Malicious mining
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
1. Back up important data and photos and restore factory settings. Don't install applications from unknown sources. In addition, don't authorize in permission settings
2. You can swipe the computer to see if it can't work. Besides, the computer needs to clean up the memory on time so that it won't get stuck. The memory of the mobile phone is seriously insufficient. It is recommended to clean up the memory lightly, and then restart your mobile phone again
3. Clear the data of the mobile phone. If there are important things, save them on the network disk first, and then restore the factory settings three times. This is safer
1. Set the security level of the browser. Our common browsers all have the function of security level setting. Through reasonable setting, we can effectively filter the access restrictions of some illegal websites, so as to rece the damage to computers and personal information
2. Firmly resist reactionary, pornographic and violent websites. On the one hand, these bad information will affect the physical and mental health of teenagers, on the other hand, many illegal websites will use browser vulnerabilities to attack users3. Don't click illegal links at will
When downloading software and materials, we should choose the regular website or official website5. Turn off some sensitive functions in common communication software. Such as "people nearby" in wechat and "allowing strangers to view photos" in wechat privacy
6. Do not take photos of your family and address. If it goes on like this for a long time, as long as it is analyzed and summarized by others, the information exposed will become a complete set of information, which hides all kinds of unpredictable risks
Do not test related information on the Internet. Some websites do surveys and ask for information about age, hobbies, gender, etc. to do it for a small profit. This information may be used by others, and graally summarized, and sold to others for profit or threatIn fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g
it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses
moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline
Mining is burning graphics card, the following methods can identify their own graphics card is mine card
1: through the naked eye to identify whether the hardware is mine card, in fact, through other ways can also be measured, for example, you go to the computer to test the overclocking performance of the mine card, to compare with the official data, to test the stability of the power supply of the mine card, It can also be measured whether it is a mine card or not
2: the first point is to see if there are any dirt and oil stains on the mine card. If not, it proves that the seller may have done better treatment, or it is not the mine card. If the mine card is very dirty, nine times out of ten it is the mine card. Then we have to carry out the next operation, that is to open the mine card
3: we should pay attention to whether there is an invoice with warranty. The warranty can be guaranteed at the warranty points all over the country, which is not a mine card
extended information
how to avoid buying mine cards: try to buy new cards at the official flagship store of Taobao Jingdong, and if you want to buy second-hand graphics cards cheaply, you can't guarantee it
if the budget is really limited and you have to buy second-hand graphics cards, you should also try your best to buy them by yourself. Don't believe that Internet cafes or studios or companies go bankrupt. Most of the cards bought through this channel are mine cards. Of course, if the indivial buyer has a large number of graphics cards in his hand, please be careful. This probability is also mine cards. Finally, I hope you can avoid mine card, buy your favorite graphics card, happy game
engine, so it can remove all kinds of stubborn Trojan viruses
when you uninstall the malware, and you can't find any entries related to lovecloud in the registry, you can be sure to delete it completely.