How to deal with it if it is mined
how to mine a mine pool
the location of a mine pool is also very particular. It's not that a mine pool can be built anywhere, but it needs early-stage capital investment. A mine pool is to combine a single mining machine together. Because of the collection of many miners' computing power, the computing power of the mine pool accounts for a large proportion, and the probability of digging bitcoin is higher. The mine pool will distribute rewards according to the contribution value of each equipment
there are many mines all over the world, and the scale of each mine varies from big to small. Generally, small mines no longer have great advantages. Large mines have many miners for mining. For each miner, he can join any mine or join multiple mines at the same time, The first task of the mine pool is to distribute the income to the miners
(1) PPLNs method
this method gathers the shares g by all miners together. Whenever a certain amount of shares is accumulated (generally 30 million shares), the mine pool will allocate the profits of the previous stage to the miners according to the proportion of contribution
in this way, the income of miners depends entirely on the time needed to dig 30 million shares in the mine pool. If you are lucky, you can dig them in a short time, then the income of miners will be more, otherwise it will be less. In return, the pool charges a 3% tax
(2) PPS mode
for users, the income of this mode is relatively stable
the profit mainly depends on the miner's mining speed. As long as the mining speed is stable, the corresponding profit can be obtained, and the profit is real-time, that is, the mine pool will pay the profit for the miner while the miner is running
obviously, every time a block is calculated, the mine pool has paid for all the miners. If the block fails in the subsequent confirmation link, all the losses will be paid by the pool operator. Therefore, this method reces the risk of the miners, but transfers the risk to the pool operator
therefore, usually the ore pool can charge a handling fee to make up for the possible losses caused by these risks. In this mode, the tax of the ore pool is 7.5%
the above is about how to mine. The difficulty of mining has greatly increased, but the mining army is expanding. If the basic equipment does not meet the standard, it will be difficult to gain in the mining instry, because the value of the virtual currency may not be equal to the price of an equipment, and many miners are not just digging bitcoin, Instead, we choose other virtual currencies to mine.
1. Back up important data and photos and restore factory settings. Don't install applications from unknown sources. In addition, don't authorize in permission settings
2. You can swipe the computer to see if it can't work. Besides, the computer needs to clean up the memory on time so that it won't get stuck. The memory of the mobile phone is seriously insufficient. It is recommended to clean up the memory lightly, and then restart your mobile phone again
3. Clear the data of the mobile phone. If there are important things, save them on the network disk first, and then restore the factory settings three times. This is safer
1. Set the security level of the browser. Our common browsers all have the function of security level setting. Through reasonable setting, we can effectively filter the access restrictions of some illegal websites, so as to rece the damage to computers and personal information
2. Firmly resist reactionary, pornographic and violent websites. On the one hand, these bad information will affect the physical and mental health of teenagers, on the other hand, many illegal websites will use browser vulnerabilities to attack users3. Don't click illegal links at will
When downloading software and materials, we should choose the regular website or official website5. Turn off some sensitive functions in common communication software. Such as "people nearby" in wechat and "allowing strangers to view photos" in wechat privacy
6. Do not take photos of your family and address. If it goes on like this for a long time, as long as it is analyzed and summarized by others, the information exposed will become a complete set of information, which hides all kinds of unpredictable risks
Do not test related information on the Internet. Some websites do surveys and ask for information about age, hobbies, gender, etc. to do it for a small profit. This information may be used by others, and graally summarized, and sold to others for profit or threatIn fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g
it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses
moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline
a new customer recently consulted with sine security company, saying that his server often fails to open the website of the card, and the remote connection to the server is extremely slow. Sometimes the Ping value reaches 300-500, and he often switches. After listening to the customer's words,
will generally judge that he has been attacked by CC + DDoS mixed traffic, It's strange to say that there is no traffic attack on the computer room. It's not a traffic attack, but it also causes the server card and website to fail to open. What kind of attack is this? In order to solve the problem of
client server card, we immediately arranged a security engineer to carry out security detection and deployment on his Linux server
{rrrrrrr}
Mining Trojan horse is also designed. If the mining process is forced to stop by customers, it will automatically start to continue mining to achieve uninterrupted mining.
careful inspection shows that it is through setting the hourly task plan, remotely downloading shell mining Trojan horse, and then executing, Check whether the current process exists or not. If not, start the Trojan horse to mine
a detailed security inspection was carried out on the client's Linux server. It was found that fortunately, there was no encrypted server data, and the worm was infected with the disease
virus. If the data was encrypted, the loss would be great. The client was a platform, and the client's data was very important. After finding out the mining Trojan horse,
do customers need to know how the server is attacked? Was the Trojan horse uploaded? It can prevent the attack
in the later stage
through the security detection and analysis of our security engineers, we found that the server uses Apache Tomcat environment, the open architecture of the platform is JSP + Oracle database, and Apache Tomcat uses the version of 2016, which leads to the serious remote command execution vulnerability of Apache, Through this vulnerability, the intruder can directly invade the server and get the administrator permission of the server,
sine security engineer immediately repairs the Apache vulnerability and clears the Trojan horse. So far, the problem has been solved, the client server
runs stably, and the network station opens normally strong>
antivirus, if you can't kill it, you can check the program with high CPU or GPU occupation and manually delete it. If you can't, you can't change the hard disk (the disk where the mining program is located)... Change the computer
basically you can see it
the graphics card that has been mined is basically scrapped.