Position: Home page » Ethereum » Ethereum D pool address

Ethereum D pool address

Publish: 2021-04-22 02:28:14
1. Generally, the selection of ore pool depends on the allocation mode, rejection rate and delay of ore pool. There are many kinds of income models, such as PPS, PPLNs, PPLNs + and so on. If you want to have long-term stable and high income, you can choose PPLNs model. If you do it for a long time, the income is much higher than PPS model. Of course, the lower the rejection rate and delay time, the better. Moreover, the stability of the mine pool, every three to five problems, it is certainly not OK. Comprehensive consideration can try AA mine pool, from all aspects are good
hope to be useful to you, please adopt!
2. Eth interface refers to the interface, is the most widely used LAN communication mode, but also a protocol. Ethernet interface is the port of network data connection
each version of Ethernet has a maximum cable length limit (that is, the length without amplification). Signals within this range can propagate normally, and signals beyond this range cannot propagate
in order to allow the construction of a larger network, repeaters can be used to connect multiple cables. Repeater is a physical layer device, which can receive, amplify and retransmit signals in two directions
extended data
several common Ethernet interface types
1. SC optical fiber interface
SC optical fiber interface has been applied in the era of 100base TX Ethernet, so it was called 100base FX at that time (F is the abbreviation of optical fiber). However, at that time, because the performance was not more prominent than twisted pair, but the cost was higher, so it was not popularized. Now the instry vigorously promotes gigabit network, and SC optical fiber interface is re valued
2. RJ-45 interface
this kind of interface is the most common network equipment interface, commonly known as "crystal head", and the professional term is RJ-45 connector, which belongs to the type of twisted pair Ethernet interface. RJ-45 plug can only be inserted along the fixed direction, and a plastic spring piece is set to be stuck with RJ-45 slot to prevent it from falling off
3. FDDI interface
FDDI has the highest transmission rate among the mature LAN technologies. It has the characteristics of timed token protocol, supports a variety of topologies, and its transmission medium is optical fiber. Fiber distributed data interface (FDDI) is a set of protocols developed by American National Organization for Standardization (ANSI) to transmit digital signals on optical cables
reference source: Network Ethernet interface
3. Coq of digital currency is the code of digital currency.
4. Destination address translation
iptables - t NAT - a routing - I eth0 - s 192.16.0.0/24 - J drop
all translations from eth0, the IP address segment of the network card 192.16.0.0/24, are discarded
5.


There is

6. VIM / etc / udev / rules. D / 70 persistent net. Rules

change the name of eth2 to eth0, delete the original information of eth0, and restart
7. Methods I:
$/sbin/ifconfig
ethX

awk
' / inet
addr/
{print
$2}' <

-f2
-d
" < method II:
$/sbin/ifconfig
ethX

awk
& #39;/ inet
addr/
{print
$2}' < br/>
awk
-F:
'{0} Print
$2}'< Method 3:
/sbin/ifconfig
ethX

-ne
& #39; s/ \ (.* &# 92;) addr:\([: digit: ]*\) &# 92; (.*&# 92;) & # 92; 2/p ' < br/>Replacing X in ethx as a need to see a network card, such as eth0,eth1...

(
$1
=
" inet " <
&
$3
~
/^Bcast/)
print
$2}& #39;


-f2
-d
" < br/>
IPv6 network
, simply amend the order above, e.g.:
/sbin/ifconfig


awk
& #39;/ inet6/
{print
$3}'< br/>----all
$/sbin/ifconfig
ethX

awk
& #39;/ inet6/
{print
$3}'< br/>----single
8. ARP attack is a kind of attack technology against Ethernet address resolution protocol (ARP)
this kind of attack can make the attacker obtain the data packets on the LAN, and even tamper with the packets, and make the specific computer or all computers on the network unable to connect normally
to put it bluntly, this is a protocol attack. ARP exploration stipulated by Ethernet protocol is a legal behavior, but if you keep exploring, the network will be blocked, Even to cheat other computers in order to intercept each other's legitimate data. Do you think it's Ethernet? Is it a big loophole
there seem to be many ways to solve ARP, but how many of them play a substantial role? We all know that if you don't intercept this kind of thing on the terminal, you can't stop it at all. It's not only ARP, what dos, half open connection attack is a headache. Recently, I saw a device called immune wall. I also looked up some information on the Internet to learn about their deployment mode and solutions to the problems. I think it's very good. At least they know that they should intercept from the terminal.
9. Preprocessing is preprocessing. If you want to filter, you can do it in forward.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750