Apple Computer mining
Publish: 2021-04-05 20:15:52
1. necessary
2. Using a closed system or an unpopular system is the simplest and most crude method, which is to some extent fruit powder welfare
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
3.
MAC address, also called MAC code, is the body serial number of Bluetooth or WiFi technology. It needs to apply to the United States, which is equivalent to the role of the ID number. p>
modification will change the attributes of the proct and cannot be approved. If you want to change it, you can also use software brush< br />
4. In this way, the whole Internet Cafe will be deadly card, and then the Internet cafe owner will see whose computer CPU and graphics card occupy the most, and then see what you are doing or directly force you off the machine
5. You have to hold it down. I won't keep asking
6. Kaspersky or avast Mac version download down full scan, the above two reply is absolutely no brain promotion
7.
-
inappropriate
-
Mining generally needs independent graphics card
-
and the performance of graphics card is better
- < P > mining is generally Desktop PC < / OL > mining
8. Do not know love
you can download MC from Apple assistant
tararia, etc.
all free
you can download MC from Apple assistant
tararia, etc.
all free
9. Call it master drill
Hot content