Bcmax software speculation bitcoin security
mining refers to the use of bitcoin mining machine to obtain bitcoin, that is, the computer used to earn bitcoin. If you can get bitcoin, you can make money this kind of computer generally has professional mining chips and works by installing a large number of graphics cards, which consumes a lot of power. The computer downloads the mining software and then runs a specific algorithm to get the corresponding bitcoin after communicating with the remote server
precautions:
1. It's better to use DIY mining machine, from purchasing accessories to assembly, and then to mining software, to learn, focus, practice and graally understand the blockchain
Mining is actually a fixed investment process: regardless of the currency price, a certain amount of positions will be increased every day3. The bitcoin wallet used to store bitcoin uses military level encryption, which makes it impossible for hackers to steal easily. Bitcoin wallet also allows users to set two passwords, a public account password and a private password. The user of public account password is to let the user receive bitcoin. If users want to withdraw or transfer bitcoin from their accounts, they need to use a private password
In the discussion of blockchain, bitcoin and other digital currencies, we often hear the word "bifurcation". So what is bifurcation? What is the effect of bifurcation
blockchain
before talking about bifurcation, popularize a little knowledge of blockchain, so as to help us understand what bifurcation is more easily (if you don't have any concept of blockchain, please read my previous articles, which are all popular words to help you understand what blockchain is)
blockchain, as the name suggests, is a chain composed of blocks. Of course, this kind of chain is just a figurative metaphor. To put it bluntly, data blocks are connected orderly. In bitcoin, the transaction records of bitcoin are stored in the block. The size of the block and the space occupied by the transaction records determine how many transactions can be stored in a block. These transaction records are packaged into blocks, and then the blocks are connected one by one to form a blockchain
We know that bitcoin software, like other software, needs to be updated and modified regularly in order to make it better. So a new version will appear, but not everyone will download the new version, so one miner will run the old version, and some will run the new version. If the old and new versions are not compatible, the blockchain will bifurcate. Because there may be differences between the version blocks and the old version blocks, they cannot be connected to the same blockchain, so there will be two or even more chains, which is called bifurcation
soft forking
soft forking refers to that when the new consensus rules are released, nodes that have not been upgraded will proce illegal blocks because they do not know the new consensus rules, resulting in temporary forking. This kind of bifurcation will be graally repaired with the upgrading of nodes
hard fork
hard fork refers to the permanent divergence of the blockchain. After the release of the new consensus rules, some nodes that have not been upgraded cannot verify the blocks proced by the upgraded nodes, and usually hard fork occurs. Therefore, in the field of digital currency, hard bifurcation often leads to the emergence of new currencies. For example, the hard bifurcation of Ethereum led to the emergence of eth
What is bifurcation? What is bitcoin bifurcationYesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
win10 platform is relatively simple, because Microsoft has released relevant patches for this virus vulnerability in early March, so as long as your win10 has been automatically updated and upgraded to the latest version (version number is higher than 1511), you can successfully resist wannacrypt virus
operation steps:
1. "Settings" → "update and security" → "Windows Update", check that this item is on
2. Click the Cortana search box in the taskbar, enter "winver" and confirm that the version number is higher than 1511<
win10 users directly upgrade the latest version
II. Win7, win8.1, WINXP processing flow
for non win10 platform computers, because most of them have exceeded the service period, or e to various reasons, they have not opened the update and received the security patch, which is the hardest hit area of this attack. The solution is to download ms17-010 patch manually. At present, Microsoft has urgently released ms17-010 patch for different platforms, and the direct link address is as follows:
Windows XP (kb4012598)
32 bits:
http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-chs_. Exe
64 bit:
http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x64-custom-enu_. Exe
Windows 7 (kb4012212, kb4012215)
32-bit:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x86_. msu KB4012212
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows6.1-kb4012215-x86_. MSU (kb4012215)
64 bits:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x64_. msu KB4012212
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/03/windows6.1-kb4012215-x64_. MSU (kb4012215)
windows 8.1 (kb4012213, kb4012216)
32-bit:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/02/windows8.1-kb4012213-x86_. msu KB4012213
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/03/windows8.1-kb4012216-x86_. MSU (kb4012216)
64 bits:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/02/windows8.1-kb4012213-x64_. msu KB4012213
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows8.1-kb4012216-x64_. MSU (kb4012216)
for other platforms or server versions, please go to https://technet.microsoft.com/zh-cn/library/security/MS17-010 Download the corresponding patch file
to search your own windows platform, you need to pay attention to the number of version bits (such as 32-bit / 64 bit)
confirm the platform version number again, click the download button of the corresponding version
click the link to download the patch of this platform directly. It should be noted that indivial platforms (such as win7) will contain two patches, Please download and install in order
3. Temporary disposal method
if it is not convenient for the computer to install the patch, or if you don't have a downloaded patch file on hand, you can consider the following temporary disposal method. The temporary disposal method is to shut down the corresponding port number of the system for immunization, which is effective for the current version of the virus, but it does not rule out the possibility of breaking the virus after it has a variant, The specific methods are as follows:
1. Download the 360 NSA immunization tool
NSA Arsenal immunization tool
software version: XP version
software size: 125.34mb
software license: free
applicable platform: WinXP Vista win8 win7
download address: http://dl.pconline.com.cn/download/996906.html
download the NSA immunization tool released by 360 company immediately, It has the characteristics of time-saving, labor-saving and low operation difficulty. The whole toolkit is 125mb. Double click to decompress automatically. Later, you will enter a main interface and operate according to the screen prompts. When the interface is green, it means the system is safe
NSA immune tool released by 360 company
2. Manually close windows 445, 135, 137, 138, 139 ports
in addition to the existing tools, you can also manually close 445, 135, 137, 138, 139 ports to resist virus attacks. The specific operation steps are as follows:
2.1 close ports 135, 137 and 138
1. Run and input "dcomcnfg"
2. On the right side of the computer option, right-click My Computer and select properties
3. In the default properties tab of my computer properties dialog box, remove the check box before enable Distributed COM on this computer
4. Select the default protocol tab, select connection oriented TCP / IP, and click delete
5. Right click on the network neighborhood to select properties, right click the network tab, and remove the check boxes of Microsoft network file and printer sharing and Microsoft network client to close ports 135, 137, 138 of the sharing end
manually close port
2.2 close port 139
open "network and dial up connection" → "local connection", select "Internet Protocol (TCP / IP)" attribute, enter "advanced TCP / IP settings" → "wins settings", there is a "disable TCP / IP NetBIOS", check to close port 139
2.3 close port 445
"start" → "run", enter "regedit", confirm and locate to "HKEY"_ LOCAL_ MACHINE\ SYSTEM\ CurrentControlSet\ Servi ces\ NetBT\ Parameters ", create a new DWORD value named" smbdeviceenabled "and set it to 0, then port 445 can be closed
note: after manually closing the port number, some intranet services (such as file and printer sharing) may fail. Please choose carefully
write at the end
wannacrypt is one of the most harmful viruses in recent years, second only to the shock wave of that year. The most important thing is that this virus will affect the hard disk data, and it is almost impossible to crack at present. The current method is that wannacrypt will automatically delete the original file before encryption, so some professional data recovery software can be used to try to recover. In short, keeping the system up-to-date is the best way to defend against viruses.
bchc, launched by bitcherry, is a token within the Distributed E-Commerce ecosystem.
1. They hype themselves and pave the way for their bifurcating bitcoin. For example, Liao Xiang, who once strongly opposed big blocks, paid big money, and they all bifurcated bitcoin
2. Misled by the core development team, the melon eaters regard the miners as a group of criminals
3. The core development group's opposition to BCH is not only a divergence of development roadmap, but also a dispute of interests. The lightning network promoted by the core development group can make the gold owners behind it profit through the lightning network.
(2) three sulfur atoms
(3) iron
(4) five phosphorus atoms
132 is the GSM mobile phone number segment of China Unicom
the full name of GSM is: global mobile communication system in Chinese, commonly known as & quot; Global communication;, The digital mobile phone network standard developed by Europe aims to make all parts of the world use one mobile phone network standard, so that users can travel all over the world with one mobile phone. GSM system includes GSM 900:900mhz, gsm1800:1800mhz, gsm-1900 and 1900MHz
3G service mobile phone: compared with the first generation analog mobile phone (1g) and the second generation GSM, TDMA and other digital mobile phones (2G), the third generation mobile phone generally refers to the new generation mobile communication system that combines wireless communication with Internet and other multimedia communication. It can process images, music, video and other media forms, and provide a variety of information services including web browsing, teleconference, e-commerce and so on. In order to provide this service, the wireless network must be able to support different data transmission speeds, that is, at least 2Mbps (Mbps), 384kbps (kbps) and 144kbps in indoor, outdoor and driving environments respectively. The powerful function is based on the extremely high data transmission speed of 3G mobile phone. The transmission speed of GSM mobile communication network is 9.6kb/s, while the data transmission speed of the third generation mobile phone will be as high as 2Mb / s
reference materials:
GSM mobile phone: http://ke..com/link?url=_ V39eybmz17fw8ibwhq
3G service mobile phone: http://ke..com/link?url=-J0ybj5os_ aDpVptpcfWEQl8HX7tc7A--hmcaNAc_ AF5gt9K0s5HqXq