Position: Home page » Bitcoin » Bitcoin floppy disk

Bitcoin floppy disk

Publish: 2021-04-16 08:07:15
1. The following is from: http://bitcoin.org/zh_ Cn / about

historical background

bitcoin is one of the first currencies to realize the concept of "cryptocurrency". In 1998, Wei Dai first expounded the concept of "cryptocurrency" in cypherpunks mailing list. Based on the basic concept of money, which is used to pay for goods, services and debt or any form of records in a given country or economy, bitcoin is a new form of money. Its original design is to integrate the idea of not relying on the central authority, using the principle of cryptography to control the issuance and transaction of money
in 2009, Satoshi Nakamoto published the first bitcoin specification and its proof of concept in the cryptography mailing list. At the end of 2010, Nakamoto claimed that he had transferred to other affairs and left the project. The creator of bitcoin never revealed his true identity, but left his invention to the world. Today, the origin and motivation of the invention of bitcoin is still a mysterious story
since 2010, many developers have devoted themselves to this project, and the bitcoin community has grown rapidly. Between June and July 2011, bitcoin suddenly gained media attention, leading to large-scale buying. The resulting bubble led to the continued decline in the price of bitcoin in the second half of 2011. After that, the price of bitcoin graally rose to the height of 2011
in order to regulate, protect and promote the development of bitcoin, the bitcoin foundation was established on September 27, 2012. Nowadays, with the increasing number of bitcoin users, bitcoin economy is developing rapidly

technical features

any network like bitcoin has the following basic features:
bitcoin can be transferred between any node of the network
the transaction is irreversible
the use of block chain avoids the occurrence of double consumption
the transaction will spread out in a few seconds and pass validation in 10 to 60 minutes
transaction processing and currency issuance are carried out through mining
bitcoin can be received at any time whether it is online or not<

economic rules

the whole bitcoin network jointly implements the following rules:
the total amount of bitcoin issued is about 21 million
a bitcoin can be divided into 8 decimal places, with a total of about 21 × 1014 monetary units
transaction costs are very low and most of them are free

statistics

bitcoin network has been running continuously for more than 48 months. In the past year, bitcoin's security features have attracted attention and developed significantly. As of April 2013:
the longest block chain has more than 232000 blocks
one of the largest distributed computing networks in the world, with more than 65 trillion hashes per second
there are 50000 transactions every day, with a total amount of several million US dollars
the total value of bitcoin in circulation exceeds US $1.3 billion
there is only one major security incident in the protocol, which was resolved in August 2010

other information can be referred to:
Network: http://ke..com/view/5784548.htm
bitcoin official website: http://bitcoin.org/zh_ CN/
2. The trading record will be fatter and fatter! There may also be a deadline to delete the earlier ones. I don't know
3. If you can't, you can use the next disk tool to increase the space of disk C. If you can't, you can find a tutorial on the Internet, right? The data is transferred to other disks. The backup wallet is useful. Keep it first
4. Cut it as a whole, then modify the shortcut property of bitcoin-qt.exe, and add "- dataDir = new database address" (the content in quotation marks) "after the target
if you don't understand, just ask
5.

The quality of RAR format compression is better, but the file is also relatively large, zip compression file is the smallest

1. Right click a file to be compressed

6. This is also unable to guard against, as long as you do not open some unknown mobile phone links or open some illegal websites, this situation generally will not happen.
7. It has been about 20 years since the first computer virus broke out Information week recently named the top 10 most destructive viruses to date< In the first half of 1980s, computer viruses only existed in the laboratory. Although some viruses spread, most of them were strictly controlled in the laboratory by researchers. Then came the brain virus. At the beginning of 1986, this kind of computer virus was discovered. It was the first PC virus, and it was also a self replicating software. It was widely spread through 5.2-inch floppy disks. By today's standards, brain's spreading speed is almost slow, but in any case, it is the originator of the more harmful viruses, worms and malware we are currently plagued by. Here is the history of computer virus development in the past 20 years
1. CIH
estimated loss: about 20-80 million US dollars in the world, and the loss of computer data is not included
CIH virus broke out in Taiwan, China in June 1998, which is recognized as one of the most dangerous and destructive viruses in history
CIH infects the executable files of Windows 95 / 98 / me and other operating systems, which can reside in the computer memory and continue to infect other executable files accordingly
the danger of CIH is that once it is activated, it can cover the data on the host hard disk and cause the hard disk to fail. It also has the ability to cover the host BIOS chip, so that the computer boot fails. Because of its ability to infect executable files, CIH has become more popular with the help of many software distributors, including a demo version of sin game from Activision game company
the triggering date of some variants of CIH happens to be the day of the accident at the Chernobyl nuclear power plant, so it is also known as the Chernobyl virus. But it won't infect Windows 2000 / XP / NT and other operating systems. Nowadays, CIH is no longer a serious threat< On Friday, March 26, 1999, w97m / Melissa appeared on the front page of newspapers all over the world. Estimates show that the word macro script virus infects 15% to 20% of the world's commercial PCs. The rapid spread of the virus caught Intel, Microsoft, and many other companies using outlook software by surprise. In order to prevent damage, they were forced to shut down the entire e-mail system
Melissa spreads herself by sending e-mail to 50 contacts in the user's address book list through Microsoft's Outlook E-mail software
the email contains the following sentence: "this is the document you requested, don't show it to others". In addition, a word document attachment is included. And clicking on this file (which thousands of unsuspecting users do) will make the virus infect the host and replicate itself
the more irritating thing is yet to come - once activated, the virus uses the lines of the Simpsons to modify users' word documents
3. I love you (iloveyou)
estimated loss: about 10-15 billion US dollars in the world
also known as love letter or love bug. It's a visual basic script, well-designed, with an irresistible lure - the promise of love
on May 3, 2000, the "I love you" worm was first discovered in Hong Kong
the "I love you" worm is transmitted through an email with the title of "I love you" and the attachment name of "love letter for you. TXT. VBS". Like Melissa, the virus sends itself to contacts in the Microsoft Outlook address book
it also copies its own music and picture files. What's more, it will search for the user's account number and password on the infected machine and send them to the virus author
since there was no law in the Philippines to sanction the writing of virus programs at that time, the author of the "I love you" virus escaped
4. Code Red
loss estimation: about 2.6 billion US dollars in the world
code red is a kind of computer worm virus, which can spread through network servers and the Internet. On July 13, 2001, the red code spread from the network server. It is specifically aimed at running Microsoft Internet information service software network server to attack. Ironically, Microsoft released a patch in mid June to fix the bug
"red code" is also known as bady, and the designer deliberately carries out the maximum damage. After being infected by it, the network site controlled by the attacked host will display such information: "Hello! Welcome www.worm.com ” Subsequently, the virus will take the initiative to find other vulnerable hosts for infection. This behavior lasted about 20 days, after which it launched a denial of service (DOS) attack on certain IP addresses. In less than a week, the virus infected nearly 400000 servers, and it is estimated that as many as 1 million computers were infected
5. SQL Slammer
loss estimation: since SQL Slammer broke out on Saturday, the money loss caused by the destruction is not large. Nevertheless, it still hit about 500000 servers around the world, and South Korea's online capacity was paralyzed for 12 hours
sql Slammer, also known as sapphire, first appeared on January 25, 2003. It is an unusual worm virus, which has caused obvious negative impact on Internet traffic. Interestingly, it is
8. No, the price of computers only began to rise in the last six months, because now many people are ready to dig for bitcoin
9. A computer virus is a program, an executable code. Like the biological virus, it has the characteristics of self reproction, mutual infection, activation and regeneration. Computer viruses have unique replication ability. They can spread rapidly and are often difficult to eradicate. They can attach themselves to various types of files. When files are copied or transferred from one user to another, they spread along with files.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750