Position: Home page » Equipment » There are malicious mining software in Internet cafes

There are malicious mining software in Internet cafes

Publish: 2021-05-07 20:13:37
1. I didn't see this problem. I forgot that I didn't receive mine for two days. I use Tencent computer manager, which can monitor the process behavior, real-time intercept malicious programs and virus Trojan horse, prevent virus Trojan horse from modifying the settings of other programs in the system through the registry.
2. Using a closed system or an unpopular system is the simplest and most crude method, which is to some extent fruit powder welfare
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
3. Use the stubborn Trojan horse killer in the computer housekeeper toolbox to check and kill. The stubborn Trojan horse killer of the computer housekeeper is specially designed for malicious threats that cannot be removed or detected by ordinary killing software. It uses a very powerful search and kill index

engine, so it can remove all kinds of stubborn Trojan viruses
4. It's OK to use Tencent computer housekeeper. Every time I download a software, I open Tencent computer housekeeper, and then check if there is any abnormality in the software. If not, I use it. If there is, Tencent computer Housekeeper will kill it directly
5.

Unfortunately, Windows users are attacked by wana series of blackmail virus (bitcoin virus). The current solutions are as follows: (never pay ransom in any case, there is a lot of evidence that even if ransom files are paid, they cannot be decrypted.) < UL >
  • Windows users can completely eliminate wanacry blackmail virus on devices by formatting all hard disks

  • indivial users can contact domestic and foreign security manufacturers, such as Qihoo 360, Jinshan drug bully, Kaspersky, mcfel, Tencent security manager and other security centers for assistance in recovering important data

  • use the file recovery tool to recover. Users who have been infected with the virus can use the computer manager - file recovery tool for file recovery, with a certain probability of recovering your documents

  • < / UL >

    note: we will continue to pay attention to the handling methods of relevant security manufacturers and wait for a more superior perfect unlocking scheme

    6.

    Nice hash, a Slovenian mining platform, issued a statement on its official website on Thursday, claiming that the platform was attacked by hackers and a large number of bitcoins were stolen. At present, all services of the platform have been shut down

    nice hash said that the theft of bitcoin was e to the invasion of wallet. The company is verifying the number of bitcoin stolen and cooperating with relevant departments to investigate. According to the address where the bitcoin wallet is stored, more than 4700 bitcoins were stolen this time

    According to Sergey yunakovsky, a malware analyst at Kaspersky Labs, cryptocurrency is no longer a distant technology. Recently, we have observed an increase in malware attacks against different types of cryptocurrencies, and we expect this trend to continue

    and the soaring price of cryptocurrency is the main reason why they are targeted by hackers. Bitcoin staged a crazy rise this week. With the launch of bitcoin futures in the U.S. market on Saturday approaching, the market fever of bitcoin reached a new climax on Thursday. The price of the digital currency soared by about 40% in about 40 hours, breaking the five thousand yuan barrier in a row, and rising to more than $17000. On Thursday, bitcoin prices on some exchanges even rose above $19000, up more than 50% in 24 hours

    7.

    Take the SEC's social e-commerce chain, which is a digital asset I often use, as an example. We can check the SEC on the non trumpet of the digital currency market. We can see that the SEC has landed on two exchanges, one is fcoin, and the other is coin egg. However, the prices of the two exchanges are different. Take the figure as an example, if you want to move bricks, you can buy the SEC with a lower price in fcoin first, Then sell it on the higher price coin eggs. After decting the handling charges, you can get a certain difference. The operation of moving bricks is to move bricks. Of course, if you can't move bricks well, you will encounter the change of platform difference. There is still a certain risk ~

    8. It is recommended to "start" and "run" directly. Input: regedit, open the windows registry, click above: "Edit" - "find" (don't check the whole word match, check everything else), input content: lovecloud, and then find out and delete all related contents in the registry
    when you uninstall the malware, and you can't find any entries related to lovecloud in the registry, you can be sure to delete it completely.
    9. P2P network administrator (I don't know much about it, try more)
    & lt; br> It can control traffic (but it has cracking tools)
    & lt; br>< br />< br> The delay in Internet cafes is too long. It is estimated that someone is using P2P software to download things, not necessarily malicious data.
    & lt; br> Internet cafes are public Internet users. One person grabs too much broadband (I'm sorry that you webmasters are always doing this)
    & lt; br>< br />< br> I don't think it's very useful to install the Restore Card (at least it doesn't work on this issue)
    & lt; br>< br />< br>< br />< br> Ha ha, it's all my guesses, but not random guesses
    & lt; br> At present, I have contacted a computer in my home, and I have no chance to understand the LAN
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750