Avoid bitcoin
1. The nature of the two currencies is different: bitcoin is an encrypted digital currency, and Morgan is a typical MLM currency
(1) bitcoin is a consensus network, contributing to a new payment system and a fully digital currency. It is the first decentralized peer-to-peer payment network, which is controlled by its users without a central management organization or middleman (2) Morgan is a kind of typical MLM currency, they often promise high income, the information of the founding operation team is not open, and they have the background of international large companies, so they put forward a set of seemingly reasonable economic theory P>
extension data: the harm of
network currency: the extensive application of
1 and virtual currency is also accelerating the rampant network robbers.
(1) in December 2006, the Shenzhen Public Security Bureau announced that it had cracked the country's largest theft network virtual property case, and 11 suspect was arrested. The gang used trojan virus to illegally steal virtual property such as tens of thousands of QQ numbers and QQ coins, and sold stolen goods on the network, making a profit of more than 700000 yuan
(2) in this case, the virtual currency Q was used as the standard of conviction and sentencing, and the police's arrest of illegal elements on suspicion of theft is a special case. The reason is that Tencent has filed with the Guangdong Provincial Price Bureau, and one q is equivalent to 1 yuan
(3) online currency is used more and more widely, for example, it can be used to buy anti-virus software online, vote for super girl, and some websites even use online currency to pay the moderator
2. Outside the business system, because indivial virtual currency has become the "equivalent" of RMB, or even "online RMB", which shows the role of "network hard currency", the illegal gains of illegal gambling can be cashed into RMB, which further promotes online gambling
bitcoin is not a scam, but the transaction of bitcoin is more terrible than a scam
if you want to find out whether the bitcoin transaction is a fraud, you should first know what bitcoin is and what bitcoin is. blockchain technology will never pass
bitcoin has no official supervision. Even if there is a regulatory agency, how can it be supervised? These are all problems. The banker wants you to go up. Do you think it's hard for the banker? If the dealer throws in one billion yuan more for a billion yuan plate, the price of bitcoin will increase by 10%. But if you want to increase by 10%, do you have the ability to prepare 100 million yuan to throw in
of course, this is just an example. Rich people harvest leeks much faster than ordinary people understand. So for stocks, futures, especially bitcoin and other things with financial attributes, we should focus on less touch. Otherwise, how do you think the rich harvest you
March 25 (Xinhua) Zhong, an employee of an Internet technology company in Haidian District of Beijing, took advantage of his position to steal 100 bitcoins from the company by inserting codes with the permission of the administrator to modify the application program in the company's server. Reporters learned from the 24 people's Procuratorate of Haidian District, Beijing, that the procuratorial organ approved the arrest of the suspect according to the law on suspicion of illegally obtaining the data of computer information system. P>

the prosecutor of the case, Ji Jingling, said that according to the criminal law of the People's Republic of China and the relevant laws and regulations, the suspect, Zhong Mou, violated the state regulations and used technical means to acquire data stored in the computer information system. His behavior had violated the criminal law and was suspected of illegally obtaining data from computer information system. The procuratorial organ has approved the arrest of the suspect Zhong Mou according to law. p>
There are several reasons as follows:
1. Foxconn was blackmailed by hackers for 1804 bitcoins. Foxconn's response is not a big problem< p> According to media reports, Foxconn was attacked by hackers who asked for 1804 bitcoins. For a while, everyone wanted to know what Foxconn would do, so Foxconn said, "it's not a big problem, it's being dealt with "
in a word, according to the above analysis, the advantage of bitcoin to hackers is that they only need bitcoin< otherwise, if you take other money, you will have to spend your life strong>
then close ports 445, 135, 137, 138 and 139 to turn off network sharing. So it's safe.
prevention:
at present, the main way of poisoning is through most of the attacks coming from phishing e-mail, or the website with malware visited by the victims
don't open the e-mail with unknown source, don't click the unsafe link, don't scan the QR code with unknown source, and don't give permission to the software with unknown source
Computer Xiao can pinch the Internet to avoid the limelight
{rrrrrrr}
treatment:
1. Firewall shielding port 445
2. System update with windows update
3. Turn off smbv1 service
3.1 is suitable for customers running Windows 8.1 or Windows Server 2012 R2 and later
for client operating system:
open control panel and click program, Then click turn windows features on or off
in the windows features window, clear the SMB 1.0/cifs file sharing support check box, and then click OK to close this window
restart the system
3.2 for server operating system:
open "server manager", click "management" menu, and then select "delete roles and functions"
in the features window, clear the SMB 1.0/cifs
file sharing support check box, and then click OK to close this window
restart the system
3.3 is suitable for running Windows 7, Windows Server 2008 R2, Windows Vista and Windows Server 2008. Modify the registry
registry path: HKEY_ LOCAL_ Machine system currentcontrolset services llanmanserver parameters
New Item: smb1, value 0 (DWORD)
restart the computer
1: open the blackmail software interface, Click. ( the hacker's bitcoin address)
2: paste it into btc.com (blockchain query)
3: find the transaction record of the hacker's collection address in the blockchain query, Then choose a txid (transaction hash value)
4: and paste the txid to the blackmail software interface button connect us.
5: after the hacker sees it, you can click check payment.
6: then click decrypt to decrypt the file
