What does mining attack mean
A graphics card, a software that can earn bitcoin. Inject new bitcoin (data hashing) into the whole bitcoin market, and then the market will have a certain incentive mechanism (allocate bitcoin to you in proportion). Because if you don't get it, no one will do it, just like your computer is a miner, and bitcoin is the reward
In 2009, bencong invented bitcoin, and set that there are only 21 million bitcoins. By participating in the proction of blocks and providing proof of work (POW), he can get the reward of bitcoin network. This process is mining
the concept of "mining" comes from the existing concepts in our real economic life, such as gold mining and silver mining. Because minerals are valuable, it drives people to pay labor to dig
another important point of bitcoin mining is that the miners who participate in mining recognize the value of bitcoin, and some of them are willing to spend money in the bitcoin market. Therefore, the mining of bitcoin is meaningful
extended data
currency characteristics of bitcoin
1, decentralized
bitcoin is the first distributed virtual currency, and the whole network is composed of users without central bank. Decentralization is the guarantee of bitcoin's security and freedom
2, bitcoin can be managed on any computer connected to the Internet. No matter where you are, anyone can dig, buy, sell or collect bitcoin
3, exclusive ownership
controlling bitcoin requires a private key, which can be stored in any storage medium in isolation. No one can get it except the user himself
4, low transaction cost
bitcoin can be remitted free of charge, but in the end, about 1 bitfen transaction fee will be charged for each transaction to ensure faster transaction execution
5, no hidden cost
as a means of payment from a to B, bitcoin has no cumbersome limit of quota and proceres. If you know the other party's bitcoin address, you can pay
6, cross platform mining
users can explore the computing power of different hardware on many platforms
Mine pool refers to:
as the computing level of the whole bitcoin network continues to rise exponentially, a single device or a small amount of computing power can not get the block reward provided by the bitcoin network on the bitcoin network
after the computing power of the whole network has been improved to a certain extent, the low probability of getting rewards has prompted some geeks on "bitcoin talk" to develop a method that can combine a small amount of computing power and operate jointly, and the website established in this way is called "mine pool"
extended data:
the existence of the mine pool reces the difficulty of bitcoin and other virtual digital currency mining, reces the mining threshold, and truly realizes the bitcoin mining concept that everyone can participate in
but its disadvantages are also very obvious, because computing power is connected to the mine pool. As a mine pool, it will have huge computing power resources. In the bitcoin world, computing power represents the bookkeeping right, and computing power is everything. If the computing power of a single mine pool reaches more than 50%, it will be easy to launch 51% attacks against virtual digital currencies such as bitcoin, The consequences are very terrible:
the mine pool can make the mine pool with 49% of the remaining computing power have no harvest, instantly quit the competition and go bankrupt. The mine pool's computing power exceeds 50%. If 51% attack is launched, it will easily occupy all the effective computing power of the whole network
Mining Trojan horse is now in the limelight, and its gold sucking power is catching up with blackmail virus. Recently, 360 security guard intercepted a Monroe coin mining Trojan horse spread by "eternal blue". Due to carrying heavy attack ammunition, the Trojan horse spread a large amount, reaching 100000 times a day at the peak, and 360 recently intercepted more than one million attacks
it is understood that this is a large-scale attack of mining Trojan horse carrying "eternal blue" against ordinary Internet users. In order to prevent computers from becoming the coolie of hackers mining, 360 reminds Internet users to ensure that they are well patched and immune to all kinds of attacks using "eternal blue", and at the same time, 360 security guard is opened to comprehensively defend against all kinds of mining Trojan horse
.
a new customer recently consulted with sine security company, saying that his server often fails to open the website of the card, and the remote connection to the server is extremely slow. Sometimes the Ping value reaches 300-500, and he often switches. After listening to the customer's words,
will generally judge that he has been attacked by CC + DDoS mixed traffic, It's strange to say that there is no traffic attack on the computer room. It's not a traffic attack, but it also causes the server card and website to fail to open. What kind of attack is this? In order to solve the problem of
client server card, we immediately arranged a security engineer to carry out security detection and deployment on his Linux server
{rrrrrrr}
Mining Trojan horse is also designed. If the mining process is forced to stop by customers, it will automatically start to continue mining to achieve uninterrupted mining.
careful inspection shows that it is through setting the hourly task plan, remotely downloading shell mining Trojan horse, and then executing, Check whether the current process exists or not. If not, start the Trojan horse to mine
a detailed security inspection was carried out on the client's Linux server. It was found that fortunately, there was no encrypted server data, and the worm was infected with the disease
virus. If the data was encrypted, the loss would be great. The client was a platform, and the client's data was very important. After finding out the mining Trojan horse,
do customers need to know how the server is attacked? Was the Trojan horse uploaded? It can prevent the attack
in the later stage
through the security detection and analysis of our security engineers, we found that the server uses Apache Tomcat environment, the open architecture of the platform is JSP + Oracle database, and Apache Tomcat uses the version of 2016, which leads to the serious remote command execution vulnerability of Apache, Through this vulnerability, the intruder can directly invade the server and get the administrator permission of the server,
sine security engineer immediately repairs the Apache vulnerability and clears the Trojan horse. So far, the problem has been solved, the client server
runs stably, and the network station opens normally strong>
Mining is the use of bitcoin mining machine, which is used to earn bitcoin
one of the ways to get bitcoin is that users download software from personal computer and then run specific algorithm to get corresponding bitcoin after communicating with remote server
bitcoin is a kind of virtual currency. Bitcoin mining system is the process of carrying out mathematical operation for bitcoin network through computer hardware. Miners who provide services can get a reward, because the network reward is calculated according to the tasks completed by miners, so the competition for mining is very fierce
mining is actually a competition of performance and equipment. The mining machine composed of many graphics cards, even if it's only hd6770, can surpass the single graphics card of most users
and this is not the most terrible. Some mining machines are made up of more such graphics card arrays. When dozens or even hundreds of graphics cards come together, the graphics card itself costs money. Considering the hardware price and other costs, there is a considerable expenditure in mining
bitcoin mining process:
1. To find the ore pool
to start mining, there must be a ore pool with convenient operation and stable output. Its function is to subdivide the data packets for each terminal, and pay the corresponding amount of bitcoin according to the proportion of the data packets calculated by the terminal through precise algorithm
2. Download bitcoin miner (software)
in fact, there are many kinds of this miner, you can go to the official website to download
3. Setting mining software is a green software. After installation, we can set the language first to facilitate further setting. Next, you need to set the server, user name, password, equipment and so on. Generally, the server chooses a better network from BTC guide series, and the user name and password are set by ourselves before
4, bitcoin mining start
when we confirm that all settings are correct, click the "start mining" button to start bitcoin mining, and then the graphics card will soon enter the full speed running state, the temperature and fan speed will increase, you can monitor the state through gpu-z or graphics card driver
Mining bitcoin is also called mining. Starting from the essence of bitcoin, the essence of bitcoin is actually a special solution generated by a bunch of complex algorithms. A special solution is one of the infinite (in fact, bitcoin is finite) solutions that can be obtained from the equations. Every particular solution can solve the equation and is unique
in the metaphor of RMB, bitcoin is the serial number of RMB. If you know the serial number of a note, you have the note. The process of mining is to constantly seek the special solution of this equation system through a huge amount of calculation. This equation system is designed to have only 21 million special solutions, so the upper limit of bitcoin is 21 million
bitcoin: also known as "bitcoin", is a kind of network virtual currency. Internet users can use bitcoin to buy some virtual goods, such as clothes, hats, equipment, etc. in online games. Internet users can also use bitcoin to buy real goods
extended data:
shortcomings
first, the vulnerability of trading platform. The bitcoin network is robust, but the bitcoin trading platform is fragile. Trading platform is usually a website, which will be attacked by hackers or shut down by competent authorities
Second, the transaction confirmation time is long. When bitcoin wallet is first installed, it will consume a lot of time to download historical transaction data blocks. While bitcoin transaction, in order to confirm the accuracy of data, it will take some time to interact with P2P network, and the transaction will be completed only after the whole network is confirmed Thirdly, the price fluctuates greatly. Due to the intervention of a large number of speculators, the price of bitcoin for cash fluctuates like a roller coaster. Making bitcoin more suitable for speculation rather than anonymous trading Fourthly, the public did not understand the principle, and the traditional financial practitioners resisted. Active netizens understand the principle of P2P network and know that bitcoin has no legal person to manipulate and control. But the public doesn't understand, and many people can't even tell the difference between bitcoin and q-coin“ "No issuer" is the advantage of bitcoin, but in the view of traditional financial practitioners, "no issuer" currency is worthless1 was 6 ÷ 36 = 1 / 6
2 events were 15 ÷ 36 = 5 / 12
3 events were 3 ÷ 36 = 1 / 12
there was no difference in simultaneous casting
1 event was 6 ÷ 21 = 2 / 7
2 events were 9 ÷ 21 = 3 / 7
3 events were 2 ÷ 21=2/21
