Does Monroe coin mining have an impact on the unit LAN
Monroe can solve these privacy problems by automatically applying confidentiality technology to every transaction. You can rest assured that you can't have a "contaminated" Monroe. This is an economic concept, called "interchangeability", historically considered to be an important feature of all currencies
because those who come in after mobile phone mining will be cut leeks
precautions:
1. In the past two years, various myths about blockchain "overnight wealth" have been constantly staged, and "mining" cryptocurrency has become a new trend of wealth, and mobile phone mining is becoming more and more popular
2. There will be special mining machines for real mining. After all, every mining machine is not cheap now. Mobile phone automatic mining can be obtained at a very low price. What you dig is not bitcoin. Basically, the counterfeit coin you send is not worth money. At that time, you will still be cut leeks
-
the IP displayed may not be in the same network segment as the IP of the company's main router, and the DHCP IP on the main router may not be automatically obtained.
for example, the IP of the company's main router is 10.10.10.1
while the IP displayed on 360 portable WiFi is 192.168.1. *
is different from the IP of the main router, and the IP obtained by wireless automatic IP acquisition is 192.168.1. *, However, the correct IP of IP 10.10.10 * can not be obtained. Although the wireless connection status is displayed, it is limited IP and unable to access the Internet
-
if the IP is the same as that of the main router, ARP conflict may occur
for example, the IP of the company's main router is 192.168.1.1
and the IP displayed on 360 portable WiFi is 192.168.1.1
in this way, it conflicts with the IP of the company's main router, which will cause network paralysis
-
because of 360 portable WiFi, it is to the information of the original network card to achieve the purpose of surfing the Internet
for example, if you the IP and MAC information, the data displayed is two identical IP and MAC,
you can't judge which is the pseudo Mac, which will also cause difficulties to the management
-
if you are connected to a local area network, because you can't get the DHCP IP address assigned by the main router correctly, you may not be able to share printers
setting static IP can solve this problem,
but if it is a wireless printer, it may not work because it can not get the correct IP
generally, such as finance, electric power and public security. The data of these networks are not connected to the Internet.
notice of the Ministry of public security on banning the use of computers for public security business.
public security departments and bureaus of all provinces, autonomous regions and municipalities directly under the central government, and Public Security Bureau of Xinjiang proction and Construction Corps:
in recent years, Through the security inspection of the national public security information network, it is found that there is a common phenomenon of "one computer for two purposes" in public security business in public security organs all over the country, which poses a great threat to the safe operation of public security information network and the security of state secrets or police work secrets in public security work. In order to further strengthen the management of computers used in public security business, ensure the security of public security information, ensure the safe operation of public security information network, and ensure the normal development of public security business, the Ministry of public security specially requires the following:
1. Computers and network equipment used by public security organs are strictly prohibited to connect to both public security information network and Internet< Second, computers and network devices used by public security organs are strictly forbidden to connect to public security information network and external network without taking security isolation measures< Third, computers with classified information are strictly prohibited from connecting to the Internet or other public networks< 4. It is strictly forbidden to download and paste Internet information directly to the public security information network
those who are directly responsible for the violation of the above provisions will be subject to disciplinary action in accordance with the relevant provisions; The leader in charge of the unit where the person directly responsible is located shall be given disciplinary punishment according to the situation; If a crime is constituted, criminal responsibility shall be investigated according to law
the information and communication departments of public security organs at all levels should strengthen the security management of the public security information network, timely check, monitor and report the situation of "one computer for al use" in public security business, and immediately cut off the connection with the external network once found. The supervision, supervision and secrecy departments of public security organs at all levels shall incorporate the timely investigation and punishment of "one machine for two purposes" into their daily work. Leaders of public security organs at all levels should attach importance to the security management of public security information network, increase investment in security management, and firmly support the investigation and punishment of the above-mentioned violations.