Position: Home page » Equipment » Mining course of Monroe coin Ubuntu

Mining course of Monroe coin Ubuntu

Publish: 2021-04-18 13:31:53
1. Try Tencent computer housekeeper killing, antivirus management 2 in 1, Trojan horse killing upgraded to professional antivirus, killing more thoroughly; Integrated with jinshanyun killing engine and xiaohongsan local killing engine, the computer manager's own anti-virus engine can fully guarantee the effect of virus killing. In addition, the computer manager system repair engine can help users repair the system when system problems are detected.
2. You can install some anti-virus software on the computer, such as 360 security guard, and then keep it on all the time. In this way, you can prevent the virus from entering the computer. If it has been poisoned, use 360 first aid box to check it in the safe mode.
3. It is safe to use 360 to protect your computer and manage your Monroe on the largest digital asset platform in China
4. No
Monroe can solve these privacy problems by automatically applying confidentiality technology to every transaction. You can rest assured that you can't have a "contaminated" Monroe. This is an economic concept, called "interchangeability", historically considered to be an important feature of all currencies
5. Not suitable for mining, you can consider the interstellar bit, the latest proct hummingbird H1 is based on Linux system.
6.

April 9, 2020 update reply, the problem has been solved, in the bottom of the answer

April 8, 2020:

although it has been a long time, but still answer, I recently encountered a similar problem, you may hit the Monroe coin mining Trojan horse, there is a cmdc.exe in the deep directory of Disk C, every time the mouse stops for a period of time, it will start to execute, The mouse disappears from the resource manager with the help of Microsoft's Process Explorer tool. We haven't found a solution yet. After deleting it, the mouse will be still for a while and the related files will be created again. The config file at the bottom indicates that it is generated by XmR stak, which can be found in network search

on April 9, 2020, the problem has been solved. It is estimated that it is a novice or novice of mining Trojan horse. After replying to this problem on April 8, the following actions have been continued:

  1. according to the file creation time of cmdc.exe, if you use the directory where CMDC is located to open it directly with resource manager, you can't see any files, We can only use the advanced search function of tools to find the files created on the same day and two days before. We find that there is a cmdc.zip in the superior directory of cmdc.exe, in which the files related to cmdc.exe are deleted

  2. according to the file creation time of cmdc.exe, find all the programs installed within 18 days and 2 days. During this period, the program installed is Utorrent, and the program is unloaded. Continue to use the search everything tool to search all the files by the keyword Utorrent, and delete them

    after the above, the computer did not operate for 20 minutes, and there was no cmdc.exe again, and the computer resource curve was stable, and there was no temperature surge and fan crazy running

  3. < / OL >

    later, I searched for Monroe coins on station B, and there was a mining tutorial..... After a few eyes, this thing is to use the CPU or GPU of the computer for mining, generally the CPU. What I met was GPU, and there would be the user account of Monroe coins in the relevant configuration file (I only blame that my file was deleted too fast to find)

    in a word, the lesson is that if you don't use the cracking tools, you need to be prepared for psychological and property losses. When the temperature of the computer soars abnormally, you should pay special attention to this situation, and you may have been caught,
    P.S. at the beginning, I thought that there was something wrong with the heat dissipation, cleaned the fan, and re coated with silicone grease, but it didn't work

7. The game, program or web page you use is implanted with Trojan horse. You use your computer to secretly dig virtual currency in the background and send it to hackers. In fact, you use your computer to help them do things. This will increase the fever of your computer, accelerate the loss of your computer, make more use of your home's electricity, and even affect the running speed of the program,
8. These screenshots can be used. You need to be careful when you have money transactions with the other party. I hope my answer can help you.
9.

Yes, I use hayu miner's Linux command to mine. It only takes two steps for you to mine under Linux system:

< UL >
  • open the website, input the mobile phone number, and select how many CPUs you want to use to mine. The default is to use 50% of the CPU to mine. Click to generate your special command and

  • that's how simple the operation is

    10. There are a lot of mining with Ubuntu, but the efficiency of home computer mining is very low
    it's basically a waste of electricity.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750