Position: Home page » Pool » How to see the calculation rate of mining machine from a long di

How to see the calculation rate of mining machine from a long di

Publish: 2021-05-07 17:31:19
1. The purpose of mining is to package the transaction block. If the package is successful, you will open a new package and get a 25 bitcoin reward, as well as the handling charge for the future transactions added to the package

then other miners will start to package the transaction generated by your new package until the next package comes out first

in the future, the mining capacity of bitcoin will be small or even zero. You still have transaction fees. The system will always need miners, and mining machines will still exist.
2.

You can't dig in a day. It takes 2000 years

the global unified computing difficulty of bitcoin is 2621404453 (expected to change in two days). It takes more than 2000 years for a 2.5GHz CPU to work out a bitcoin

in order to make the graphics card fully loaded for a long time, the power consumption will be quite high, and the electricity bill will be higher and higher. Many professional mines at home and abroad are operated in areas with extremely low electricity charges, such as hydropower stations, while more users can only mine at home or in ordinary mines, so the electricity charges are not cheap. Even in a certain residential area in Yunnan, there was a case of crazy mining, which led to a large area trip of the residential area, and the transformer was burned


extended data:

bitcoin network generates new bitcoin through "mining". In essence, the so-called "mining" is to use computers to solve a complex mathematical problem to ensure the consistency of bitcoin network distributed accounting system

bitcoin network will automatically adjust the difficulty of mathematical problems, so that the whole network can get a qualified answer about every 10 minutes. Then bitcoin network will generate a certain amount of bitcoin as block reward to reward the person who gets the answer

when bitcoin was born in 2009, block rewards were 50 bitcoins. Ten minutes after its birth, the first 50 bitcoins were generated, and the total amount of money at this time is 50. Then bitcoin grew at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the block reward will be halved to 25

when the total amount reaches 15.75 million (5.25 million new output, i.e. 50% of 1050), the block reward will be further halved to 12.5. The monetary system used to have no more than 10.5 million in four years, after which the total number will be permanently limited to about 21 million

3.

In fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g

it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses

moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline

4.

a new customer recently consulted with sine security company, saying that his server often fails to open the website of the card, and the remote connection to the server is extremely slow. Sometimes the Ping value reaches 300-500, and he often switches. After listening to the customer's words,

will generally judge that he has been attacked by CC + DDoS mixed traffic, It's strange to say that there is no traffic attack on the computer room. It's not a traffic attack, but it also causes the server card and website to fail to open. What kind of attack is this? In order to solve the problem of

client server card, we immediately arranged a security engineer to carry out security detection and deployment on his Linux server

{rrrrrrr}

Mining Trojan horse is also designed. If the mining process is forced to stop by customers, it will automatically start to continue mining to achieve uninterrupted mining.

careful inspection shows that it is through setting the hourly task plan, remotely downloading shell mining Trojan horse, and then executing, Check whether the current process exists or not. If not, start the Trojan horse to mine

a detailed security inspection was carried out on the client's Linux server. It was found that fortunately, there was no encrypted server data, and the worm was infected with the disease

virus. If the data was encrypted, the loss would be great. The client was a platform, and the client's data was very important. After finding out the mining Trojan horse,

do customers need to know how the server is attacked? Was the Trojan horse uploaded? It can prevent the attack

in the later stage

through the security detection and analysis of our security engineers, we found that the server uses Apache Tomcat environment, the open architecture of the platform is JSP + Oracle database, and Apache Tomcat uses the version of 2016, which leads to the serious remote command execution vulnerability of Apache, Through this vulnerability, the intruder can directly invade the server and get the administrator permission of the server,

sine security engineer immediately repairs the Apache vulnerability and clears the Trojan horse. So far, the problem has been solved, the client server

runs stably, and the network station opens normally

5. Take it apart. Look at the st inside. If you have a SSD, you can look at the number of times the SSD is charged.
6. What brand of miner? Generally in the mining machine IP background can see the status of mining machine operation. Or go to the mine.
7. It's really difficult to mine now. First of all, determine whether your positioning is correct. As mentioned above, you may not be able to play one in eight years in ten years. Of course, you are lucky to dig out a few in one year, but this is gambling. The probability is very small, ha ha

however, you really regard mining as fun and entertainment. If you don't care much about whether you can dig, you can also let your own machine dig all the time. However, the machine configuration above you should not be low, but it is not suitable for mining, just as the swimming champion is not necessarily good at mountain climbing

generally speaking, mining machines mainly focus on graphics cards, which have little to do with processors, main memory boards and hard disks. Of course, they need to be stable and not crash for a long time. In fact, a card is more suitable for mining. In principle, you can go to the network. It is said that before the emergence of R-Series a card, the card with good mining effect was not hd88708750, But we despise the old graphics card that has been eliminated
8. < blockquote >

when building bitcoin, Nakamoto wants bitcoin to be a decentralized currency, not only for use and trading, but also for mining. But it backfired. With the increasing value of cryptocurrency such as bitcoin, mining has become an instry. The competition is more and more fierce, and the pursuit of mining computing power is higher and higher. Therefore, from ordinary computer mining, ASIC mining machine and GPU mining machine have evolved

the algorithm of ASIC mining machine is almost sha256, while the algorithm of GPU mining is different. For example, the algorithm of BTG is equihash, and the algorithm of BCD is optimized x13. Although it is not absolute, it can be simply considered that the currency of sha256 algorithm is generally mined by ASIC mining machine. Other algorithms are basically using GPU miner. There are also exceptions. Scrypt's Leyte coin used to be mined by GPU miner, but later scrypt's algorithm was also conquered by ASIC chips, such as ant miner L3 +, which is the ASIC miner used to dig Leyte coin

ASIC miner refers to the miner that uses ASIC chip as the core of computing power. ASIC is the abbreviation of application specific integrated circuit, which is a kind of electronic circuit (chip) specially designed for a specific purpose. Some mining machinery factories have designed ASIC chips specially for computing the sha256 algorithm of bitcoin, and the mining machinery using them is ASIC mining machinery. Because ASIC chip is only built for specific computing, its efficiency can be much higher than that of CPU. For example, the current mainstream ant miner S9 is ASIC miner, which uses 189 ASIC chips, the computing power reaches 13.5th/s, and the power consumption is only 1350W. As a comparison, the computing power of gtx1080ti, the flagship computer graphics card, will not exceed 60mh / s even if it is optimized well. The difference is tens of thousands of times

GPU miner refers to the miner that uses GPU graphics card as the core of computing power. Cryptocurrencies such as Ethereum, bitcoin and diamond use graphics algorithms, so the speed of computing with graphics card will be the highest. Compared with ASIC miner, GPU miner is more well-known, because it is a computer with enhanced graphics card configuration

the purpose of GPU miner is to make money, so we should pursue the power consumption ratio and maximum profit, so we should pay attention to the cost performance. Generally, the medium and high-end positioning graphics cards, such as AMD rx560 and rx570, have high power consumption ratio, which is a good choice for GPU miner. While flagship cards such as gtx1080ti and AMD vega64 have the strongest single card performance, they are not cost-effective in terms of price and power consumption

in addition, the ASIC miner also has some exotic procts, such as the USB miner of burning cat, which is slightly larger than the U disk, and the power consumption is only 2.25w, which is the smallest bitcoin miner at present

< / blockquote >

the above quoted digcoin.com - "Introction to mining machinery classification" has many professional terms. I hope it can help you, thank you

9. Instrial and mining enterprises,,.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750