Posts

How to mine Dogecoin -Bit Torrent Token/ Wink with CPU and GPU simultaneously using Unmineable Miner

Image
Unmineable Miner How to consistently mine dogecoin and other hard to get cryptos If solo mining dogecoin really isn't your thing then you can just pool mine with a program of your choice. The one that I like most is called Unmineable Miner and lets you acquire hard to get cryptos through mining. Right now I'm mining the Wink crypto from the Tron blockchain because at the time of writing this there really isn't any other good way to get WIN tokens. Get started with unmineable miner, download here.       After you download Unmineable Miner simply click the .exe and hit 'Continue' with the dialog that pops up. If you have an older computer It may take some time before the word 'Continue' appears. Next you will choose GPU mining from the following screen. After choosing GPU mining click Next, then choose the token you want to mine and enter your receiving address for your wallet specifically for that particular token. Once you've entered your receiving addr

How to compile cgminer for Windows

Native WIN32 setup and build instructions (on mingw32/Windows):                                                                                                    (See bottom of file for steps to cross-build for Win32 from Linux.)                                                                                          Introduction                                                                                                                                                                 The following instructions have been tested on both Windows 7 and Windows XP. Most of what is described below (copying files, downloading files, etc.) can be done directly in the MinGW MSYS shell; these instructions do not do so because package versions and links change over time. The best way is to use your browser, go to the links directly, and see for yourself which versions you want to install. Winrar was used to do the extracting of archive files in the making of this guide. If you think that this

Setting up a dogecoin node for heavy transactions and mining. Part 2

Image
Join the livestream here https://www.youtube.com/watch?v=8sQEm-ySDmU Let's finally begin our solo mining now that we've downloaded the entire dogecoin blockchain to our computer. If you haven't completed part 1 of this guide please return there and setup your dogecoin node first. First we're going to need to configure our dogecoin core to listen for miners. We can start by using the example dogecoin.conf found on github here .  copy all lines of that configuration file and paste them into a text editor. Now we're going to remove comments on certain settings we need to run a node/server to mine from. These are the lines we want to remove the '#' comment symbol from. listen=1 server=1 rpcuser=makeusernamehere rpcpassword=makepwhere rpcport=22555 I like those settings because it tells Dogecoin Core to listen for rpc connections and that is IS a node server. The rpcuser and pass should be something unique so that nobody can control your wallet. The rpc port hel

Setting up a dogecoin node for heavy transactions and mining. Part 1

Image
Join the dogecoin livestream https://youtu.be/rrbdu1ku4wk   Introduction & Choosing Hardware Some are interested in mining dogecoin but the fact of the matter is that most high powered mining computers are in-efficient. You can actually end up spending more in electricity costs than you can gain in mining dogecoin because it's such a cpu intensive task. The emphasis on low powered computers in this article is geared around profitability. If you complete this tutorial on a high powered computer then it will also work but watch your power bill. The way that a cryptocurrency verifies its transactions is with what's known as cryptographic hashes. In the computer world, these hashes are typically used to store passwords for things like wifi and your operating system. When a computer saves these passwords, for example, it encrypts them with a key, usually a really high prime number , and then you have a scrambled set of characters that do not disclose the password to any reader