Category Archives for "Tutorial"

AEON mining

AEON Mining Tutorial for Windows / Linux (CPU / GPU)

AEON mining

In this tutorial you will learn how to mine AEON on Windows and Linux (Ubuntu and Fedora) with CPU and or GPU.

Basics of AEON Mining

AEON mining uses the algorithm CryptoNight-Light v7.

CryptoNight-Light v7, sometimes referred to as aeon7, is ASIC resistant. Making both CPU and GPU mining possible.

Generate an AEON wallet.

Both online wallets and hardware wallets have their pros and cons.

AEON Wallet Generator : This was created by MoneroMooo, a XMR core developer. Save your wallet information in a safe place. Copy your public key and seed to a safe place. The seed can be used to restore a wallet.

Generate AEON wallet instantly.

Official AEON Wallet : The safest way to store your AEON. The fastest way is to download the wallet, then connect to a remote node. Alternatively, you can run a local node by syncing the blockchain on your computer. Running a local node is the most anonymous method.

AEON Mining Software

XMR-Stak setup instructions

Download: AMD, Nvidia and CPU (all in one)

Run xmr-stak.exe as administrator and on first start we will configure the miner. After the first start, the miner settings will be saved.

Port: Network port for web monitoring, this is optional. ex: 8000

Currency:  aeon7

Pool address:

Username: ADDRESS.PAYMENT-ID+FixedDifficulty


Fixed Difficulty setting is optional. If you are sending to an Exchange, Payment ID is not optional.

Password: WORKER:Email

SSL support:  y

Do you want to use Nicehash: n

Do you want to use multiple pools: n

When you see the line logged into mining pool you are officially mining!

These settings are saved in the same folder as xmr-stak.exe: cpu.txt, nvidia.txt, amd.txt, pools.txt and config.txt. We will be fine tuning these in a later blog.

AEON Mining Pools

Monitor workers and earnings

Use public key to track live hash rate stats, view payments, set minimum payout levels, and manage email alerts. mining dashboard.

Happy Mining!

with vpn connection

VPN Basics: What is a VPN?

There’s a good chance you have heard of the term VPN before. It stands for “Virtual Private Network” and in simple terms, it secures and protects your Internet connection. Whenever you are browsing the web on, the data you send to websites is potential unprotected.

What Is a VPN? What Is it Used For?

When you use a VPN, your IP address and location are hidden, your browser use and communications (online banking and video chats) are securely encrypted, and you can unblock censored content and watch whatever content you choose.

How Does a VPN Work?

When you access the Internet without VPN, you connect via your ISP (Internet Service Provider), which then connects you to the content you want. Your Internet use can be seen by your ISP’s servers.

On the other hand, when you use ItusVPN, you connect to one of our servers via an encrypted connection or a “VPN tunnel.” All transmissions and data that travel from between your device and our VPN server are encrypted so only you and our VPN server can view it.

With a VPN

The diagram below shows what happens when you use ItusVPN. Encrypted communications between your computer (or another device) and our VPN server, as well as transmissions between our server and your ultimate destination, are protected and anonymous. ItusVPN hides your IP address and changes your location, making it impossible to trace your Internet use, even while you break through firewalls to watch your favorite content.

with vpn connection

Virtual Private Networks creates a secure tunnel between two or more devices.

Without a VPN

If you use the Internet without VPN, an eavesdropper can easily intercept unencrypted data and communications between your computer and the Internet. Plus, your IP address is exposed to advertisers, hackers, thieves and government surveillance.

with out vpn connection

Without a VPN your network is wide open and unprotected.


Protect your identity

 Our high-strength VPN encryption protects not only your web browser but also your emails, Skype conversations, online banking, and everything you do or see online – whether you are at home, the office, a cafe, or traveling the world. Give yourself some added anonymity with ItusVPN.

Stay safe from hackers and thieves

Once connected to ItusVPN, all your data is encrypted and indecipherable, so you won’t have to worry about passwords and other sensitive information being intercepted.

We don’t monitor or log your activities

Online privacy is not always well understood, and laws are ever-changing. However, we are firm believers in privacy as a fundamental right. We never share your details with anyone.

Prevent third parties from tracking you

By hiding your IP address and location, ItusVPN makes it harder for third-party sites and services to charge different prices or display targeted advertising based on location.

Looking for an unlimited VPN service? Take a look at what ItusVPN has to offer!