1. mining is burning graphics card, the following methods can identify their own graphics card is mine card
1: through the naked eye to identify whether the hardware is mine card, in fact, through other ways can also be measured, for example, you go to the computer to test the overclocking performance of the mine card, to compare with the official data, to test the stability of the power supply of the mine card, It can also be measured whether it is a mine card or not
2: the first point is to see if there are any dirt and oil stains on the mine card. If not, it proves that the seller may have done better treatment, or it is not the mine card. If the mine card is very dirty, nine times out of ten it is the mine card. Then we have to carry out the next operation, that is to open the mine card
3: we should pay attention to whether there is an invoice with warranty. The warranty can be guaranteed at the warranty points all over the country, which is not a mine card
extended information
how to avoid buying mine cards: try to buy new cards at the official flagship store of Taobao Jingdong, and if you want to buy second-hand graphics cards cheaply, you can't guarantee it
if the budget is really limited and you have to buy second-hand graphics cards, you should also try your best to buy them by yourself. Don't believe that Internet cafes or studios or companies go bankrupt. Most of the cards bought through this channel are mine cards. Of course, if the indivial buyer has a large number of graphics cards in his hand, please be careful. This probability is also mine cards. Finally, I hope you can avoid mine card, buy your favorite graphics card, happy game
2. There are several obvious manifestations of mining virus in
1. The computer runs abnormally slowly
2. The computer crashes abnormally / gets stuck
3. Nothing is turned on, but the CPU occupancy rate is very high
4. The network is slow and a large number of network requests appear
3. Open & quot; Control panel & quot-& gt;& quot; Management tool & quot-& gt;& quot; Computer management & quot; Of & quot; Local users and groups & quot-& gt;& quot; Group & quot, Open the administrators group. If you find that there are other members besides administrators, then you are under control. If not, then at least the computer is not under full control. Whether there is a back door, you can use anti-virus software (such as Kaspersky), Trojan horse killing software (such as Trojan horse killer, 3721 anti spy experts), etc.
4. Start - run - enter CMD in the dialog box - enter net user to check that there are generally guest & # 92 in the user; SUPPORT_ 388945a0\ HELPASSISTENT\ aspnet\ The administrator and your own account are normal, and the superfluous one is to control your account remotely
remote control refers to that the management personnel connect the computer to be controlled by means of remote dial-up through computer network or internet access, display the desktop environment of the controlled computer to their own computer, and configure, install and modify the software of the remote computer through the local computer. WOL (remote wake-up), that is, remote boot through local area network.
5. 360 has a traffic firewall. If there is a remote control monitoring you, a large amount of data will be uploaded. It is usually injected into the system process or explorer.exe or ie. use 360 to kill strange startup items and services, kill all IE plug-ins that can be deleted, open the QVM and little red umbrella engine of security guard, and clear the white list of antivirus and guard, Check and kill 360 security guard and antivirus once, delete the game and QQ that may be infected, restart the patch after killing the virus, and download QQ and game again. If necessary, you can find an MBR repair tool. If you are infected by this virus, you can't reload the system. You need to repair the MBR. Do remember to change QQ ah game ah what password. There is also a Trojan horse in most Internet cafes. Try not to play games in Internet cafes. There are usually all kinds of downloaders and number stealing ponies. If you don't believe it, try installing a 360 in Internet cafes. Nothing else. Good luck.
6. 1. Check the network connection without opening the program to connect to the network. Because as long as the computer in the remote control Trojan will take the initiative to connect to the control side. There are many tools to view the network connection, you can provide firewall or 360safe to view. 2. Check whether there is a super hidden account HKEY_ LOCAL_ MACHINE\ SAM\ SAM\ Domains\ Account\ Users\ Check whether there is a suspicious account in names, because the super hidden account can't be displayed in the users in the control panel, and can only be viewed in the registry. 3. See if the threat service or remote control Trojan service has been turned on. The following services should be stopped. When the following services are stopped, you can see what other services are turned on, and then check online to see if they are suspicious services. If so, stop them. Alerter - error alarm. Automatic updates - windows updates automatically. Computer browser - used to browse LAN computer services, but off does not affect browsing! Distributed Link Tracking Client - used to update the connection information of LAN. For example, there is a file in computer a and a connection is made in computer B. if the file is moved, the service will update the information. It takes up four megabytes of memory. Human interface device access supports accessories for "mentally retarded" computers, such as buttons for increasing the volume of the keyboard, etc.. Indexing service - horrible XP slow down internet connection firewall (ICF)... XP firewall... Turn off without using it. Logical Disk Manager - disk management service... It will inform you when necessary, so it is usually off. Messenger - not MSN, turn off if you don't want to be harassed. Note: Demon sting is to use this. NetMeeting remote desktop sharing! NVIDIA driver helper service - NVIDIA graphics card helps print spooler - printer service. If you don't have it, you can turn it off. Remote Desktop Help Session Manager - remote help service remote registry - Remote Registry run / modify. Big hole! Server - LAN file / print sharing required. SSDP discovery service - no hardware uses this service... System event notification - records user login / logout / restart / shutdown Information System Restore Service - system restore service task scheler windows scheling service. Telnet - vulnerability Terminal Services - remote login local computer, fast user switching and remote desktop functions need themes - dress up for XP, don't turn off too flashy, uninterruptible power supply - power outage protection equipment... Windows time - online time proofreading... 4. Check the system event records, see if there are suspicious records[ Hacker Defense] build the first brand of network security, research the latest hacker attack and Defense Technology www.hacker.com.cn