Position: Home page » Pool » Mine pool hacked

Mine pool hacked

Publish: 2021-04-15 02:26:25
1. Mining may be able to dig, but the probability is relatively small, generally the main jewelry is selected by mineral processing skills. Jewelry dressing skills randomly proce green and blue stones.
2. First of all, delete all the contents and files put by hackers, or find out which files have been modified (which can be seen from the modification time or from the website log) to replace the previous backup files, find out what files need to be deleted immediately, and then add the official patch of the website program;;; VPS sets the security dog carefully, and the best security level is high. Or your FTP login has not been turned off anonymity, and if the hacker enters your VPS, it is recommended to change the VPS password to find out if the hacker has placed any other files in the VPS... Don't worry, to solve bit by bit, and remember to back up the database, but also often back up the whole station, compressed download to their own computer, there is a backup is easy to solve some problems, hope to help you
3. This problem can't be solved unilaterally:

1: Account: please make sure that there is only one system administrator in your existing operating system. The default account name of the system is administrator, and it's better to have a password! If you have one more account, you'd better delete that account...

if you can't delete it by ordinary methods, it's recommended to press and hold Ctrl + Alt + delete twice when logging in to the system, and the system login dialog box will appear. Enter the administrator password and enter the default administrator desktop,

then run CMD and enter the following command in the CMD window:

net user the account name you want to delete / del

2: there must be a professional anti-virus software, so as to maximally reject the intrusion methods available to hackers (such as Trojan horse virus)...

3:, Another is to install a professional firewall to prevent hackers from invading...

4: use sa.exe to detect whether there is a clone account...

5: upgrade the system patch
4. The person who uses this method to invade is not an expert ~ '
you set the user's password
start control panel user account create password

and then in start control panel management tools computer management local users and groups
- except for the user's own account, all other attributes are disabled

in addition, if the power is off Naohao suggests installing a Skynet firewall
which is specially designed to prevent hackers
5. It's useless to check the machine. Since your firewall prompts you that there are hackers, it proves that the firewall has turned him out. Why worry
when a general firewall detects a hacker's intrusion, it will also prevent his pin from entering the machine, which is to format the hard disk of the machine system
basically, as long as there is a firewall, your computer is safe
you don't need to think about the back door of hackers, which requires some common sense of information security. It's going to take a lot of learning, but you can rest assured with a firewall.
6. I don't know how to do it. Because I'm not a hacker, you should not use this system at this time to avoid greater losses. You should go to other computers to download and install a Chinese cabbage U-disk boot (laomaotao, one button U-disk system can be installed) and download a system installation disk, and then use these software to make a U-disk boot disk for your U-disk, Then back home, plug in the U disk, change the computer to U disk to start, and use all kinds of installation tools in PE to install the system. There is also a more convenient way to directly buy a system installation disk, insert the CD, change the CD drive to start, restart, and then you can reload
7. It should not be done by hackers. The general style of hackers is to enter your system, sting, wait for the opportunity to steal your important information (such as personal information or bank card number) or use your machine as a killing knife.

in addition to these two disadvantages, hackers will actually protect you from doing many things beneficial to the system security, and they will patch for you, Configure system security policy -- not for you, but for hackers to better operate your machine -- hacker's knife

increase the security of your system, is to monopolize your system -- don't let other hackers easily invade your system

before hackers achieve their ultimate goal of intrusion (stealing or attacking others with your machine), they usually don't expose themselves in this way - of course, viruses or Trojans are not this style

If a black pipe invades your system, in fact, as long as you don't have any important information on the machine, it will not do you any harm - assuming you are a rookie.
8. It depends on the type of the website. If it's an enterprise website that hasn't been updated for a year, it's better to give up and reuse the backup. If it's a large website, it's better to call the police or find someone to check the IP. Because this kind of loss is the biggest
9.

Because the hacking is for financial fraud, and the famous person's Twitter account has celebrity effect, which is convenient for hackers to obtain fraud profit

according to CNN, on Wednesday (July 15, 2020) local time, a number of twitter accounts of celebrities and politicians in the United States were hacked and bitcoin fraud links were released. CNN reported that there are 320 transaction data, and hackers have obtained at least 113000 US dollars of bitcoin

the hackers include former US President Barack Obama, Democratic presidential candidate Biden, Microsoft founder Bill Gates, Amazon founder Jeff Bezos, financial tycoon Warren Buffett, Tesla CEO Elon Musk, former mayor of New York City Michael Blomberg, singer Kanye West, and other hackers American socialite Kim Kardashian, etc

According to Fox News on July 15, Twitter has been hacked on a large scale, including Bill Gates, Tesla CEO musk, former US Vice President Biden and Apple's official twitter accounts. Hackers and bitcoin related topics have hit the twitter hot search list

on the 15th local time, from former Vice President Biden to the current head of a large company, many famous accounts with high popularity on twitter were attacked by hackers and tweeted to raise bitcoin donations

such tweets say "I'm giving back to the community. All bitcoin sent to the following address will be double returned! If you send us $1000, I'll send back $2000. Just 30 minutes. Then, these tweets include the relevant code of the bitcoin wallet. "

business leaders including Bill Gates, Elon Musk, Jeff Bezos and Mike Blumberg shared the tweets, which were later deleted. Democratic presidential candidate Joe Biden and former President Barack Obama also tweeted the news

A spokesman for Bill Gates has confirmed that "he didn't send this tweet himself."“ We can be sure that this tweet wasn't from Bill Gates. " "This seems to be part of the bigger problem facing twitter," the spokesman said. Twitter has realized and is trying to restore his account. "

Tyler Winklevoss, chief executive of Gemini exchange and technology investor in the US, said that accounts related to cryptocurrency, including Gemini, coinbase, binance and coindesk, were also hacked and tweeted about fraud. Winkleworth warned against clicking on such links

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750