Bitcoin virus hacker video
The virus in the "bitcoin virus" incident is known as "ransomware". By encrypting the files in the victim's computer, you can't open them completely to ask for ransom. This is a virus attack launched by lawless elements by using "eternal blue" leaked from NSA hacker's weapon library. It does not need any operation of users. As long as it is turned on and connected to the Internet, lawless elements can implant blackmail software into computers and servers
What's more terrible is that this is just the beginning. Now this blackmail virus has spread to all over the world, including many colleges and universities in China. You can see many students on the Internet showing pictures of their computers being attacked. I have to say that hackers are really well intentioned, even in simplified Chinese
in May 2017, computer network virus attacks have spread to 74 countries, including the United States, the United Kingdom, China, Russia, Spain, Italy, etc.
Hayek studied business cycle theory and monetary theory with his teacher Mises early in his academic career. In 1931, he published "price and proction". Because the proposition in the book is contrary to Keynes's "on money" published a year ago, they launched a debate
The most typical example of
is gold and silver. For a long time, gold and silver were the common currency in the world. The hard currency of trade in all countries did not belong to any one country. Even in the era of gold standard, the state issues legal paper money, but legal paper money is still anchored by the free competition of gold. Gold circulates freely in the world and is more rigid than paper money
There are at least three reasons that lead to the existence of a large number of competitive currencies:one is the existence of multi-level market, because the metal currency is not easy to cut, super zero denomination currency and silver currency coexist
In the 18th and 19th centuries, there were long-standing high-ranking gold coins in Bangladesh, such as mulu, Sika rupee, middle akut rupee, and low ranking copper coins and BEIBI coins. Because silver coins are not easy to cut, a large number of shell coins with zero denomination are needed in remote areas and small exchangethis situation existed for a long time in ancient China, and the copper coin standard lasted for more than a thousand years in ancient China, but the iron coin also circulated for a long time (such as the Song Dynasty), and the face value of iron coin was smaller than that of copper coin. In the Qing Dynasty, with the discovery of Potosi silver mine in South America, a large number of silver coins flowed into China. Around 1730, the use of silver and money accounted for half of the transactions. Compared with copper coin, silver coin has a larger denomination, which is convenient for large transaction and solves the problem that copper coin is not easy to transport
The second is seasonal deflation, and private coins balance market demandin the agricultural era, the transaction volume of agricultural procts accounted for a large proportion, and a large amount of money was used for agricultural procts transaction. However, agricultural procts have obvious seasonality, and the transportation and supply of metal money is extremely inconvenient, so the problem of insufficient money often appears in the harvest season. In his book, Professor Kuroda cites the example of Quanzhou, Fujian Province, China in 1606. The original inventory management money could not meet the rice trade, so the private money was imported to meet the market demand to balance supply and demand. This kind of situation happens every year in China. Every year, it is the peak of money demand near the Spring Festival. The central bank will release part of liquidity to balance supply and demand
Thirdly, metal currency is a kind of deflation currency, which circulates a variety of currencies in regional and specific areas In his book, Professor Kuroda cites Nadina Jebel's case, "the transactions of grains such as rice are used for sonoto silver coins, the transactions of oils and fats are only used for French akote rupees or British akote rupees, and the transactions of flax are only used for French akote rupees." At the beginning of the 20th century, in China, all kinds of silver coins were circulated in Jiujiang, Jiangxi Province. Mexican silver coins were used for the export of tea and porcelain procts in Shanghai, and silver coins issued locally in Jiangsu Province were used for the trade of local markets such as tobacco or beans. There are also silver bills used in Shanxi business circle, and various copper coins used in the coin community around the China Sea, including Japan, North Korea, Southeast Asia and other countriesthe problems of metal currency in multi-level market, seasonal deflation, regionality and specific fields do not exist in today's credit currency era. Many of the competitive currencies listed by Professor Kuroda also disappeared in the globalization of silver coins and the legal tender system
therefore, the monetary pattern of countries in the world we see today is one country one currency, which is legally issued by the state monopoly
Zhiben society is a hard core learning society that listens to hard lessons, reads hard books and reads hard texts. Wechat search "benshe" (ID: benshe0-1) to learn more in-depth contentAt the beginning, I heard that it was so serious all of a sudden. As a practitioner, I really had a sense of fear. Once it spread in my scope, it would cause endless trouble to my work. Moreover, some phenomena were exaggerated in the report, such as unnecessary operation and automatic infection of virus. I don't know how this principle came about. Is it a myth of network technology, Viruses, Trojans and malware become uncontrollable demons
"eternal blue virus" can scan windows machines with open 445 file sharing port to implant malicious programs. There are no absolutely safe operating systems in the world. They are all early systems of foreigners. Besides, there are no flawless things in the world. I have to learn more and take good precautions. I am engaged in enterprise information and security work. I know the dangers of viruses, Trojans and malicious programs, and I can't help the panda who gets up early to burn incense. There are a lot of solutions, but some people are still poisoned
how to shut down ports 445, 135, 137, 138 and 139 and turn off network sharing can also avoid winning. The method is as follows:
run, input "dcomcnfg", right-click "my computer" on the right of "computer" option, and select "properties". In the default properties tab of my computer properties dialog box, remove the check before "enable Distributed COM on this computer", select the default protocol tab, select "connection oriented TCP / IP", click "delete" button,
Close ports 135, 137 and 138: right click the network neighbor to select properties, On the new connection, right-click to select properties, and then select the network tab to remove the check boxes of Microsoft network file and printer sharing and Microsoft network client. In this way, ports 135, 137 and 138 on the shared end are closed
Close port 139: Port 139 is a NetBIOS session port for file and print sharing. The way to close 139 is to select "Internet Protocol (TCP / IP)" attribute in "local connection" in "network and dial-up connection", enter "advanced TCP / IP settings" and "disable TCP / IP NetBIOS" in "wins settings", and check to close 139 port
Close port 445: start - run, input regedit. After confirming, locate to HKEY_ LOCAL_ Machine, system, currentcontrolset, services, NetBt, parameters, create a new DWORD value named smbdeviceenabled, and set it to 0 to close port 445
whether practitioners or ordinary users, it is a difficult problem to face the virus Trojan horse vulnerability and malicious code. How to ensure their own safety is to take action in advance, take precautions, keep the safety warning in mind, and do not surf the Internet, operate or click randomly. There are so many bad guys that it is impossible to prevent them. Then the whole society should take action to make the virus and bad guys have no place to hide
For merchants or indivials, the most simple and direct way to realize online payment is to open the online payment interface
the third-party payment platform is no stranger to us. For indivials, from shopping in supermarkets to shopping in markets to buying houses and cars, we live in the scene of third-party payment every day. For businesses, the third-party payment interface plays an important role in raw material procurement, commodity trading, cross-border settlement and so on. Generally speaking, the settlement process of third-party payment platform can be divided into three steps: merchant registration, website filing and website registration. Every step of the process, there are many details to pay attention to
merchant registration
Step 1: registration. Log in to the third-party payment platform you want to register, and register your account according to the platform prompts. If you encounter any problems in the registration, you should contact the third-party payment platform in time. Generally, customer service is online for 7 * 24 hours
Step 2: audit. After the data is submitted, the platform needs time to audit. The audit time of different platforms may be different, ranging from one day to one week. Generally, the notification method is to inform the registrant by email or mobile phone. Take smart payment as an example. With complete information, the audit can be completed in 1-3 working days, and the audit results will be sent by email
however, sometimes the audit fails. At this point, you need to check whether the information submitted to the third-party payment platform is wrong. Generally speaking, there are the following types of audit failure:
1, incomplete data. It includes that the merchant does not fill in the registered domain name, the indivial merchant does not upload the positive and negative sides of the personal ID card, the positive and negative sides of the personal bank card, the bank account information, and the enterprise merchant does not upload the enterprise five certificates (enterprise business license, tax registration certificate, organization code certificate, front and back sides of the enterprise legal person id card, and account opening license)
2
3. The certificate is not clear, true, complete and invalid
4. The contact person is inconsistent with the certifier
The contact information was invalid6. The account name is inconsistent with the certifier
7. The settlement account number is inconsistent with the account number on the bank certificate
8. The ID number was input incorrectly
9. The domain name of the registered website was not recorded
10. The registered business name is inconsistent with the registered domain name
11, the website can not be accessed, blocked by network tools, prompted as a dangerous website, etc
12. The contact information of the website is inconsistent with the registered contact information, the business content on the website is inconsistent with the record information, the website content is abnormal, and there is no smooth shopping process on the website
website filing
website filing of third party payment platform generally refers to ICP filing. The so-called ICP filing means that all enterprises, institutions and indivials engaged in non-profit Internet information services should apply to the information instry authorities of provinces, autonomous regions and municipalities directly under the central government for filing proceres, and those websites that fail to file within the time limit will be closed. There is one thing to pay attention to when recording ICP. This access provider can be a service provider of website domain name, and the third-party payment is not an access provider. It is not responsible for dealing with the problem of customer filing. The specific filing process can refer to the following figure:
there are two cases of registering merchants on the third-party payment platform, one is indivial registration, the other is agent addition
1) indivial self registration. Register according to the prompt steps of the third party payment platform. Take smart payment as an example, after successful registration, login according to the merchant number, user name and password sent in the email. After successfully logging into the business management background, upload the five enterprise certificates (business license, tax registration certificate, organization code certificate, both sides of corporate identity certificate and account opening license) and fill in the relevant information according to the prompts on the page. After the merchant completes the background information, the third-party payment platform will notify by email within three working days. Please check the email for the specific results
2) agents add merchants. In the agent management background, click "business management" -- "add" -- improve the business registration information (please select "enterprise" in the process of improvement). After the successful addition, the merchant will receive the email of successful registration. According to the email prompt, log in to the merchant's background to improve the information. The third-party payment platform will give an email reply within three working days after the merchant completes the information
eat and drink: this apartment is located in the east of beilongkou, Tianhe District, Guangzhou. There are many restaurants downstairs. Don't go to those so-called authentic fast food restaurants in Guangzhou, such as daxihao. There are many restaurants downstairs. It's recommended not to go to those so-called century old brands, such as Taiping shacaiji. Walk downstairs to Tianrun road for a few minutes, There are many authentic Cantonese restaurants, which are not expensive! There are too many restaurants in that area. They are not expensive and delicious; Or go to the east of Longkou to Shipai, which is the largest computer city in Guangzhou. There are many restaurants along the road, which are very good. Then go to Beijing road or fashion front, where there are many places to eat, but not many authentic Cantonese food<
play and shopping: Beijing Road Pedestrian Street, fashion front, shangxiajiuhe Zhuangyuanfang (take 102 from Beijing Road to shangxiajiuhe Zhuangyuanfang, pay attention to avoid the rush hour, otherwise it's crowded), the bus line can be inquired, I don't think it's necessary to buy a map, information can be found on the Internet. You can go to the site of Nanyue King's mausoleum. You don't need Zhongshan Memorial Hall. There's nothing to see. The martyrs' cemetery is just a park with some tombstones. You can have a look at Xiguan. Then you can go to Haizhu bridge to have a look in the daytime and at night. You can get there by subway. It's very convenient. If you like to sing K, it is recommended that you go to karaoke king. In the vicinity of Guangzhou computer city, it's about 15 minutes' walk from Longkou East. It's very convenient. It's only 35 yuan a month from 5:00 p.m. to 9:00 p.m. plus buffet. It's super cost-effective
if you want to look at the history, there are not many places in Guangzhou, but there are still a lot of places to play. In the past, it was enough for you to play for four days
note: when taking a bus, you must prepare change. The driver won't give you change, and try not to ask the driver where to get off, because the attitude of drivers in Guangzhou is very bad
I hope the above information is helpful to you< br />
