Hash computing power of graphics card
You can refer to the following, according to some commonly used graphics cards in the Internet bar market, sort out the price and calculation power of a related graphics card, as well as the expected return to the current period, It can be used as a reference:
{rrrrrrr}
power consumption: 243w
computing power: 22.4m
price of graphics card: 1999 yuan
quantity of eth g every 24 hours: 0.015
revenue generated every 24 hours: 24.48 yuan
expected payback time: 81.66 days
power consumption: 159w
computing power: 24.3m
price of graphics card: 1599 yuan Yuan
number of eth g every 24 hours: 0.017
revenue generated every 24 hours: 27.9 yuan
estimated payback time: 57.31 days
total power consumption: 171w
computing power: 24.4m
price: 1999 yuan
number of eth g every 24 hours: 0.017
revenue generated every 24 hours: 27.87 yuan
estimated payback time: 71.73 days
Video card (graphics card) full name display interface card, also known as display adapter, is the most basic configuration of computer, one of the most important accessories. As an important part of the computer host, the graphics card is the equipment of digital to analog signal conversion, and it undertakes the task of output display graphics
the graphics card is connected to the main board of the computer, which converts the digital signal of the computer into an analog signal for the display. At the same time, the graphics card still has the ability of image processing, which can help the CPU work and improve the overall running speed. For those engaged in professional graphic design, graphics card is very important. Civil and military graphics chip suppliers mainly include amd (ultra micro semiconctor) and NVIDIA (NVIDIA). Today's TOP500 computer, including graphics card computing core. In scientific computing, graphics card is called display accelerator
power consumption: 243w
computing power: 22.4m
price of graphics card: 1999 yuan
number of eth g every 24 hours: 0.015
revenue generated every 24 hours: 24.48 yuan
expected payback time: 81.66 days
power consumption: 159w
computing power: 24.3m
price of graphics card: 1599 yuan
price of graphics card: 1599 yuan
every 24 hours Number of time digging eth: 0.017
revenue generated every 24 hours: 27.9 yuan
expected payback time: 57.31 days
video card of radon RX 480
2. Different mining softwares have different algorithms and ranking.
it is common in mining software, but the ranking will be different for different algorithms.
a card, that is to say, it depends on the frequency and SP
,
the better the a card, the stronger the mining.
At present, blockchain training courses in the market span a lot, and the course content and teaching form are also varied

bitcoin
bitcoin principle, bitcoin system architecture, cryptographic algorithm (go language implementation), consensus algorithm (go language implementation), bitcoin transaction principle and transaction script, bitcoin RPC programming (node. JS Implementation), and Bitcoin source code analysis
4, blockchain 2.0 Ethereum
Ethereum working principle and infrastructure, Ethereum basic concepts (account, transaction, gas), Ethereum wallet mist and metamask, Ethereum transaction, erc20 standard token development and deployment, Ethereum development ide Remix IDE, smart contract and solidness, solidness deployment, backup and call Framework technology: truffle and Web3, DAPP development practice, geth
5, blockchain 3.0 - Super ledger fabric
Super ledger project introction, fabric deployment and use, fabric configuration management, fabric architecture design, fabric CA application and configuration, application development practice
the Xueshuo innovation blockchain Technology Workstation of Lianqiao ecation online is the only approved "blockchain Technology Specialty" pilot workstation of "smart learning workshop 2020 Xueshuo innovation workstation" launched by the school planning, construction and development center of the Ministry of ecation of China. Based on providing diversified growth paths for students, the professional station promotes the reform of the training mode of the combination of professional degree research, proction, learning and research, and constructs the applied and compound talent training system
es (Unix)
example: ivs7aet4nzqpm
Description: in Linux or other Linux kernel systems,
length: 13 characters
Description: bits 1 and 2 are salt, in the example, 39; Iv' Bit salt, followed by hash value
System: MD5 (Unix)
example: $1 $12345678 $xm4p3prkbgknntaqg9p0t /
Description: in Linux or other Linux kernel systems,
length: 34 characters
Description: the first $1 $bit is the encryption flag, and the last 8 bits 12345678 are the salt used for encryption, The following is hash
encryption algorithm: 2000 times of loop call MD5 encryption
System: sha-512 (Unix)
example: $6 $12345678 $u6yv5e1lwn6meeszken42o6rbem
Description: in Linux or other Linux kernel systems,
length: 13 characters
Description: the first $6 $bit is the encryption flag, and the last 8 bits are salt, The following is hash
encryption algorithm: 5000 times sha-512 encryption
System: SHA-256 (Unix)
example: $5 $12345678 $jbwlgeyzbsvrenubr5s3gp13vqi
Description: in Linux or other Linux kernel systems,
length: 55 characters
description: the first $5 $bit is the encryption flag, and the last 8 bits are salt, The following is hash
encryption algorithm: 5000 times SHA-256 encryption
System: MD5 (APR)
example: $apr1 $12345678 $auqsx8mvzt.tdbi4y6xgj.
Description: in Linux or other Linux kernel systems,
length: 37 characters
Description: the first $apr1 $bit is the encryption flag, and the last 8 bits are salt, The following is hash
encryption algorithm: 2000 times of circular call MD5 encryption
Windows system:
windows
example: admin:
length: 98 characters
encryption algorithm: MD4 (MD4 (Unicode ($pass)). Unicode (strtolower ($username)))
MySQL
System: MySQL
example: 606717496665bcba
note: in the old version of MySQL,
length: 8 bytes (16 bytes) Description: it includes two bytes, And the value of each word is no more than 0x7fffff
System: MySQL 5
example: *
Description: the length of the newer version of MySQL is 20 bytes (40 bits)
encryption algorithm: SHA-1 (SHA-1) ($pass))
other systems:
System: MD5 (WordPress)
example: $p $
Description: MD5 used by WordPress is 34 characters
Description: $p $indicates the encryption type, Then followed by a character, often the character 'B', followed by 8-bit salt, followed by hash
encryption algorithm: 8192 times MD5 loop encryption
System: MD5 (phpbb3)
Description: phpbb3. X. use
example: H $9123456785daergalpsri. D9z3ht120
length: 34 characters
Description: the starting $h $is the encryption flag, followed by a character, In general, it is character Ə', followed by 8-bit salt, and then hash value
encryption algorithm: 2048 cycles call MD5 encryption
System: Radmin v2. X
Description: in the V2. X version of Remote Administrator
example:
length: 16 bytes (32 characters)
encryption algorithm: after characters are filled with 0 to 100 bytes, The filled characters are encrypted with MD5 to get (32-bit value)
MD5 encryption
standard MD5
example:
application range: phpbb v2. X, before 1.0.13 of Joomla, And other CMDS
length: 16 characters
other plus salt and deformation are similar:
MD5 ($salt. $pass)
example: 12
MD5 (MD5 ($pass))
example:
MD5 (MD5 ($pass). $salt)
example: WQ6
MD5 (MD5 ($salt). MD5 ($pass))
example: wh6_ S
MD5 (MD5 ($salt). $pass)
example: 1234
