1. Return the result of ifconfig
eth0 to awk for processing
where - F & # 39;:|< br />+'
this is a separator defined by awk and then matched with "BCAST & quot;, Take the content of the fourth column
since your command is not universal, you can't output the result here, but you should intercept the broadcast address
2. What is
bitcoin? What's the use of Internet? On the evening of the 12th, the computer blackmail worm named "eternal blue" broke out on a large scale in the world. It is said that "eternal blue" has spread to more than 100 countries, including Europe, the United States, China, etc. according to incomplete statistics, there are more than 1 million computers in the world, most of which are local area networks of universities and scientific research institutions. It is estimated that in the past 24 hours, about 150000 people have paid ransom to hackers through bitcoin trading platform. If this estimation is reliable, the amount of bitcoin that hackers have obtained is about 600 million yuan. If there is no accident, more people will pay ransom in the future. The amount of blackmail is estimated to be more than 10 billion! First of all, bitcoin does not belong to any country, indivial or organization. It is an uncontrolled and decentralized currency. Kun Peng made a search on it. In fact, bitcoin has been used as ransom in the early years. The method has not changed much. It's all encryption and blackmail. The person in charge of F-Secure, a network security company, once said that the encryption and blackmail software has become their biggest headache. Once the computer is infected, not only the hard disk drive is encrypted, but every file will be invaded. Although such incidents have emerged one after another in the past, it's only that they didn't have as much impact in the past as this one. Besides, people like to forget most, so they are not well known and it's normal. For example, around 2013, hackers began to extort bitcoin by illegally encrypting users' PC data and personal information. In 2014, an Australian executive was harassed by hackers after he paid $14000 worth of bitcoin ransom for malware under the pressure of online hackers. In 2015, hackers launched a third cyber attack on three Greek banks and demanded 20000 bitcoins (worth 7 million euros) as ransom from each of them. In 2015, the police department in tuxbury, Massachusetts, was attacked by hackers, resulting in the computer unable to log in. In order to prevent the loss of important data, the police station finally paid 500 bitcoin "ransom" as required by hackers. In 2016, a hacker hijacked the network of the Hollywood Presbyterian Memorial Medical Center through software, paralyzing the operation of the hospital. The hospital decided to pay 40 bitcoins, equivalent to about 17000 US dollars, as a "ransom" to the hacker Kunpeng believes that hackers choose bitcoin mainly because it has the characteristics of decentralization, globalization and anonymity like the Internet. Transferring bitcoin to the other side of the earth is as simple, low-cost and unlimited as sending e-mail. Bitcoin is therefore used in cross-border trade, payment, remittance and other fields. Moreover, bitcoin can be used to cash, which can be converted into the currency of most countries. Bitcoin investors generally believe that the reason why hackers choose bitcoin to pay ransom is that bitcoin not only has advantages over other traditional payment tools, but also is the best choice among other virtual currencies. Firstly, bitcoin has certain anonymity, which is convenient for hackers to hide their identities; Secondly, it is not subject to geographical restrictions and can collect money on a global scale; At the same time, bitcoin also has the characteristics of "decentralization", which allows hackers to automatically process the ransom of victims through programs. With the technical support of the network, the manufacture and issuance of bitcoin are not based on the trust of the central issuing institution, and the operations such as transfer and other transactions do not even need names. That is to say, to collect money with bitcoin, you don't need to open an account in the real name of a financial institution, and you don't need to go through any third-party institutions, such as the third-party payment that we use most at present. You just need to download and register an independent bitcoin wallet. If what the criminal extorts this time is not bitcoin, US dollars or other currencies, and what the criminal gives is not a bitcoin wallet address, but a collection account of a bank, the hacker may have been locked or arrested before receiving the money. Now you know, anyway, I don't need bitcoin. Please pay more attention
3. 3000. It's not recommended for newcomers. TT and the reality of nuclear weapons are almost always used to deter easy-to-use, unless the two alliances will never use.
4. stk-al00 Huawei mobile phone refers to Huawei Changxiang 10 plus. As of January 4, 2020, three Huawei Changxiang 10 plus mobile phones are on sale at the following prices:
1, 4GB + 128GB, and the price is 1399 yuan
2. The price of 6GB + 128GB Netcom is 1699 yuan
3. The price of 8GB + 128GB Netcom is RMB 1899
Changxiang 10 plus not only gets the hardware assistance of large aperture and high pixel main lens and large sensor, but also supports multi frame noise rection, intelligent scene recognition, intelligent lighting and other shooting effect optimization with AI algorithm
in the night scene, backlight, dark light and other complex light environment, you can still take bright and natural light, strong sense of hierarchy, true color photos. In addition, support 480 frames of super slow motion and motion picture EIS electronic anti shake
5. Bag filter is a kind of dry st filter. It is suitable for collecting fine, dry and non fibrous st. The filter bag is made of textile filter cloth or non-woven felt. The filtering function of the fiber fabric is used to filter the sty gas. When the sty gas enters the bag filter, the st with large particles and large proportion will settle down e to the effect of gravity and fall into the ash hopper. When the gas with small st passes through the filter material, the st will be retained and the gas will be purified
the structure of bag filter body is mainly composed of upper box, middle box, lower box (ash hopper), ash cleaning system and ash discharge mechanism< In addition to the correct selection of filter bag materials, the ash cleaning system plays a decisive role in the performance of bag filter. Therefore, the st cleaning method is one of the characteristics of the bag filter, and it is also an important part in the operation of the bag filter.