Position: Home page » Equipment » Monero mining

Monero mining

Publish: 2021-04-14 22:42:03
1. You can install some anti-virus software on the computer, such as 360 security guard, and then keep it on all the time. In this way, you can prevent the virus from entering the computer. If it has been poisoned, use 360 first aid box to check it in the safe mode.
2. It is safe to use 360 to protect your computer and manage your Monroe on the largest digital asset platform in China
3. No
Monroe can solve these privacy problems by automatically applying confidentiality technology to every transaction. You can rest assured that you can't have a "contaminated" Monroe. This is an economic concept, called "interchangeability", historically considered to be an important feature of all currencies
4. To understand the problem of home computer mining, we must first explain the mining clearly. As like as two peas came out, they shared a identical record book, so they need a person with a right word to decide the record. Who will record it? Through a topic to decide whose computer is right first, then it has the right to record all the data of this block. This is the popular explanation of mining. And reward the bookkeeper to get an extra sum of money, which is the reward for mining. Reward the person who has contributed enough computing power to solve the problem, which is also the reason why we go mining. Money is money, in order to make money. In the beginning, bitcoin mining was just about CPU. Then, for more money, technicians developed faster and faster accounting methods for graphics cards, FPGA and ASIC chips. Please note here that bitcoin is only the bookkeeping method. Bitcoin is the sha256 algorithm, which is only applicable to this kind of algorithm and can only be used for mining. Later, more algorithms appeared, such as ethash, kawpow, cryptonight, zhash, x16r, randomx, etc. Pay attention to the concepts, algorithms (the above pile) and devices (CPU, graphics card, FPGA, ASIC). They complement each other. A currency may have multiple algorithms or a single algorithm for accounting. The same device can also run different algorithms to get different rewards. The only difference is the efficiency of accounting and the speed of making money. So bitcoin can be g with CPU, graphics card, FPGA and ASIC, but ASIC has the highest efficiency and cost performance. Let's go back to the topic, what can a home computer dig? Home computer = CPU + graphics card. The more suitable CPU is the monero under the randomx algorithm. For graphics card, it is suitable for the automatic selection of nicecash. Now I should talk about the specific mining tutorial to complete the answer, but I recommend a simpler and more convenient method, even without knowing all of the above.
5.

Graphics card digging Monroe is really better than other currencies, the income will be higher! Of course, digging eth is also a good choice

this is my own video card miner. The mining software uses ha Yu miner , (the reason why I choose this software is that ha Yu does not pump water ) there are about 12 pieces per day

6. The game, program or web page you use is implanted with Trojan horse. You use your computer to secretly dig virtual currency in the background and send it to hackers. In fact, you use your computer to help them do things. This will increase the fever of your computer, accelerate the loss of your computer, make more use of your home's electricity, and even affect the running speed of the program,
7. These screenshots can be used. You need to be careful when you have money transactions with the other party. I hope my answer can help you.
8. This is very similar to svchost.exe of the system, which is automatically created after deletion
at the beginning, I did a task before I found the problem. I used taskkill to delete the process every one minute. First, I eased it. Then every process of the system was determined by opening the file location. I found a file in the temp folder and deleted it. In addition, the program would not be created again.
9.

1. Close the access to the mining server

iptables - a input - s xmr.crypto-pool.fr - J dropandiptables - a output - D xmr.crypto-pool.fr - J drop.

2. Chmod - x minerd, cancel the execution permission. Do not delete minerd until the root cause is found, because it will be automatically generated once it is deleted

Service stop crond or crontab - R delete all execution plans

5

6. Check the / var / spool / cron / directory and find a timer file of root user

Download script statement:

[plain] view plain

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750