Position: Home page » Equipment » Computer embedded mining

Computer embedded mining

Publish: 2021-05-03 10:20:12
1. To understand the problem of home computer mining, we must first explain the mining clearly. As like as two peas came out, they shared a identical record book, so they need a person with a right word to decide the record. Who will record it? Through a topic to decide whose computer is right first, then it has the right to record all the data of this block. This is the popular explanation of mining. And reward the bookkeeper to get an extra sum of money, which is the reward for mining. Reward the person who has contributed enough computing power to solve the problem, which is also the reason why we go mining. Money is money, in order to make money. In the beginning, bitcoin mining was just about CPU. Then, for more money, technicians developed faster and faster accounting methods for graphics cards, FPGA and ASIC chips. Please note here that bitcoin is only the bookkeeping method. Bitcoin is the sha256 algorithm, which is only applicable to this kind of algorithm and can only be used for mining. Later, more algorithms appeared, such as ethash, kawpow, cryptonight, zhash, x16r, randomx, etc. Pay attention to the concepts, algorithms (the above pile) and devices (CPU, graphics card, FPGA, ASIC). They complement each other. A currency may have multiple algorithms or a single algorithm for accounting. The same device can also run different algorithms to get different rewards. The only difference is the efficiency of accounting and the speed of making money. So bitcoin can be g with CPU, graphics card, FPGA and ASIC, but ASIC has the highest efficiency and cost performance. Let's go back to the topic, what can a home computer dig? Home computer = CPU + graphics card. The more suitable CPU is the monero under the randomx algorithm. For graphics card, it is suitable for the automatic selection of nicecash. Now I should talk about the specific mining tutorial to complete the answer, but I recommend a simpler and more convenient method, even without knowing all of the above.
2. Crime tools: all the articles used by criminals to commit crimes, including all kinds of weapons or tools
using a computer to plant a Trojan horse and use the computer to attack and obtain other people's information is also regarded as a crime tool
there is another possibility. In a computer, the behavior of embedding Trojan horse, obtaining the computer information, and the U disk of embedding Trojan horse will be regarded as a crime tool. Computers, on the other hand, are not tools of crime
judgment should be made according to the specific situation.
3. Just download a gpu360 miner
common computer mining methods:
1. Download and install gpu360 miner
2. The software will be set to boot, it is recommended to boot. Because it has a very human function, when you don't use the computer, it will automatically mine, when you use it, it will stop instantly, it will not affect the normal work and use
3. After the software is started, change it to your own mobile phone number. After the software starts, there are three setting options:
4. The first time you start mining, you will test the equipment, and it will test your best mining scheme. It usually takes about ten minutes
5. After testing, it will automatically enter the mining state
6. Click stop and close to minimize to the tray, so that when you don't use the computer, it will automatically open to make money
right click the icon to shut down the software completely
7. Bitcoin earned can be exchanged directly in online stores.
4.

Just download a gpu360 miner

general computer mining method:

< UL >
  • 1. Download and install gpu360 miner

  • 5. Change the computer (manual funny)
    antivirus, if you can't kill it, you can check the program with high CPU or GPU occupation and manually delete it. If you can't, you can't change the hard disk (the disk where the mining program is located)... Change the computer
    6.

    First of all, when it comes to mining, bitcoin is indispensable. In fact, this problem is very simple. Any currency, including bitcoin, Leyte coin and infinite coin, is not created without any reason. Bitcoin must be generated by computer calculation. This method of generating bitcoin is called "mining". So how do indivials use computers to mine? Let's learn about it

    As long as there is a computer that can access the Internet and download the bitcoin program from the bitcoin website, the first run will generate a digital account, and then keep running, the program will constantly calculate a series of "mathematical problems". When you have successfully calculated "a mathematical problem", the program will continue to run, It's possible to get a certain amount of bitcoin

    bitcoin

    so bitcoin has high requirements for computer performance, and now it is generally collective mining, and personal computer mining seems to be out of fashion, or even no longer. To participate in mining, it is best to join some mining groups

    the data of bitcoin is distributed on every client with wallet installed all over the world. Every transaction will be calculated in the whole network, and the fees you pay and the corresponding algorithm will ensure that the miners will get the corresponding remuneration

    Bitcoin is a P2P network. Just like the familiar BT download mode, in order to keep the network running, it is necessary to always keep someone online to upload and share data with others. Therefore, the publishers of BT seeds often ask the sowers to be "Sowers" on the forum, but in fact, BT seeds are often broken. People are selfish. You can't ask everyone to contribute their resources for free, My computer is on. It costs at least electricity

    and the bitcoin network, like the BT download, needs "miners" to contribute their computer resources for calculation to ensure the operation of the bitcoin network. If the people who contribute resources like the BT download do not get the benefits, the bitcoin network will die. So the issue of bitcoin is designed that whoever contributes computing power to keep the bitcoin network running can get the fee paid by the network - bitcoin

    3. Let's take another example. Our banks need fees to maintain their operation. We all know that bank transfer fees start from 2 yuan, and a card costs 10 yuan a year. But these fees are really the fees that banks need to maintain their operation, otherwise the bank will go bankrupt

    In fact, we all know that these fees are reced in various forms. We can consider another mode: all services of banks are free, but as compensation, the state allows banks to issue their own currency, but only 1% of the total amount of all currencies can be issued each year

    in this way, all people can enjoy the free service of the bank, but they have to bear 1% inflation virtually. In fact, it's easy for people to accept the immediate benefits - free services (which is the essence of the Internet model), without considering the impact of long-term inflation

    this is the basic principle of the issuance and operation of bitcoin. Miners contribute a lot of computing power to maintain the operation and stability of bitcoin network, and in the process of computing, miners can get the new issue of bitcoin. Although inflation has actually occurred, the money in my wallet has not decreased, has it

    and a clever design of bitcoin is that there are fewer and fewer new bitcoins, and the new bitcoin issue is decaying, so although bitcoin is not the deflationary currency that most people think, its inflation rate is really getting lower and lower, and finally tends to zero, and once the irrecoverable loss of bitcoin occurs, it will deflate

    7.

    Just download a gpu360 miner

    8.

    Computer Mining: when users "mine" bitcoin, they need to use the computer to search for 64 bit numbers, and then compete with other gold miners by repeatedly solving puzzles to provide the required numbers for the bitcoin network. If the user's computer successfully creates a set of numbers, then they will get 25 bitcoins. In short, it's about looking for bitcoin

    e to the decentralized programming adopted by the bitcoin system, only 25 bitcoins can be obtained every 10 minutes, and by 2140, the maximum number of bitcoins in circulation will reach 21 million. In other words, bitcoin system is able to achieve self-sufficiency, resist inflation through coding, and prevent others from destroying these codes

    extended data:

    the corresponding laws and regulations of computer mining in China:

    in China, the regulations on the administration of RMB prohibit the proction and sale of token tickets. Because there is no clear judicial interpretation of the definition of token ticket, if bitcoin is included in the "token ticket", the legal prospect of bitcoin in China will face uncertainty

    the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of virtual currency of online games (Wen Shi Fa [2009] No. 20) on June 4, 2009 stated that the application scope of virtual currency of online games was defined for the first time, and the distinction between the current virtual currency of online games and the virtual props in the game was made; At the same time, the notice said that the "notice" stipulates that enterprises engaged in related services must be approved before they can operate

    in China, some Taobao stores also began to accept the use of bitcoin, and the number of businesses will graally increase

    in October 2013, the first bitcoin quarterly, one bit, was released

    on October 15, 2013, the network accelerator service of the network announced its support for bitcoin

    on October 26, 2013, btcmini reported that GBL was hacked

    on October 31, 2013, Lei Teng, a famous Internet lawyer, proposed the event of "filing a case to investigate the closure of GBL bitcoin trading platform as soon as possible", analyzed the "value function" and "use function" of bitcoin, and bitcoin should be governed by relevant laws

    9. 01 close Homegroup
    control panel – administrative tools – services – Homegroup listener and Homegroup provider are disabled
    02 turn off disk defragmentation and automatic maintenance scheling tasks
    select disk c-properties – tools – optimize and defragment drives – optimize – change settings – deselect run as scheled
    03 close Windows Defender (as the case may be)
    control panel – Windows Defender – settings – implement protection – remove check and administrator – enable Windows Defender – remove check
    control panel – administrative tools – Services - Windows Defender service is disabled
    04 close windows search
    control panel - Administrative Tools - Services - Disable windows search
    05 set up the superfetch service
    control panel – administrative tools – service – superfetch - Startup type – automatic (delayed startup)
    06 clean the windows.old folder
    C disk - right click - properties - disk cleaning - select the previous windows installation check box - OK to clean.
    10. Position management refers to setting the proportion of account funds used for futures trading margin and the proportion of margin allocated to each trading variety. Position management is the core part of building a futures trading system, because the size and distribution of positions determine the trading risks faced by the account. In actual trading, investors can not obtain a trading mode with 100% success rate. If there is no reasonable position management mode, one or two loss trading may cause fatal losses, And scientific position management can rece the loss caused by wrong judgment and rece the ruin rate of account transactions

    generally, there are two modes to formulate position management strategies: the first is to determine the size of the total position before trading, that is, to set the proportion of the total margin in the account funds, and then to allocate the amount of funds occupied by each trading proct. By calculating the volatility of each proct, we can get the risk faced by a single proct, Finally, add up the risk of all positions; The second way is to first determine the total risk that the account is willing to face. For example, set the maximum loss of the account as 5% of the total fund, and then allocate the risk of each variety. By comparing the volatility of a single variety with the risk, we can calculate the size of the variety's position. After summing up, we can get the total size of the position.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750