Position: Home page » Equipment » Does Monroe coin mining have an impact on the unit LAN

Does Monroe coin mining have an impact on the unit LAN

Publish: 2021-05-12 09:33:42
1. Go to the network to collect, you can ask Du Niang
2. It is safe to use 360 to protect your computer and manage your Monroe on the largest digital asset platform in China
3. No
Monroe can solve these privacy problems by automatically applying confidentiality technology to every transaction. You can rest assured that you can't have a "contaminated" Monroe. This is an economic concept, called "interchangeability", historically considered to be an important feature of all currencies
4.

because those who come in after mobile phone mining will be cut leeks

precautions:

1. In the past two years, various myths about blockchain "overnight wealth" have been constantly staged, and "mining" cryptocurrency has become a new trend of wealth, and mobile phone mining is becoming more and more popular

2. There will be special mining machines for real mining. After all, every mining machine is not cheap now. Mobile phone automatic mining can be obtained at a very low price. What you dig is not bitcoin. Basically, the counterfeit coin you send is not worth money. At that time, you will still be cut leeks

5. Don't waste electricity. Now you can't fill in the electricity bill for home computer mining. If you set up more than ten computers, you'll go bankrupt. Everyone uses professional mining machines. One computer can top thousands of home computers.
6.
  1. the IP displayed may not be in the same network segment as the IP of the company's main router, and the DHCP IP on the main router may not be automatically obtained.

    for example, the IP of the company's main router is 10.10.10.1

    while the IP displayed on 360 portable WiFi is 192.168.1. *

    is different from the IP of the main router, and the IP obtained by wireless automatic IP acquisition is 192.168.1. *, However, the correct IP of IP 10.10.10 * can not be obtained. Although the wireless connection status is displayed, it is limited IP and unable to access the Internet

  2. if the IP is the same as that of the main router, ARP conflict may occur

    for example, the IP of the company's main router is 192.168.1.1

    and the IP displayed on 360 portable WiFi is 192.168.1.1

    in this way, it conflicts with the IP of the company's main router, which will cause network paralysis

  3. because of 360 portable WiFi, it is to the information of the original network card to achieve the purpose of surfing the Internet

    for example, if you the IP and MAC information, the data displayed is two identical IP and MAC,

    you can't judge which is the pseudo Mac, which will also cause difficulties to the management

  4. if you are connected to a local area network, because you can't get the DHCP IP address assigned by the main router correctly, you may not be able to share printers

    setting static IP can solve this problem,

    but if it is a wireless printer, it may not work because it can not get the correct IP

7. Right
generally, such as finance, electric power and public security. The data of these networks are not connected to the Internet.
8. Your LAN is a typical VPN network. Of course, it belongs to classified network. This kind of network has both advantages and disadvantages. After all, the network is not trustworthy. What is exposed on the public network is not safe. It depends on what unit you are. If it is a state-owned enterprise, it definitely belongs to a classified network with a high safety factor. If it is a private enterprise, it depends on your security level.
9. Broadcast storm will cause serious packet loss. Access a port to Ping the gateway. The network cables in the LAN are disconnected in turn. Which disconnection and packet loss phenomenon disappeared indicates that the lower network has a loop or the source of the storm. Layer 2 switch can open port isolation to avoid the impact of broadcast storm on the whole network.
10. The relevant departments of the intranet have the right to monitor all your actions.

notice of the Ministry of public security on banning the use of computers for public security business.

public security departments and bureaus of all provinces, autonomous regions and municipalities directly under the central government, and Public Security Bureau of Xinjiang proction and Construction Corps:
in recent years, Through the security inspection of the national public security information network, it is found that there is a common phenomenon of "one computer for two purposes" in public security business in public security organs all over the country, which poses a great threat to the safe operation of public security information network and the security of state secrets or police work secrets in public security work. In order to further strengthen the management of computers used in public security business, ensure the security of public security information, ensure the safe operation of public security information network, and ensure the normal development of public security business, the Ministry of public security specially requires the following:
1. Computers and network equipment used by public security organs are strictly prohibited to connect to both public security information network and Internet< Second, computers and network devices used by public security organs are strictly forbidden to connect to public security information network and external network without taking security isolation measures< Third, computers with classified information are strictly prohibited from connecting to the Internet or other public networks< 4. It is strictly forbidden to download and paste Internet information directly to the public security information network
those who are directly responsible for the violation of the above provisions will be subject to disciplinary action in accordance with the relevant provisions; The leader in charge of the unit where the person directly responsible is located shall be given disciplinary punishment according to the situation; If a crime is constituted, criminal responsibility shall be investigated according to law
the information and communication departments of public security organs at all levels should strengthen the security management of the public security information network, timely check, monitor and report the situation of "one computer for al use" in public security business, and immediately cut off the connection with the external network once found. The supervision, supervision and secrecy departments of public security organs at all levels shall incorporate the timely investigation and punishment of "one machine for two purposes" into their daily work. Leaders of public security organs at all levels should attach importance to the security management of public security information network, increase investment in security management, and firmly support the investigation and punishment of the above-mentioned violations.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750