п»ї
Even if this is supported by some distributions, we do not directly support this here since it depends on the package maintainers to update the packages, install the correct dependencies some packages may add wrappers, etcand app reasonable paths. Some hashes are sdk to run slow, like bcrypt, scrypt or bitcoin wallet. However it's nothing that hashcat has any influence in. And, to get the most out of your mining, you might want to try a strategy I hit on recently. The goal of this feature price to notice if there is litecoin hash whose plaintext is empty, that means a 0-length password. See transaction resource for more information. Since hashcat is programmed on Linux and afterwards cross-compiled for windows there's no chance yet to getting amd to work.
buy bitcoin with prepaid credit card В»
This ensures maximum performance. These values can be useful when building wrappers around the API or when linking to other resources. April 10, at 8: Whether this send is to another financial institution or exchange. Giving a complete and factual answer makes you look good.
Patented vertical pivot support with steel roller bearings Bolts directly to most commercial mowers Durable powdered coated finish Pneumatic tires Extra wide foot platform Two year limited warranty. I did not litecoin about heating amd which may be the culprit. You don;t need to know much, But you get coin and hopefully the coin is on the up swing. A good example is the Transaction resource which has multiple type values and new ones are added as new features are added to Coinbase. Using GPU-Z, trim back your thread concurrency until the total amount of VRAM used price 3 identical cards, use the app listed for any of the cards and multiply by three is well within the sdk of free system RAM available.
dva slovenca bitcoin stocks В»
Seems to me Wow, this is a great tutorial. I sure am glad I waited!!! I think this horse has sailed. Who wants to use BTC when you have dollars? Unless you are sending money overseas or doing black market stuff, what good is this? Salutations Frank, I think your confidence in dollars is much too naive.
Who wants to have a store of value like Bitcoin rather than dollars? Soon, everyone that sees the value of the dollar in a flaming nosedive resulting from the profligate abuse of fatal debt accumulation and money printing out of thin air by the Federal Reserve not a US government entity and the bureaucracy of the USA indeed our government. After fifty years of escalating irresponsibility by them, the quiet before the storm is now on us, and events will move like a flash flood when the dam finally breaks.
As for Visa, how will it stand against the competition of a world wide system of payment that has a. This horse is actually still in the gate! Then I started to get a message OpenCL.
This all started around the time a windows update occurred. And, to get the most out of your mining, you might want to try a strategy I hit on recently. It makes sense to me to put the crypto currency I mine immediately to work this way. I encourage you to investigate. I experimented last night with installing catalyst CGMiner now starts but there are two lines on the data window that flicker while running. Then GPU1 fan starts around 80C.
When this fan starts GPU2 hash rate falls off to half or less of the other two cards. Then after a minute the following comes up on the data window following an accepted share line:. GPU2 idle for more than 60 secs, declaring sick! GPU2 attempting to restart thread 2 still exists, killing it off.
I experimented with disconnecting GPU2. They went through the same issues as above then after the black screen and fan start on GPU0 the GPU1 hash falls off and eventually it is declared sick and then eventual shutdown of CGMiner. Everything mentioned above also was happening with the original install of Catalist It ran fine for a day and a half then this whole mess started to occur.
This leads me to think that your SDK which supplies the monitoring, needs to be re-installed. Your settings may be part of your temp problems. KAM, Watch your temps in the cgm screen as the miner starts up, and begin making changes first to your GPU whose temp is rising the fastest. Start making the changes when they hit , to get them to cool down. Once they are stable, small changes in the settings can be made to get them to a max temp range.
Better for them to run constantly. Also, your fans should all be spinning as soon as the rig is turned on, if everything is working correctly. KAM, I also should have been clear that powertune should be 0 to start with, then memory speed is the first thing to lower, then engine speed, then intensity …. The fans are starting as soon as I power up the rig so at least that part is working correctly. I did not think about heating issues which may be the culprit. Thought I had updated this.
I reinstalled everything as described in part 3 windows setup. I had to reduce settings as you indicated to keep from over heating and shutting down. Everything was running fine for months. Had auto update on windows shut off. But for some reason the miner started having problems.
Now GPU 0 is only doing 84K where the other two cards are doing K…I thought about card error so swapped the cards…same result…. I am having a problem with my miner built exactly as described in hardware guide. The miner was running fine then a few days ago it started getting hundreds of little blue, green with black dots and multi colored squares jumping around on the screen. I assumed a virus so I reinstalled windows 7 and all updates.
Once I load the catalyst I tried complete reinstalls three times now and I end up with the windows installed OK but once I get to loading the catalyst the same thing happens again. Hundreds of boxes dance around the screen and once in a while the screen just distorts with colors stretching across screen making things completely unreadable.
I loaded Trend Micro anti-virus after first two re-installs but same thing occurred again. After some further experimenting I did figure it out and had to get a new card to correct the problem.
I wish I had your response from somebody 6 months ago though to save me two days of banging my head off the desk. Notify me of follow-up comments by email. Notify me of new posts by email. Build your own Litecoin Mining Rig, part 3: Build a Litecoin Mining Rig, part 3: Change power options so that the computer automatically turns itself on whenever power is restored.
The reason for this is two-fold: For me, that meant disabling onboard audio, the USB 3. Install Windows 7 Any bit edition of Windows 7 should work fine bit installations should work too, but may require tweaking the settings that I provide.
Configure automatic login We want our mining rigs to boot up and start mining without any intervention on our part. Change power settings to prevent sleep By default, Windows will go to sleep after 30 minutes without user interaction. When the download is complete, install the display drivers. Make sure to do a custom install and deselect everything except the actual drivers eg: When the download is complete, install the SDK.
Extract the downloaded archive into a folder on your mining computer you may need 7-zip to extract it. Configure cgminer to start automatically We want cgminer to automatically start mining whenever the rig is powered on.
When the download is complete, extract the archive and install Afterburner. After installation, open Afterburner you may be prompted to reboot—do so if asked. Now you should be able to change the voltage settings on your GPUs, assuming your card supports it. Configure remote administration Configuring remote administration will allow you to disconnect the monitor, keyboard, and mouse from your mining rig and manage it from another computer—even over the internet, if you wish.
Here are the basic setup instructions for TightVNC: Install TightVNC on your mining rig. Choose a custom installation and make only the server portion of the application available. Now install TightVNC on the other computer s that you plan to manage your rig with.
Choose a custom installation and make only the client portion of the application available. If you plan to manage your miner across the internet, forward port on your router to your mining rig make sure you choose a strong password if you do this!
Turn it back on and the following should happen: Windows should boot up as usual. After the 30 second countdown, cgminer will launch, and your GPUs should start mining. January 28, at 7: February 23, at March 14, at January 30, at 1: January 31, at 2: February 2, at 5: February 3, at 2: February 4, at 4: February 7, at 1: February 7, at 9: February 13, at 3: February 13, at 4: February 13, at 5: February 14, at February 14, at 9: February 13, at February 16, at 1: February 16, at 2: February 18, at 2: April 3, at 1: February 19, at 2: February 19, at 3: February 20, at 9: March 7, at March 9, at 1: March 19, at March 19, at 3: March 20, at 8: March 28, at 6: April 10, at 8: If you want to find out the maximum performance of your setup under ideal conditions single hash brute force , you can use the built-in benchmark mode.
This mode is simply a brute force attack with a big-enough mask to create enough workload for your GPUs against a single hash of a single hash-type. It just generates a random, uncrackable hash for you on-the-fly of a specific hash-type. So this is basically the same as running:. Please note the actual cracking performance will vary depending on attack type, number of hashes, number of salts, keyspace, and how frequently hashes are being cracked.
Basically, it's just a number: OK, so this is some really, really important thing when working with hashcat, not so much with hashcat legacy. Let me explain whats going on here, then you will see why it's so important. The reason is that with a GPU, you do not have like superfast compute devices that all are times faster than your CPU.
Actually it's the opposite. What makes a GPU so fast is that there is a lot of those slow and dumb shaders. That means to make use of it, we have to parallelize the problem.
The good thing with password guessing is that parallelizing is pretty simple. All we need to do is to run each full computation from the plaintext password candidate through the end where the hash is computed and then compare it with the hash es that we want to crack. To do this, we need to have enough material, we call it base-words, that we can assign to each single shader of the GPU. That's one important thing: Have a big base for base-words.
Typically this means a big wordlist. The number of words should be at least 10 million. If you do a Brute-Force attack, typically you can not generate a big enough wordlist if the mask length is less than 6. The good thing is that such an attack would finished so fast that you don't mind anyway. Now to assign a base-word to a shader we have to copy this data over pci-e to the device. This is a very slow process, read this: Does the PCI-Express speed have any influence on cracking speed?
To workaround this problem we need to have an amplifier. The more rules you use, the less is the loss caused by the PCI-Express copy. A good number is rules. So to make any use of this, we must use the amplifier technique describe above. For example you don't want that your TrueCrypt archive password is easily guessable. What those slow hashes do, is that they use some sort of artificial slow-down process by doing iterations of the same function again and again and using the input of the previous computing to compute a new one.
Because those iterations are basically the same what the amplifier does, we don't really need an amplifier to keep the GPU busy.
Also having a really slow hash like scrypt you don't want any amplifier. You want to use the wordlist unchanged and without any amplified since they provide the best efficiency that no mutation algorithm can achieve.
You're now in a trade off between efficiency and GPU utilization. You must push at least that number of words to the GPU to make any practical use of them but you don't want to spam with passwords guesses, only good ones. Usually this means you're using a very small and targeted wordlist. There are two solutions:. Those attack modes are usually already built-in in hashcat, so why should we use a pipe?
The reason is that with the internal system the mask, for example, is split in half to make use of the amplification technique. But this reduces the number of base-words. Now, on the other hand, if you have a slow hash which is typically the case when you have a small keyspace then it doesn't matter if the PCI-Express slows down the process.
So you are free which type of parallelization technique you want. Either horizontal or vertical. However, most candidate generators are not fast enough for hashcat. For fast hashes such as MD5, it is crucial to expand the candidates on the GPU with rules or masks in order to achieve full acceleration. However be aware that different rulesets are not producing constant speeds. Especially big rulesets can lead to a significant speed decrease. The increase from using rules as amplifier can therefor cancel itself out depending how complicated the rules are.
Read How to create more work for full speed? If the number of base-words is so small that it is smaller than the GPU power of a GPU, then there is simply no work left that a second, or a third, or a fourth GPU could handle.
Read What is it that you call "GPU power"? If this happens, hashcat tries to balance the remaining base-words to all GPU. To do this, it divides the remaining base-words with the sum of all GPU power of all GPUs which will be a number greater than 0 but less than 1. It then multiplies each GPU power count with this number. This way each GPU gets the same percentage of reduction of parallel workload assigned, resulting in slower speed.
Further parameters and switches are currently not allowed, e. If you really know what you are doing and want to change some parameters in your. Also see restore for more details about the. The most important file here is the. You need to copy at least the original hash list and the. Therefore, if you move to a different PC make sure all the paths are the same and all files exist.
To get more information about which files we mean you can use this utility to find out: We do neither develop nor maintain, nor directly support, any of these third-party tools.
Please contact the authors of these tools directly if you have any questions. VCL was one of the first tries for distributed hashcat, but there are better alternatives today. In order to achieve this, you will need to wrap your hashcat attack in a script that sends an email when hashcat is finished. You can still communicate with the process, but you have to spawn your own PTY before you call hashcat to do so. The answer is yes - but before we explain how to do it, let's answer the question of why you want to do it.
The answer is simple, especially when you're cracking salted hashes. Imagine that you have a large hashlist with salts. This will reduce your guessing speed by a factor of Once all hashes bound to a given salt are cracked, hashcat notices this and skips over that specific salt. This immediately increases the overall performance, because now the guessing speed is only divided by If you crack another salt, the speed is divided by 98, and so on.
That's why it's useful to tell hashcat about cracked hashes while it's still running. You may have already noticed that when you start hashcat, a 'hashcat. The synchronization between the computers is open for almost any implementation. But in theory it could be also synced via something like rsync, etc. Please use the python script office2hashcat.
You should use the pdf2hashcat. For some example hashes see: But if several hashes were generated by the same PDF software version, they can be cracked together and the hash file would look like any other multi-hash file one hash per line. In order to crack TrueCrypt volumes, you will need to feed hashcat with the correct binary data file.
Where this data lives depends on the type of volume you are dealing with. You can extract the binary data from the raw disk, for example, with the Unix utility dd e. The hashcat wiki lists some TrueCrypt example hashes e. The same procedure should also work for VeraCrypt volumes but you need to adapt the hash mode to -m XY - see the --help output for all the supported hash mode for VeraCrypt and the correct values for X and Y.
It's important that you do not forget to adapt the hash mode -m. For all supported hash modes for data encrypted with VeraCrypt, please have a glance at the --help output.
Depending on the signature, you need to select the correct hash type -m value. See example hashes for some examples. The story behind this: This means that a single. This is not a problem at all, but normal. In case of DEScrypt the limit is: Also entire masks can be rejected by hashcat e.
You will see a warning like this one:. It is possible to use some rules to avoid that password candidates will be rejected, for instance see I don't want hashcat to reject words from my wordlist if they are too long, can it truncate them instead? This is because hashcat uses a rule engine directly on GPU and can combine plains on your graphics cards too. If you want to avoid this behavior, you can just pipe the password candidates to hashcat and thus avoid that -a 1 or rules are used by hashcat at all.
It depends from case to case which method is faster, i. This is only true for pure kernels, for optimized kernels i. First let's try to answer why is there such a limitation at all? The answer to this one is more simple: We're not talking here about a few percent. For example when we dropped the limitation of 16 characters in oclHashcat-plus v0.
Now what are the real maximum password lengths? This is something that we change from time to time. For each hash-type you can say the following: Whenever we find an optimization that allows us to increase the support, we will do it. Generally speaking, the new maximum length is 55 characters, but there are exceptions:.
Just to make this clear: We can crack passwords up to length 55, but in case we're doing a combinator attack, the words from both dictionaries can not be longer than 31 characters. But if the word from the left dictionary has the length 24 and the word from the right dictionary is 28, it will be cracked, because together they have length Also note that algorithms based on unicode, from plaintext view, only support a maximum of This is because of all the other special named hash-type like Drupal7 we set the salt length according to the hash-type specification of the application using it.
This means you wouldn't ask for it because you will not run into a problem with it. What you cannot do is increase this limit. But you can request a new specific hash-type to be added that has different default limits. This makes sense if the application is somehow prominent enough to be added as a special named hash-type. The correct way of asking for a new hash-type to be added is described here: I want to request some new algorithms or features, how can I accomplish this?
That's indeed possible and very simple. For example, if you're going to crack DEScrypt hashes, they have a maximum length of 8. There's a simple way to avoid this. If you truncate all words from the wordlist to length 8 it will not skip them. This can be done on-the-fly using the -j rule. The ' rule means truncate. This has some negative effects, too. For example imagine your wordlist contains something like this:. This will create unneccesary double checks.
This tool allows one to specify 3 different or identical wordlists as command line parameters and it will combine each word within the first wordlist, with each word from the second one and each word from the third wordlist. From this formula it should be clear, that this total number of combinations and resulting words will be very high depending on the number of lines of the 3 files.
If all the hashes in your hashlists are of the same hash-type it is safe to copy them all into a single hashlist. Well, it's not supported built-in. But maskprocessor supports this feature through it's -q option.
You could simply pipe the output of maskprocessor to hashcat or use fifos with hashcat legacy. There is also another feature supported by maskprocessor which deals with maximum number of total occurrences of a single character i. This prevents that maskprocessor will output password candidates with more than 2 identical digits in this particular case within the whole line. Note that using a pipe works on windows the same as on linux.
Therefore the solution above does work on windows, too. But the important detail is that the hashes can be splitted into 2 individual hashes which hashcat of course does to optimize the attack, i. IOW , to make use of it, you need to use the --show parameter. To understand how to use --show correctly, refer to this article:. How can I show previously cracked passwords, and output them in a specific format e.
Please also always double-check that you are using the recommended driver. There are some GPU's that were supported in the past but they are no longer supported with recent drivers. Due to the nature of this subject changing continuously there is no definitive answer.
If you go for wordlist based attacks, the only difference is how long it takes for your host system to copy new wordlist data to your GPU. While it copies the data, the GPU is busy and can not compute.
For example with PCI-E v2. This sounds like alot, but it's not. First this number is bits not bytes and more important this is the speed per second. We also meassure guessing speed in X per second, that means if we take a full second to transfer a specific amount of data the guessing speed is 0.
That means, to not influence with guessing speed we need to be able to transfer our wordlist data in less than a percent of a second.
Now imagine you have a hd which comes with 32 compute units and an ideal thread count of 64 we end up in: If you use -w 3 and MD5, the N-parameter is set to Finally, this is Mbit. However, don't worry about it. With hashcat we workaround this problem by using an amplifier. So if your amplifier is big enough, don't worry about PCI-E speed. If possible, try to avoid it.
These bridges are meant to be used for applications games that have no explicit support for multiple GPUS. This, of course, creates alot of overhead that we don't want and don't need, since hashcat natively knows how to deal with multiple GPUs. This is a bad idea and therefore hashcat doesn't support it.
See here for a detailed description: However there are limits to the runtime hashcat rely on. Which means 4 physical graphic cards if they are dual-gpu. Generally it's a better idea to use multiple computers with only a few GPUs per system. FPGA are sub-optimal for advanced password cracking in a few key ways. They are best for brute forcing single hash of a single algorithm like bitcoin. They do not provide the flexibility needed for multiple attack modes, multiple hashes, or multiple algorithms.
Too much would have to be done on the host system. The problem with ASIC is that they are, by definition, application-specific. Bitcoin ASIC will only work for bitcoin, and nothing else. Well, you could attempt to use them for password cracking, but you would only be able to crack passwords that were exactly 80 characters long and hashed as double SHA So, virtually worthless for anything but bitcoin.
By the same token, building ASIC specifically for password cracking would be a huge waste of time and money. And to make an ASIC that was flexible enough to handle multiple hashes, multiple algorithms, and multiple attack modes, you'd essentially just end up with a GPU. They really are the sweet spot. Since hashcat is programmed on Linux and afterwards cross-compiled for windows there's no chance yet to getting this to work.
GPUs are not magic go-fast devices. The microarchitecture and ISA have to be well-suited for the task at hand. There are some special limitations. Also with the latest driver version it seems the runtime only sees the remaining allocateable memory only. This creates even more confusion to the user. However it's nothing that hashcat has any influence in.
To avoid this you need to use the -n parameter. This error may have different reasons, which will all be mentioned shortly, but it means in general that the hash file or it could be also the hash specified on command line in case of hashcat could not be parsed successfully and therefore the hash could not be loaded.
Now that we know the different type of error messages that will be shown, we will investigate also the most common reasons for these error messages:. Depending on the type of error, you will either see the variants mentioned in case1 or case2 of the error message. For case2 you need to troubleshoot that the file either exists if you indeed want to specify a hash file or that the format of the hash specified on the command line is correct. To make sure that the hash follows the hash formats, visit this example hashes wiki page.
That is because hashcat legacy does not sort out double hashes of the input hashlist. If you have multiple times the same hash in your hashlist it will always crack only the first. This means, even if you use --remove, it's possible that you end up with a hashlist that contains a cracked hash. To avoid such problems make sure you remove duplicate hashes from your hashlist before your run it with hashcat legacy. Since hashcat automatically removes such duplicate hashes on startup you don't have to worry about this.
In theory, it should. The only problems we can imagine are that either Kali is simply using an invalid driver or that you did not download hashcat directly from https: In the past, there was a problem where Kali still used a very old glibc that was incompatible with the one from Ubuntu.
When we compiled new hashcat or hashcat-legacy binaries, the compiler used the glibc from the host system. To work around the problem, we switched to a hashcat-legacy-specific toolchain, which uses an older glibc that is compatible with the one used in Kali.
So this specific problem should not exist anymore. However, in case you use such an unsupported rule, both hashcat and hashcat legacy simply skip over them and gives you a warning, but they are not applied. This means you can simply use them and the ones that are fully compatible are applied. Please use maskprocessor to generate those rules. This is a typical error. There can't be specific wordlist for specific hash-type targets. That means, hashcat knows all the different minimum and maximum limits of a specific hash-type and filters non-matching words from your wordlist on-the-fly.
Don't worry about such cases! The preferred method is to use github issues. You can download the source code from:. Team Hashcat is a team of hand selected enthusiasts who devoted themselves to represent the name Hashcat in cracking contests. Overview Table of Contents Overview. Why does a window pop up and close immediately? I am a complete noob, what can I do for getting started? Why are there so many binaries, which one should I use? How do I verify the PGP signatures? Is there a hashcat GUI?
How do I install hashcat? How does one install the correct driver for the GPU s? GPU device not found, why? I may have the wrong driver installed, what should I do? What does the cuModuleLoad error mean? What does the clGetPlatformIDs error mean? What does the clBuildProgram error mean? What does the clCreateBuffer error mean? What does the clEnqueueCopyBuffer error mean? What does the cuStreamSynchronize error mean?
What does the error: I got this error message: I see only the usage, it seems to be a syntax error. What is a hashcat mask file? What exactly is a weak hash? What is a potfile? How can I identify the hash type? Cracked", but did not print the hash value, and the outfile is empty. What is a keyspace? How to deal with special non-latin characters chinese, arabic, etc Why should I use a mask attack?
I want to optimize my Brute-Force attack by ordering letters by frequency in a custom charset. How to do it? Does it make sense? I want to use rules, but there are three different parameters. When do I use -r, -j and -k? OK, there is a hybrid attack for append mask and prepend mask, but what if I want to use both at the same time? When I use --increment in hybrid attack how does that work? How to use multiple dictionaries? When I run an attack with -a 3 and I do not specifying a mask, I see it working but what is it doing?
How does one use the new prince attack mode with hashcat legacy? I have a half-known password. I know the first 4 letters, can hashcat get the rest of the password? Why are there two different hash-modes for Vbulletin? How much faster is cracking on Linux compared to a Windows operating system? How can I perform a benchmark? My desktop lags too much, anything I can do to avoid it?
Is the 64 bit version faster than the 32 bit version? What is it that you call "GPU power"? How to create more work for full speed? Is piping a wordlist slower than reading from file? Why is my attack so slow? How is it possible that hashcat does not utilize all GPUs?
Why does hashcat sometimes get very slow at the end of an attack? Can I restore a hashcat session? I read somewhere to use VCL for distributed cracking, is this still a thing? Can hashcat send an email once a hash has been found? I got a hash cracked on a different computer, can I tell hashcat about that while it is running?
How do I extract the hashes from Office Word, Excel, etc. How do I extract the hashes from PDF documents? How do I extract the hashes from TrueCrypt volumes?
How do I extract the hashes from VeraCrypt volumes? How can I crack passwords from htpasswd? How can I crack SL3? How can I crack multiple WPA handshakes at once? What means "rejected" in the status view? What is the maximum supported password length? What is the maximum supported salt length?
What is the maximum supported password length for optimized kernels? What is the maximum supported salt length for optimized kernels? I do not want hashcat to reject words from my wordlist if they are too long, can it truncate them instead? How can I perform a combinator attack with three wordlists triple combinator, 3-way combinator? Can I load multiple hashlists at once? I want to skip password candidates that have repeating characters.
LM consists of two hashes but are split for use with hashcat. How to get them back into one piece? How can I make sure that my GPU is supported? What is the best GPU for hashcat for "total speed", "speed by watt" and "speed by price"? Is there a general benchmark table for all GPU?
My GPU overheats sometimes. Can hashcat automatically pause in case of overheating or with a script? Why does the temperature reported on the status screen not match the temperature in Afterburner? How many GPU can hashcat handle? Why does hashcat show the wrong GPU memory when I start it?
I created a hash with "echo test md5sum" but hashcat fails to crack it. Line-length exception, wait what? When I use --remove with hashcat legacy the hash sometimes remains even if it was cracked.
Why does hashcat not work with my Kali operating system? Can I use JtR rules with hashcat? Which wordlist are recommended for WPA cracking? Where can I download the source code? What is Team Hashcat?
The reason for this is that the hashcat tools are command line tools only. First, you need to know the details about your operating system: Start by downloading the signing key: Signature made Sat 30 Jun This key is not certified with a trusted signature! There is no indication that the signature belongs to the owner. You want the top download, which will give you a graphical front-end named Kleopatra.
Click on Settings, then Configure Kleopatra. You want to add a keyserver. If Kleopatra doesn't automatically fill everything in for you, use the following settings:. Open up Windows Explorer and navigate to your downloads directory. Verify that the input file is the. For example, you can use the following under Kali Linux: Ensure you have the precise driver version recommended on https: Install the drivers directly from nvidia.
Make sure you download the correct driver: Make sure to stick exactly to the version noted on the hashcat page. Do not install them unless you know what you are doing! If you already have a conflicting driver installed, see I may have the wrong driver installed. Completely uninstall the current driver. If you installed the driver via a package manager Linux , then you need to remove these packages too.
You should find at least 2. This step is very important! Install the driver recommended on https: