What does it mean to dig a miner
mining: that is, bitcoin mining, is a process of using computer hardware to calculate the location of bitcoin and obtain it
mining refers to the use of bitcoin mining machine to obtain bitcoin, that is, the computer used to earn bitcoin. If you can get bitcoin, you can make money this kind of computer generally has professional mining chips and works by installing a large number of graphics cards, which consumes a lot of power. The computer downloads the mining software and then runs a specific algorithm to get the corresponding bitcoin after communicating with the remote server
precautions:
1. It's better to use DIY mining machine, from purchasing accessories to assembly, and then to mining software, to learn, focus, practice and graally understand the blockchain
Mining is actually a fixed investment process: regardless of the currency price, a certain amount of positions will be increased every day3. The bitcoin wallet used to store bitcoin uses military level encryption, which makes it impossible for hackers to steal easily. Bitcoin wallet also allows users to set two passwords, a public account password and a private password. The user of public account password is to let the user receive bitcoin. If users want to withdraw or transfer bitcoin from their accounts, they need to use a private password
Bitcoin is actually a virtual currency. When bitcoin first appeared, if you want to get bitcoin, you have to get bitcoin through mining. Therefore, bitcoin mining appeared. But bitcoin mining is more and more difficult, so it is very difficult to get bitcoin now
so now many people use Haru miner digs Ethereum, Monroe and other virtual coins. Most importantly, BTC can be directly equivalent in the end
Mining is the use of bitcoin mining machine, which is used to earn bitcoin
one of the ways to get bitcoin is that users download software from personal computer and then run specific algorithm to get corresponding bitcoin after communicating with remote server
bitcoin is a kind of virtual currency. Bitcoin mining system is the process of carrying out mathematical operation for bitcoin network through computer hardware. Miners who provide services can get a reward, because the network reward is calculated according to the tasks completed by miners, so the competition for mining is very fierce
mining is actually a competition of performance and equipment. The mining machine composed of many graphics cards, even if it's only hd6770, can surpass the single graphics card of most users
and this is not the most terrible. Some mining machines are made up of more such graphics card arrays. When dozens or even hundreds of graphics cards come together, the graphics card itself costs money. Considering the hardware price and other costs, there is a considerable expenditure in mining
bitcoin mining process:
1. To find the ore pool
to start mining, there must be a ore pool with convenient operation and stable output. Its function is to subdivide the data packets for each terminal, and pay the corresponding amount of bitcoin according to the proportion of the data packets calculated by the terminal through precise algorithm
2. Download bitcoin miner (software)
in fact, there are many kinds of this miner, you can go to the official website to download
3. Setting mining software is a green software. After installation, we can set the language first to facilitate further setting. Next, you need to set the server, user name, password, equipment and so on. Generally, the server chooses a better network from BTC guide series, and the user name and password are set by ourselves before
4, bitcoin mining start
when we confirm that all settings are correct, click the "start mining" button to start bitcoin mining, and then the graphics card will soon enter the full speed running state, the temperature and fan speed will increase, you can monitor the state through gpu-z or graphics card driver
Mining: that is, bitcoin mining, is a process of using computer hardware to calculate the location of bitcoin and obtain it
3, users use personal computer to download software, and then run specific algorithms. After communicating with remote server, they can get corresponding bitcoin, which is one of the ways to get bitcoin. Ordinary graphics cards don't need to try, and electricity charges are not enough. Master Lu has bitcoin test, which can see how long it takes for your computer to dig a bitcoin
bitcoin system is composed of users (users control the wallet through the key), transactions (transactions will be broadcast to the whole bitcoin network) and miners (a blockchain is generated by competitive computing to reach a consensus at each node, and the blockchain is a distributed public authoritative account book, including all transactions in the bitcoin network)
mining is a process of increasing bitcoin money supply. Mining also protects the security of the bitcoin system, prevents fraulent transactions, and avoids "double payment", which means spending the same bitcoin multiple times. Miners offer algorithms for bitcoin networks in exchange for the opportunity to get bitcoin rewards. The miners verify each new transaction and record it in the general ledger. Every 10 minutes, a new block will be "mined", and each block contains all the transactions from the generation of the previous block to the present, which are added to the blockchain in turn. We call the transactions included in the block and added to the blockchain "confirmed" transactions. After the transaction is "confirmed", the new owner can spend the bitcoin he gets in the transaction
there are two types of rewards for miners in the process of Mining: the new currency reward for creating a new block, and the transaction fee for the transaction contained in the block. In order to get these rewards, miners compete to complete a mathematical problem based on encrypted hash algorithm, that is, to use bitcoin mining machine to calculate the hash algorithm. This requires strong computing power, how much the calculation process is, and whether the calculation results are good or bad. As the proof of miners' calculation workload, it is called "workload proof". The competition mechanism of the algorithm and the mechanism that the winner has the right to record transactions on the blockchain ensure the security of bitcoin
miners also get transaction fees. Each transaction may contain a transaction fee, which is the difference between the input and output of each transaction. A miner who successfully "digs" a new block in the process of mining can get all the transaction "tips" contained in the block. With the decrease of mining reward and the increase of the number of transactions in each block, the proportion of transaction fee in miners' income will graally increase. After 2140, all miners' earnings will be made up of transaction fees
mining is a process of decentralizing settlement, in which each settlement verifies and settles the processed transaction. Mining protects the security of bitcoin system, and achieves the consensus of the whole bitcoin network without a central organization. The invention of mining makes bitcoin very special. This decentralized security mechanism is the basis of point-to-point e-money. The reward and transaction fee for casting new coins are a kind of incentive mechanism, which can regulate miners' behavior and network security, and at the same time complete the currency issuance of bitcoin.
Computer Mining: when users "mine" bitcoin, they need to use the computer to search for 64 bit numbers, and then compete with other gold miners by repeatedly solving puzzles to provide the required numbers for the bitcoin network. If the user's computer successfully creates a set of numbers, then they will get 25 bitcoins. In short, it's about looking for bitcoin
e to the decentralized programming adopted by the bitcoin system, only 25 bitcoins can be obtained every 10 minutes, and by 2140, the maximum number of bitcoins in circulation will reach 21 million. In other words, bitcoin system is able to achieve self-sufficiency, resist inflation through coding, and prevent others from destroying these codes
extended data:
the corresponding laws and regulations of computer mining in China:
in China, the regulations on the administration of RMB prohibit the proction and sale of token tickets. Because there is no clear judicial interpretation of the definition of token ticket, if bitcoin is included in the "token ticket", the legal prospect of bitcoin in China will face uncertainty
the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of virtual currency of online games (Wen Shi Fa [2009] No. 20) on June 4, 2009 stated that the application scope of virtual currency of online games was defined for the first time, and the distinction between the current virtual currency of online games and the virtual props in the game was made; At the same time, the notice said that the "notice" stipulates that enterprises engaged in related services must be approved before they can operate
in China, some Taobao stores also began to accept the use of bitcoin, and the number of businesses will graally increase
in October 2013, the first bitcoin quarterly, one bit, was released
on October 15, 2013, the network accelerator service of the network announced its support for bitcoin
on October 26, 2013, btcmini reported that GBL was hacked
on October 31, 2013, Lei Teng, a famous Internet lawyer, proposed the event of "filing a case to investigate the closure of GBL bitcoin trading platform as soon as possible", analyzed the "value function" and "use function" of bitcoin, and bitcoin should be governed by relevant laws
absolute positioning
Abstract windows toolkit Abstract window tool library
accumulator
active multi-media dynamic multimedia
address, [station] address
adware advertising software
AI searching intelligent search engine
alphabetic graphics letter mosaic graphics
alphabetic alphanumeric, American Standard Code for information interchange, analog, and gate, application programming interface, application programming interface, application programming interface, application programming interface, application programming interface, and application programming interface, Application oriented language, application oriented language, application programming interface, application programming interface, [Hong Kong] application programming interface
application service provider [Hong Kong] application service provider
AR (augmented reality), augmented reality, [Taiwan / Hong Kong] augmented reality, [Taiwan] extended reality
ASCII (American Standard Code for information interchange)
ASP (application service provider)
assembler, assembler, assembler,
asynchronous transfer mode, Asynchronous transfer mode, asynchronous transfer mode, audio card, augmented reality, augmented reality, [Taiwan] augmented reality
AWT (Abstract windows Toolkit) Abstract window tool library
b
B2B (business to business) business to business, business to business, business to customer
B2C (business to consumer, business to customer) business to consumer (or customer, indivial)
background, [Taiwan] background, suboptimal
bandwidth, communication frequency band, [Taiwan / Hong Kong] bandwidth
baseband, [Taiwan / Hong Kong] fundamental frequency
defense host, fortress host
BBS (bulletin board system) bulletin board system, electronic announcement system, electronic bulletin board, electronic announcement system, [Taiwan] electronic bulletin board
BFT (binary file transfer) binary file transfer
Bi (Business Intelligence) business intelligence
Big-5, Big-5, Big-5
binary file transfer
Binary Runtime Environment for wireless binary code, [Hong Kong] wireless binary runtime environment software
bit, bit, Bit slice, bit slice, bit slice partition
blog, blog, blog service provider, blog service provider, blog service provider, blog service provider, blog service provider, [Hong Kong] Bluetooth
boot
bootstrap, bootstrap, bootstrap, bootstrap,
brew (Binary Runtime Environment for wireless) wireless binary code, [Hong Kong] wireless binary running environment software,
broadband, [Taiwan / Hong Kong] broadband
broken link, BSP (blog service provider), blog service provider, blog service provider, [Hong Kong] blog service provider, [Taiwan] blog service provider,
browser,
buffer,
buffer board system, bulletin board system, electronic bulletin board system, electronic bulletin board system, electronic bulletin board system,
bus main line, bus network, [Hong Kong] trunk network
business intelligence
business to business business, business to business, business to customer
business to customer Enterprise to customer (or indivial)
byte, byte, byte code
C
C2C (consumer to consumer, customer to customer) consumer to consumer, customer to customer, Personal to personal
c-marc format (Chinese machine readable cataloging format) [Taiwan] Chinese machine readable cataloging format
cable modem,
CAD (Computer Aided Design), [Hong Kong] computer aided design
calendar server
call on motion dynamic monitoring
cam (Computer Aided Manufacturing) computer aided proction
cascading style sheets, cascading style sheets, cascading style sheets
case (Computer Aided Software Engineering) computer aided software engineering, Case sensitive case sensitive case sensitive CCCII (Chinese character code for information interchange), Chinese character code, Chinese character code, CD-E (compact disc erasable) erasable CD-R, CD-ROM, CD-ROM, CD-ROM, CD-ROM, CD-ROM, CD-ROM, CD-ROM, CD-ROM drive, CD-ROM, CD-RW (compact disc rewritable) erasable recorder, [Hong Kong] rewritable CD-ROM burner
CDMA (code division multiple access) code division multiple access
certificate server authentication server
CGI (Common Gateway Interface) general gateway interface, public gateway interface
channel definition format, channel definition format
character, [Taiwan] character
China machine readable cataloging format
China MARC format (China machine readable cataloging format)
Chinanet
Chinese character code for information exchange, Chinese machine readable cataloging format Chinese MARC format Chinese machine readable cataloging format CIMS bill image/ Closure system
click, [port] button
client, client, client, client, Client
CMOS RAM (complementary metal oxide semiconctor random access memory)
code division multiple access
code snippet code fragment
cold link
collabra news reader
collabra server Newsgroup server
com (component object model) component Object mode, component object model
common gateway interface, common gateway interface, common gateway interface
compact disc erasable CD-R, compact disc rewritable CD-R, compact disc rewritable CD-R, Compatibility, compatibility, interchangeability
complementary metal oxide semiconctor random access memory
complex programmable logic devices
component object model, Component object model
computer aided design,
computer aided manufacturing,
Computer Aided Software Engineering, [Hong Kong] computer aided engineering
Computer Integrated Manufacturing System
computer supported cooperative work, computer assisted group cooperation
computer to plate technology
computing
consumer to consumer, Personal to personal
corporate user [Hong Kong] company user
CPLD (complex programmable logic devices)
cracker intruder,
crackware scrap, [Hong Kong] waste software
cross platform
cross platform extension
CSCW (Computer Supported Cooperative Work) computer supported cooperative work, [Taiwan] computer assisted group cooperation
CSS (cascading style sheets) cascading style sheets, cascading style sheets, cascading style sheets, Cascading style form
customer to customer, person to person
cyber cash
cyberspace, cyberspace, cyberspace
cybersquatter, domain blocker, domain robber, domain cockroach, Network cockroaches
d
DAB (digital audio broadcasting), [Hong Kong] digital audio broadcasting, digital audio broadcasting, digital voice broadcasting
DAS (Direct Attached Storage) direct attached storage, [Taiwan] direct attached storage, [Hong Kong] Direct Attached Storage
data, [Taiwan] data
data exchange interface data exchange interface
data mining data development, data acquisition, data mining, data exploration, data sharing, data warehouse, data warehousing, data storage, database, database, Data base
daughtercard
DDoS (distributed denial of service)
distributed denial of service
deadlock, deadlock, stagnation
debug, debug, debug, debug, debug, debug, [station] demand calling
den (directory enabled network) directory driven network
denial of service, [station / port] denial of service
dense wavelength division multiplexing, dense wavelength division multiplexing, [station] high density wavelength division multiplexing, [port] high density wavelength division multiplexing, DWDM
destination document
DHCP (Dynamic Host Configuration Protocol)
DHTML (dynamic hypertext markup language)
di (Digital Intermediate), digital media, digital fine tuning, [Hong Kong] digital media
digerati [Hong Kong] digital elite
digital audio broadcasting