Bitcoin prevention
Security of bitcoin wallet
< UL >anti-theft
to prevent private key leakage
As a friendly format of wallet private key, mnemonics are very convenient for you to backup and import. Because of its plaintext, we do not recommend that it be saved electronically, but copied and kept on physical media. As a al backup, mnemonics and keystore complement each otherand keystores can be stored online, such as cloud disk, or in their own U disk (hardware wallet takes advantage of this), which is relatively safer than online storage. Even if hackers steal your keystores, they can't steal the assets without the password of the keystores, so the password of the keystores is particularly important at this time
loss prevention
the main loss prevention strategy is multiple backup, multiple backup. For example, when backing up a wallet, not only the keystore, but also the mnemonic words and private key should be backed up. This is a multiple backup
Recently, some domestic college students reported that their computers were attacked by viruses and their documents were encrypted. The attacker claimed to pay bitcoin to unlock. It is reported that the virus is nationwide, suspected to spread through the campus network, very fast. At present, Hezhou University, Guilin University of Electronic Science and technology, Guilin Institute of aerospace instry and universities in Guangxi are affected. In addition, some netizens reported that Dalian Maritime University and Shandong University were also attacked by the virus
up to now, more than 6500 computers in China have been invaded by the virus. Bitcoin is a kind of network virtual currency, but its exchange rate with RMB is surprisingly high, 300 bitcoin is about 3 million RMB
Kevin, a hacker on Weibo, has taught five temporary solutions:
1. Don't give money. The ransom is expensive and may not be recovered after it is paid
2. The non poisoned computer quickly backed up the data for many times. If it has been poisoned, lower the hard disk before reloading the system, and then install the operating system
3. Install anti blackmail protection tools, but it only works before the virus invades, but it can't do anything for the computer that has been infected with the virus, so it is still necessary to do a good job in the backup of important documents. Do not visit the website, do not open suspicious mail and files
4, turn off the computer, including TCP and UDP protocol 135 and 445 ports
5, but also do not understand, the network pinch
1. Download Tencent mobile phone housekeeper and use stubborn Trojan horse special killing tool to check and kill virus
Open Tencent mobile phone Housekeeper - utility in the upper right corner - add - stubborn Trojan horse special killing - Antivirus - finish
2. If the mobile phone can't be opened, it's necessary to link the software on the computer to swipe, This will remove all viruses from the phone
scan first, wait for the end of scanning, and then kill the virus according to the prompt. It adopts cloud detection and killing technology, which can thoroughly kill the virus through Intelligent Cloud Identification, so as to protect your mobile phone from now on; thank you
it can thoroughly check and kill the virus, which is strongly escorted by cloud host defense, TVA anti-virus engine and system repair engine
housekeeper introces the international leading local checking and killing engine, which greatly improves the ability of Trojan horse checking and killing
the ability of virus anti-virus protection is international leading, which can comprehensively protect the computer security
1. It is necessary to install anti-virus software, update the virus library in time, install firewall (anti Trojan horse, hacker attack, etc.), kill virus regularly, and maintain the security of computer operation
it is recommended that the owner of the building can install Tencent computer manager, which is a free professional security software with two in one anti-virus Management (only need to download one ), small memory, good anti-virus, good protection, and no false alarm and killing. It has a world-class anti-virus software embedded anti-virus engine, such as cloud killing engine, anti-virus engine, Jinshan cloud killing engine, Avira killing engine, xiaohongsan and killing repair engine
software upgrade, vulnerability repair and garbage cleaning are automatically and regularly set, which is necessary for lazy people
2; Open Tencent computer manager toolbox vulnerability repair
3. Don't go to some unknown websites or download things casually
4. You should also be on guard against portable storage devices (such as USB flash disk, where viruses are rampant recently)
5. Don't go to unknown websites or receive strange e-mails. After downloading the compressed package file, scan the virus first
6. Close unnecessary ports
7. If you have time and energy, learn some common computer skills and knowledge
finally, I would like to say that if you are very careful but still poisoned, you can't help it It's a good choice to backup the system with ghost.)
The blackmail virus wannacry is mainly spread by taking advantage of the dangerous vulnerability "eternal blue" leaked by NSA (National Security Agency). Microsoft released ms17-010 vulnerability patch to fix it earlier, but many users did not update the patch in time, so that a large number of computers were attacked by blackmail virus, The least affected system is windows 10, because the latest version of windows 10 1703 has integrated vulnerability patches and is completely immune to blackmail virus. However, it does not mean that win10 is 100% immune to blackmail attack. There are many versions of win10, and the old version will still be infected by virus
Microsoft emphasizes that windows 10 users are not the target of this malware attack. However, according to Microsoft's security announcement, only the latest Windows 10 1703 creators update creator update does not exist the vulnerability of this attack. The previous windows 10 RTM original version, November 1511 update and 1607 anniversary update still need to be patched, If there is no update patch, win10 will still be attacked by blackmail virus, so we must pay attention to update the vulnerability patch in time. Win10 click Start -- settings -- update and security -- windows update to execute system update

