Position: Home page » Equipment » Hide mining program

Hide mining program

Publish: 2021-04-30 20:37:27
1. Crime tools: all the articles used by criminals to commit crimes, including all kinds of weapons or tools
using a computer to plant a Trojan horse and use the computer to attack and obtain other people's information is also regarded as a crime tool
there is another possibility. In a computer, the behavior of embedding Trojan horse, obtaining the computer information, and the U disk of embedding Trojan horse will be regarded as a crime tool. Computers, on the other hand, are not tools of crime
judgment should be made according to the specific situation.
2. Hehe, 360 is easy to use. Now I use 360 and super magic rabbit
if the process
magic rabbit is more practical
you can see all the processes in the process option of magic rabbit
the system process is green and marked as system process, other processes are black, and the location of the file of that process in your computer is displayed, And right click the process, there will be online check the process information, a little open, there is a very clear label, such as: whether it is a Trojan horse, whether it is an error, whether it is a background process, whether it occupies memory, whether it is a spy, and a series of instructions.
3. Recently, a high load alarm occurred on a server installed with gitlab. CPU usage is as follows:

log in to the server and use top to check CPU usage. This program called minerd consumes a large amount of CPU, as shown in the figure below:

this program is not our normal service program. I think it must be hacked, Then I searched this program. It's really a mining Trojan horse program. Now that I know it's a Trojan horse program, let's see how it works, and then how to repair the back door

this program is placed under / opt / minerd. When it is determined that it is not related to the project, it is judged to be a Trojan horse program, decisively kills the process, and then deletes the minerd file under / opt

Exhibition
4. It depends on what monitoring software is installed on your computer. Don't open some malicious links or web pages at will. Besides, you should have security awareness. Secondly, there should be monitoring software on your computer to be more secure. For example, Tencent computer manager suggests that we should improve our network security awareness and keep Tencent computer manager and other security software running all the time when we use our computer, Be alert to links and documents of unknown origin, so as to prevent criminals from taking advantage of them.
5. It's easy to burn the computer.
6. First of all, mining can only use a card, n card mining is boring
secondly, mining requires the computer to be running all the time and can't be turned off, which requires a lot of computer. It is harmful for each part to do a lot of calculation for a long time, and it also requires high power supply for the computer
mining can't be powered off, and it needs to be recalculated after power off. Graphics card long time to do a lot of calculations will lead to greatly shorten the life of the graphics card, so their own home, do not recommend mining, mining is not as expensive as electricity.
7. I think it is to turn off the firewall or other anti-virus software
8. You can first use 360 for antivirus, if it is a stubborn virus, it is recommended that you re install the system
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750