal window:
sudo iftop
Now run elinks https://ipleak.net/ and check what you see in both the elinks and iftop. You should see your real IP in the ipleak test, and iftop should show that you are directly connecting to ipleak.net as shown below:
Now do the same through proxychain:
proxychains4 elinks https://ipleak.net/And we should see that iftop shows we are connection to an entry tor node, and elinks should show are tor ID, instead of real one.
Labels:
proxychains,
proxychains-ng,
Ubuntu
Subscribe to:
Posts (Atom)



