Position: Home page » Bitcoin » BTC command

BTC command

Publish: 2021-04-14 10:31:31
1.

Novice first of all to know how to calculate your cost, recharge, trading, cash, there are fees. At least you can understand the K-line. There are a lot of people on the K-line. You can look at it casually and understand it. You need to be risk aware. bitcoin is a high-risk and high profit investment. It may double overnight, or BMW may become a bicycle overnight. At the beginning, we suggest a small amount of investment

but it's hard to get bitcoin for indivial mining, so it's basically large-scale mining, and you need to cooperate with the mine pool. So if you still want to make money by mining, at present, the most suitable mining method is cloud mining or mining machine hosting. After all, the era of single person mining is over

2. Bitcoin is not "overvalued", so buying bitcoin is not attractive. However, when bitcoin falls sharply, people are even less interested in buying it. This was proved in 2017, when prices soared and the market reaction was close to madness. First register the account number, fill in the relevant information, receive the email to complete the registration, complete the registration, fill in the personal information, and finally go to the trading center to buy
3. Did you ask freebtc
or did you say freebitcoin
this is related to bitcoin. It is estimated that this file is a bitcoin related program, mainly about the content of the notice file. I guess you don't like it. They all have special technical column posts to share
if you are in operation and maintenance, you can take a look at Linux and try it. It's suggested that we take a look at a column in "Linux should learn like this". It's a column that Linux command Encyclopedia (manual) joins our group
4.

Bit operation instruction, 8086 a new set of instructions, including bit test, bit scan. BT, BTC, BTR, BTS, BSF, bsrbts (bit test and set), test collocation, usage and rules are the same as BT, but in some different functions, it not only sends the value of the bit to be tested to CF, but also sends the bit of the position (i.e. set 1)

5. BT instruction

format: BT OPD, OPS
-

function: the bits specified by source ops in destination OPD are sent to CF flag
note: 1. In instruction, destination OPD can only be 16 / 32-bit general-purpose register or storage unit, which is used to specify the data to be tested; The source operands OPS must be 8-bit immediate or 16 / 32-bit general-purpose registers with the same length as the destination operands, which are used to specify the bits to be tested. If the destination operands are registers, the remainder of the source operands divided by 16 / 32 is the bits to be tested, which is between 0-15 / 31.

2; EAX=12345678H

BT EAX,5 ; D5 bit of eax = 1 -- & gt; CF, eax = 12345678h

note: if the destination operand is a storage unit, then the lowest bit of the unit is 0. Increment from the lowest bit to each bit at the high end of the address and decrement to each bit at the low end of the address. This part of memory data is a 2g-1 ~ - 2G bit string, The signed source operands indicate the bits to be tested
6. CPU extended instruction set CPU relies on instructions to calculate and control the system. Each CPU is designed with a series of instruction systems that match its hardware circuit. Instruction set is one of the most effective tools to improve the efficiency of microprocessor. From the current mainstream architecture, instruction set can be divided into complex instruction set and reced instruction set. From the specific application, such as Intel's MMX (multi media extended), SSE, SSE2 (streaming single instruction multiple data extensions 2), see3 and AMD's 3DNOW! These are the extended instruction sets of CPU, which enhance the processing ability of multimedia, graphics and Internet. We usually refer to the extended instruction set of CPU as the instruction set of CPU. Sse3 instruction set is also the smallest instruction set at present. Previously, MMX contained 57 commands, SSE contained 50 commands, SSE2 contained 144 commands, and sse3 contained 13 commands. At present, sse3 is also the most advanced instruction set. Intel Prescott processor already supports sse3 instruction set. AMD will add support for sse3 instruction set to al core processor in the future, and quanmeida processor will also support this instruction set<

instruction set:
(1) to know what instruction set is, we should start with the CPU of x86 architecture. The x86 instruction set is specially developed by Intel for its first 16 bit CPU (i8086). The CPU of the world's first PC, i8088 (simplified version of i8086), which was launched by IBM in 1981, also uses the x86 instruction. At the same time, in order to improve the floating-point data processing ability, the data coprocessor of the x87 chip family added to the computer uses the x87 instruction, Later, the x86 instruction set and the x87 instruction set are collectively referred to as the x86 instruction set. With the continuous development of CPU technology, Intel has developed updated i80386 and i80486 until today. However, in order to ensure that computers can continue to run all kinds of applications developed in the past to protect and inherit rich software resources, all CPUs proced by Intel still continue to use x86 instruction set, so their CPUs still belong to x86 series. Because Intel x86 series and its compatible CPUs all use x86 instruction set, today's huge lineup of X86 series and compatible CPUs has been formed
(2) RISC instruction set RISC instruction set is the future development direction of high performance CPU. It is opposite to the traditional CISC (complex instruction set). In contrast, RISC has a unified instruction format, fewer types, and fewer addressing modes than complex instruction sets. Of course, the processing speed is much faster. The RISC instruction set is also compatible with the original x86 instruction set.
7. 1. General data transfer instruction.
mov transfers word or byte.
movsx extends symbol first, then transfers.
movzx extends zero first, then transfers.

movsx reg16, R / M8; o16 0F BE /r [386]
MOVSX reg32,r/m8 ; o32 0F BE /r [386]
MOVSX reg32,r/m16 ; o32 0F BF /r [386]

MOVZX reg16,r/m8 ; o16 0F B6 /r [386]
MOVZX reg32,r/m8 ; o32 0F B6 /r [386]
MOVZX reg32,r/m16 ; O320f B7 / R [386]

push pushes the word into the stack.
pop pops the word out of the stack.
pusha pushes ax, CX, DX, BX, SP, BP, Si, di into the stack in turn.
PopA pushes Di, Si, BP, SP, BX, DX, CX, ax out of the stack in turn.
PUSHAD pushes eax, ECX, EDX, ebx, esp, EBP, ESI, EDI is pushed into the stack in turn.
POPAD pops EDI, ESI, EBP, esp, ebx, EDX, ECX, eax out of the stack in turn.
bswap switches the order of bytes in 32-bit registers.
xchg switches words or bytes. (at least one of the operands is a register, Segment registers cannot be used as operands)
cmpxchg compares and exchanges operands. (the second operand must be accumulator Al / ax / eax)
xadd exchanges first and then accumulates. (the result is in the first operand)
xlat byte table lookup conversion.
- BX points to the starting point of a 256 byte table, Al is the index value of the table (0-255,
0-ffh); Return Al as the result of table lookup ([BX + al] - & gt; Al)
2. I / O port transmit instruction.
in I / O port input. (Syntax: in accumulator, {port number │ DX})
out I / O port output. (Syntax: out {port number │ DX}), accumulator)
when I / O port is specified by immediate mode, its range is 0-255; When specified by register DX,
its range is 0-65535.
3. Destination address transfer instruction.
lea loads the valid address.
example: lea DX, string; Save the offset address to DX.
LDS transfers the target pointer and loads the pointer content into DS.
example: LDS, Si, string; Save the segment address: offset address to ds: Si.
Les transfers the target pointer, and loads the pointer content into es.
example: les, Di, string; Save the segment address: offset address to es: di.
LFS transfers the target pointer and loads the pointer content into FS.
example: LFS, Di, string; Save the segment address: offset address to FS: di.
LGS transfers the target pointer and loads the pointer content into GS.
example: LGS, Di, string; Save the segment address: offset address to GS: di.
LSS transmits the target pointer and loads the pointer content into SS.
example: LSS, Di, string; Save the segment address: offset address to SS: di.
4. Flag transfer instruction.
lahf flag register transfer, load the flag into ah.
SAHF flag register transfer, Load the ah content into the flag register.
pushf flag is put on the stack.
POPF flag is put on the stack.
pushd 32-bit flag is put on the stack.
POPD 32-bit flag is put on the stack.

II Arithmetic instruction
add add.
ADC add with carry.
Inc add 1.
ASCII adjustment of AAA add.
decimal adjustment of DAA add.
sub subtraction.
SBB subtract with borrow.
Dec subtract 1.
NEC negate (subtract by 0). < br />CMP comparison. (two operands are subtracted, only the flag bit is modified, and the result is not returned)
ASCII adjustment of AAS subtraction.
decimal adjustment of Das subtraction.
mul unsigned multiplication.
imul integer multiplication.
ah and Al (byte operation), or DX and ax (word operation) are returned,
adjust the ASCII code of AAM multiplication.
div unsigned division.
IDIV integer division.
the above two results are returned:
quotient returns Al, remainder returns ah, (byte operation)
or quotient returns ax, remainder returns DX, (word operation)
adjustment of ASCII code for aad division.
Convert CBW bytes to words. (extend symbols of bytes in Al to ah)
Convert CWD words to doublewords. (extend symbols of words in ax to DX)
Convert CWDE words to doublewords. (extend symbols of words in ax to eax)
Expand CDQ doublewords (extend the symbol of words in eax to EDX)

3. Logic operation instruction
and operation.
or operation.
XOR operation.
not negate.
test test. (two operands operate and, only modify flag bit, No return result)
SHL logic shift left.
Sal arithmetic shift left. (= SHL)
SHR logic shift right.
SAR arithmetic shift right. (= SHR)
rol cycle shift left.
ror cycle shift right.
RCL shift left through carry cycle.
RCR shift right through carry cycle.
the results of SHL shift left For the above eight shift instructions, the number of shifts can be up to 255 times.
when shifting once, the opcode can be directly used. For example, SHL ax, 1.
shift & gt; For example, MOV Cl, 04
SHL ax, CL

four String instruction
ds: Si source string segment register: source string index.
es: Di target string segment register: target string index.
CX repeat counter.
Al / ax scan value.
d flag 0 indicates that Si and di should be incremented automatically ring repeat operation; The Z flag is used to control the end of the scan or compare operation.
MOVs string transfer.
(MoVSb transfer character. Movsw transfer word. Movsd transfer double word.)
CMPs string comparison.
(cmpsb compare character. Cmpsw compare word.)
SCAs string scan.
/>Compare the content of Al or ax with the target string, The comparison result is reflected in the flag bit.
LODs loads the string.
loads the elements (words or bytes) in the source string into Al or ax one by one.
(lodsb transmits characters. Lodsw transmits words. Lodsd transmits doublewords.)
STOs saves the string.
is the reverse process of LODs.
rep when CX / ECX & lt& gt; 0.
repe / repz when ZF = 1 or the comparison results are equal, and CX / ECX & lt& gt; 0.
repne / repnz when ZF = 0 or the comparison results are not equal, and CX / ECX & lt& gt; When CF = 1 and CX / ECX & lt& gt; When CF = 0 and CX / ECX & lt& gt; 5. Program transfer instructions
1 & gt; Unconditional transfer instruction (long transfer)
JMP unconditional transfer instruction
call procere call
RET / retf procere return.
2 & gt; Conditional transfer instruction (short transfer, within the distance from - 128 to + 127)
(if and only if (SF XOR of) = 1, OP1 JA / JNBE is not less than or equal to transfer.
Jae / JNB is greater than or equal to transfer.
JB / jnae is less than transfer.
JBE / JNA is less than or equal to transfer.
the above four, Test the result of signed integer operation (flag C and z)
JG / jnle is greater than transition.
jge / JnL is greater than or equal to transition.
JL / jnge is less than transition.
JLE / JNG is less than or equal to transition.
above four items, test the result of signed integer operation (flag s, When jne / JNZ is not equal to transfer.
JC transfers with carry.
JNC transfers without carry.
jno transfers without overflow.
JNP / JPO transfers with odd parity.
JNS sign bit is & quot; 0" Time transition.
Jo overflow transition.
transition when JP / JPE parity is even.
JS symbol bit is & quot; 1"
3 & gt; Loop control command (short transfer)
loop CX is not zero.
loop / loopz CX is not zero and flag z = 1.
loop Ne / loopnz CX is not zero and flag z = 0.
jcxz CX is zero.
jecxz ECX is zero.
4 & gt; Interrupt instruction
int interrupt instruction
into overflow interrupt
IRET interrupt return
5 & gt; Processor control instruction
HLT processor pause, When the chip lead test is high, the CPU will enter the waiting state.
ESC switches to the external processor.
lock blocks the bus.
NOP null operation.
STC set carry flag.
CLC clear carry flag.
CMC carry flag Flag reverse.
STD set direction flag.
CLD clear direction flag.
STI set interrupt permission.
cli clear interrupt permission.

VI Pseudo instruction
DW definition word (2 bytes).
proc definition process.
end process.
segment definition segment.
establish segment register addressing.
ends segment.
end program.

seven bit operation instruction, Processor control instruction
1. Bit operation instruction, a new set of instructions in 8086, including bit test and bit scan. BT, BTC, BTR, BTS, BSF, BSR
1.1 BT (bit test), bit test instruction, instruction format:
BT OPRD1, oprd2, rule: OPRD1 can be a 16 bit or 32-bit general-purpose register or storage unit. Oprd2 must be an 8-bit immediate or a general-purpose register of the same length as OPRD1. If oprd2 is divided by OPRD1, assuming the quotient is stored in div and the remainder is stored in mod, then mod is the bit number to test OPRD1 operands. Its main function is to send the value of the bit to be tested to cf. take a few simple examples:
1.2 BTC (bit test and complexity). The usage and rules of testing and negating are the same as BT, but the functions are different, It not only sends the value of the bit to be tested to CF, but also reverses the bit< br />1.3 BTR(Bit Test And Reset),
8. First, we need to find a stable bitcoin mine pool which is easy to operate, and then connect to the designated server to mine through the mining client software. Take "BTC guide" website as an example. First open this website and click the user registration on the left. The registration process is relatively simple, just input the English user name, password and confirmation password, as shown in the figure

2
after successful registration, we will see a message like "your account has been successfully registered and logged in!" on the webpage, It means that we have successfully registered and logged in, as shown in the figure

3
we can click the "dashboard" button in the upper left corner to see the whole monitoring status of the account, as shown in the figure
note: in this monitoring dashboard, we are most concerned about "total earnings", which is the bitcoin earned by our current account. In the future, as long as we open the website and enter the monitoring dashboard, we can see the relevant information of our account

4
next, click "Settings" in the navigation bar of the page. In the settings page, we can set the e-mail address, bit wallet address, change the password, etc., as shown in the figure

5
if we set the e-mail address in the account, if we forget the password or steal it in the future, we can restore the password through the set e-mail. First, enter our common email address in the "email address" column, and then click the "change" button, as shown in the figure

6
next, a confirmation email will be displayed on the page that has been sent to our previously set email, as shown in the figure

7
then we open our email and find the email sent by BTC guide. Click the confirmation link, and then the page will show that our email has been set successfully, as shown in the figure

8
if we set email in account setting, we can also set email notification for mining miners' behavior. Find the "idle warnings" column on the setting page, click the drop-down list, select the time when you want to send the email, and then click the "change" button on the right. When we set 10 minutes later, if a miner stops mining, the system will automatically send a notification email to our email after 10 minutes. After receiving the email, we knew that the miner was on strike

9
in addition, we are more concerned about the "bitcoin wallet", that is, the wallet address. You don't need to set this address first. It's not too late for me to fill in when I really get bitcoin

10
after the account is set, we need to set "worker". What is a worker? This is the login account name we will use later on the bitcoin mining client. The system will create a miner name for us by default. The miner name is composed of our registered account name, an underline and a number. For example, our registered account is XXX, and the first miner's name is "XXX"_ 1 ", as shown in the figure

11
if we want to set more than one miner's name, enter a number such as" 2 "in the" create worker "column, and then click the" create "button to add a new miner's account name, as shown in the figure

12
in the worker settings page, we can also set the mining payment mode of the mining account. Payment method, i.e. mining payment method. There are two types to choose from, PPS and PPLNs. The difference lies in the mining mode and handling charge. The handling charge of PPS is 7.5%, while that of PPLNs is 3%. The system adopts PPLNs by default. If you want to change it, please click the "change" button under the payment method

13
in addition, we can also choose the difficulty of mining mode. If our computer has multiple graphics card GPUs or some special machines, we can set the miner's account name under the minimum difficulty, as shown in the figure

end
Step 2, download the mining client software
1
after we register and set up, Next, please click "support" in the page navigation menu, and we will see the download link of the client< There are two types of mining client software:
bfgminer: command line operation interface, which can be downloaded directly
cgminer: it is also operated in the command line format, but the download steps are too complicated
let's take bfgminer as an example and click download as shown in the figure

2
then it will jump to the download page of mining tools. There are two formats of mining tools, one is 32-bit system, the other is 64 bit system. According to the number of system bits, download the corresponding tool version, as shown in the figure

3
mining tool client size is less than 5m, it is a zip compressed file. When the download is complete, locate and open the file. Click the right mouse button and select the "" option, as shown in the figure

4
here I take paste extraction to the desktop as an example, as shown in the figure

end
Step 3, mining client software detailed settings
1
after opening the mining directory, double-click the "bfgminer" file under the directory, As shown in the figure,

2
next, look at the BFG minier window and enter the address of the ore pool at the URL. The pool address can be seen in the BTC guide's support page, such as stratum. Btcguild com:3333 , press enter, as shown in the figure,

3
and then enter the miner's name that you previously set on BTC guide website after the user name, press enter, as shown in the figure,

4
you can enter it at will at the password, As shown in the figure,

5
finally, you can see that many numbers are changing, indicating that mining is in progress. It is worth noting that the places marked in the figure indicate the current machine button speed, as shown in the figure

6
in addition to the current mining speed on the mining client software, we can also see the specific mining speed of each miner in the "active worker summary" list on the "dashboard" page of BTC guide website, As shown in the figure,

7
if you want to close the mining tool, you can directly drop X or press Q to exit. If you want to open more, you can open another mining tool in the BFG miner directory< Step 4, cgminer command line client software
1
if you really want to mine, the official recommends us to use "cgminer", that is, to run it at the command prompt. Click "support" on BTC guide page, and then click "cgminer" download link page, select the corresponding system version, as shown in the figure

2
then jump to cgminer download page and click the link marked in the figure

3
and then select a version of cgminer. Here I download a Windows version as an example, as shown in the figure

4
here I take the Windows version of cgminer as an example. After downloading, unzip it to the computer, as shown in the figure

5
open the cgminer directory and find "cgminer", As shown in the figure

6
double click "cgminer" with the mouse, a command line window will pop up, prompting us to enter the URL address of the connection server. Enter "stratum. Btcguild com:3333 ”, press the Enter key on the keyboard, as shown in the figure,

7
and then prompt us to enter "user name", that is, the account name of the miner. Press the Enter key on the keyboard, as shown in the figure,

8
and then enter the password. Press the Enter key on the keyboard, as shown in the figure,

9
wait for a moment, When the client and the service establish a connection, the machine will start mining, as shown in the figure

10
to quit mining, please press the "Q" key on the keyboard in the window.
9. Scan instruction
1.
forward scan instruction
BSF (bit
scan
forward)

format: BSF
DST, RSC

function: scan the first bit containing 1 in RSC operands from right to left, and send the first bit containing 1 to DST operands. If RSC = 0, DST value is uncertain

note: DST and RSC can be 16 bit or 32-bit, but the length should be the same. DST can only be a general-purpose register, RSC can not be an immediate number

flag: if RSC is 0, set ZF = 1; Otherwise, clear 0
ZF, and other flag bits are uncertain<
2.
reverse scan instruction
BSR (bit
scan
reverse)

format: BSR
DST, RSC

function: scan the first bit containing 1 in RSC operands from left to right, and send the first bit containing 1 to DST operands

note: the same as BSF

logo: the influence on logo is the same as BSF
bit test instruction
bit test
BT
DST, SRC
- & gt; CF
bit
test
and
set
BTS
DST, SRC
- & gt; CF
bit test and reset (bit
test
and
rest) BTR
DST, SRC
- & gt; CF
to test and reverse (bit
test
and
complex) BTC
DST, SRC
- & gt; CF
note: the target can be 16 or 32-bit register or memory operands, and the source can be 8-bit immediate, register or memory operands. If the source operands are immediate, their values should not exceed the length of the target operands. If it is not an immediate number, its length must be the same as that of the target. The bit offset of the destination operand starts at the rightmost bit and counts from 0.
10. Pywallet is a python script that processes wallet.dat (the wallet file of bitcoin's official client). It allows you to implement many wallet management functions<

Introction to pywallet, a powerful bitcoin wallet management tool

function

Import vanitygen private key
delete zero confirmed / unconfirmed transactions
recover the domain name coin (or testetcoins) and send it to the bitcoin address
create a deterministic wallet (using a password)
create a deterministic wallet (using files)
broadcast offline transaction
create a bitcoin / other cryptocurrency address from the draft
restore Wallet / delete private key.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750