Bitcoin base station
the NHS's computer files were locked, forcing them to cancel outpatient appointments and transfer patients; Other victims include Spain's largest telecom operator, Russia's interior office and FedEx, whose computer files are encrypted and inaccessible
in China, many colleges and universities, including Peking University, have been attacked, and the files on the students' computers connected to the campus network have also been encrypted and required to pay ransom
the so-called "ransomware" has no difference from extortion: after hacking through a computer vulnerability, hackers encrypt some files, then use the secret key to decrypt as a threat to ask the owner to pay "ransom"
this is one of the biggest network attacks at present. Avast, a security software company, said it had confirmed 75000 times, affecting countries such as Britain, the United States and Russia, among which Russia, Ukraine and Taiwan were the hardest hit areas
in this attack, the old windows systems are mainly attacked, including Windows XP, Windows 8 and windows server 2012. Microsoft said windows 10 users have not been attacked yet<
blackmail software attack, blackmail the user by encrypting the files on the computer image from: mspower
the computer interface of zhongzhao will show such a window to inform the user that the files on their computer have been encrypted and they must pay the ransom in the encrypted digital currency bitcoin
bitcoin should be chosen because it is difficult to trace. The attacker asked for $300-600
what happened to this blackmail software
since Friday, this blackmail software has attacked medical, banking, school and other public service institutions in many countries, but no hacker group has claimed responsibility for this attack
this blackmail attack is believed to be related to a previously leaked vulnerability in the windows system. In April, a hacker group named shadow brokers g up a Windows system attack tool, eternalblue, from the US National Security Agency (NSA). On the basis of this attack tool, the blackmail attacker added a self replication mechanism, which can be transferred from one attacked computer to another, but the attacker's information has not been determined yet
in this attack, extortion software disguised as invoice documents and recruitment related documents were spread in the email. But different from the common blackmail software, wanna virus can infect computer files without users opening e-mail or downloading. Because ransom is restricted to be delivered in encrypted digital currency bitcoin, the blackmailer's information is not as easy to be tracked by the police as credit cards and bank transfers
this attack not only attacks indivial computers, but also affects the whole network. British security architects give CNN an example: if an attacked computer is connected to the network of a cafe, the blackmail software will infect all the computers in the cafe
in China, blackmail software can attack the 445 port used for file sharing on campus network to spread. For example, the gas stations of PetroChina may be attacked because the payment system hosts without upgraded system are also affected. At present, these gas stations have been shut down< In an official statement on Friday, Microsoft said that it had released a patch for the vulnerability and that users who have opened windows update have been protected
in addition, for the key targets of this attack, including Windows XP, win8 and windows server 2012, Microsoft has also provided security updates on its official website
further proliferation was blocked by Tony B, a researcher at a security software company. The researcher from kryptos logic security controlled a website domain name and hard coded it into the blackmail software, which prevented wanna from further spreading, but the previously attacked computers were still affected
it's more about luck to find a way to stop. Tony B's job is to find ways to track different kinds of malware. His method is to track the domain names of servers that can control the malware
according to the spread of malware, he will find those unregistered server domain names related to malware, and then back track the malware to verify whether the spread of these malware can be controlled. He has registered hundreds of such domain names to control the malware
in this attack, he found a server domain name related to the blackmail software in the same way and registered it. Unexpectedly, he guessed the domain name of the server controlling the blackmail software
because the computer under attack can't decrypt the encrypted files by the user, the encrypted files can only be decrypted by the attacker. In the blackmail attack similar to this incident, the user can only strengthen protection, but can't solve it.
BSC is a base station controller, which controls a group of base stations. Its task is to manage the wireless network, that is, to manage the wireless cell and its wireless channel, the operation and maintenance of wireless equipment, the business process of mobile station, and to provide the interface between base station and MSc. In order to simplify the equipment of base station, the function of wireless control should be concentrated on BSC.
The 5g signal tower project is real
2019 is an important year for the construction of 5g in Shaanxi Province. While China Telecom, China Mobile, China Unicom and China Tower jointly start 5g business, Shaanxi operators also start 5g business simultaneously, marking that Shaanxi has officially entered the 5g era. 5g commercial package will also be launched on November 1, 2019. Users who make an appointment in advance can quickly order 5g package without changing their card, number or registration
On the morning of November 17, the press conference of 5g infrastructure project of Shaanxi Mobile communication signal tower was held. The reporter learned that the project will be officially launched on November 18, with a planned construction period of three years and construction in three stagesat present, the project is planned to be carried out in three stages in three years. The first stage accounts for about 30% of the project share, mainly in various regions of Shaanxi Province to build 5g infrastructure framework; The second phase accounts for about 30% of the project share, mainly for the supplementary construction of base stations in various regions; The third stage accounts for about 40% of the project share, and further precise refinement of the project is completed
taking mobile phone radiation as an example, in actual use, the size of radiation is related to the distance between the mobile phone and the base station, the geographical environment around the user, the setting of the base station and other factors“ Generally speaking, the closer the mobile phone is to the base station, the smaller the transmission power and the less the radiation. " Xiang Ligang said
in addition, the construction of base station also faces a huge cost problem. Wang Xiaofei said that from the perspective of base station construction alone, instry experts estimate that China's investment in base station construction, including large base station and small base station, will reach several trillion yuan if 5g network is completed
and based on the current test results, the power consumption of 5g base stations is two to three times that of 4G base stations, and the number of base stations is large. The electricity cost is expected to account for more than 40% of the operation cost of 5g base stations, which is also a very noteworthy problem< br />
in October 2017, the traffic magic box team successfully researched and developed a resource converter based on traffic cache - traffic magic box, which can make efficient use of the telecom traffic cache of rendant people, exchange traffic cache and electronic computing at the same rate, generate new traffic, and provide secondary utilization of resources, And based on the value of this technology to help those poor areas with underdeveloped communication to establish more communication base stations and personal communication traffic, so that more people can enjoy the convenience of digital communication.
instrial scientific
,
Honeywell
and so on
how much is the price of hydrogen concentration detector? Using the principle of
catalytic combustion
only costs one or two thousand yuan. The others are more expensive. They are not catalytic combustion. There are many choices for the accuracy and range of detection.
