There is something wrong with the mining computer
Publish: 2021-04-25 10:01:20
1. Computer virus, then the best solution is to format the system disk or the whole disk, or re partition and then re install the system, through the system CD or the proction of U disk boot disk to install, through the shortcut key or enter the BIOS to set boot items, boot from CD or USB and then install the system, so that the computer can resume normal use and operation
2. Download the easy miner
register the Ethernet wallet
the wallet address to the mining software to start mining
the money you have g can be sold in the trading market
that's it
register the Ethernet wallet
the wallet address to the mining software to start mining
the money you have g can be sold in the trading market
that's it
3. Methods / steps
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<
2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly
3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<
4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area
5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it
6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
first of all, if it is a virus written by a rookie, you can find the file path in the task manager, directly terminate the process tree, or directly find the path to delete it<
2 / 6
Second, if the other party's technology is enough, it is difficult for us to terminate the process, then we can download a computer housekeeper. Now the computer housekeeper also increases the scanning rate of mining virus, and if we find it, we can clean it directly
3 / 6
thirdly, if the computer housekeeper can't handle it, then we can check and kill avast. This program is the first in anti-virus, and it's like a sword for mining viruses<
4 / 6
Fourth, if we still suspect that there is a mining virus on the computer after using avast, we first open the process and manually put the document path to the quarantine area
5 / 6
fifthly, after we put it in the isolation area, we use avast's relaxation for analysis, and then send it to avast's staff. If we suspect that it is a mining virus, the other party will give us manual analysis. If it is, the other party will also help us delete it
6 / 6
sixthly, if we still have doubts after being determined in our profession, if it's not Daniel, then my uncle will need to install the computer again. After all, everything is clear
network experience: https://jingyan..com/article/ca41422f1d83601eae99edf3.html
thank you (≥ 8711; ≦)
4.
Computer mining is a bitcoin mining machine, which is a computer used to earn bitcoin
this kind of computer generally has professional mining chips, and works in the way of burning graphics card, which consumes a lot of power. It is one of the ways to get bitcoin that users download software from personal computer and then run specific algorithm to get corresponding bitcoin after communicating with remote server
5. Bing win coin has never been heard of. It should be a kind of counterfeit coin, but few people play in the mainstream coin circle. I have never heard of this kind of counterfeit coin before, but this kind of counterfeit coin is suspected of MLM
there have been many similar pyramid schemes before. They often carry out pyramid schemes under the guise of bitcoin or virtual currency, but they have nothing to do with virtual currency
bitcoin home.com once broke out spark entertainment bitcoin scam and Porter coin scam. Their MLM model is the same, and there is no new idea, the use of our greedy psychology. There is no pie in the sky for no reason.
there have been many similar pyramid schemes before. They often carry out pyramid schemes under the guise of bitcoin or virtual currency, but they have nothing to do with virtual currency
bitcoin home.com once broke out spark entertainment bitcoin scam and Porter coin scam. Their MLM model is the same, and there is no new idea, the use of our greedy psychology. There is no pie in the sky for no reason.
6. First of all, whether a blockchain project is MLM or not should be judged from multiple perspectives.
in the process of development, blockchain has gone through three stages
blockchain 1.0. In this stage, it is mainly to realize digital currency, core nodes and front-end tools
the biggest feature of blockchain 2.0 at this stage is that it supports smart contracts, one of the representative procts is Ethereum. In Ethereum, the smart contract is used to develop the contract program, and finally deployed in the blockchain ledger
blockchain 3.0 blockchain goes beyond the scope of digital currency and regards blockchain as a wide range of solutions, which can be combined with other fields by using blockchain technology
however, many domestic blockchain related projects stay in the stage of blockchain 1.0, and one of their basic modes is to publish white papers, issue digital currency and go to the stock exchange, Then in accordance with the market, trading to earn profits
however, there may be some MLM money, air money and so on. What we can do is to take this kind of thing with a rational eye and not to invest blindly
in the process of development, blockchain has gone through three stages
blockchain 1.0. In this stage, it is mainly to realize digital currency, core nodes and front-end tools
the biggest feature of blockchain 2.0 at this stage is that it supports smart contracts, one of the representative procts is Ethereum. In Ethereum, the smart contract is used to develop the contract program, and finally deployed in the blockchain ledger
blockchain 3.0 blockchain goes beyond the scope of digital currency and regards blockchain as a wide range of solutions, which can be combined with other fields by using blockchain technology
however, many domestic blockchain related projects stay in the stage of blockchain 1.0, and one of their basic modes is to publish white papers, issue digital currency and go to the stock exchange, Then in accordance with the market, trading to earn profits
however, there may be some MLM money, air money and so on. What we can do is to take this kind of thing with a rational eye and not to invest blindly
7. There must be damage. If the graphics card is used, it will run with full load and generate a lot of heat. If the quality of the graphics card is poor and the heat dissipation is poor, there is a risk of burning out
8. The harm of Trojan virus can be divided into the following concentration
1. Joke virus is not destructive, but it will cause certain interference to users
2. To control the virus, you will generally control your computer, leaving a back door so that you can enter and leave your computer at will and steal your privacy
3. Number stealing: you can steal your game account< Destructive: directly destroy your computer system and files. Cause the file to be deleted, lost, infected, etc. The plot is very serious
the first and second are usually not infectious. The third and fourth are highly infectious~
1. Joke virus is not destructive, but it will cause certain interference to users
2. To control the virus, you will generally control your computer, leaving a back door so that you can enter and leave your computer at will and steal your privacy
3. Number stealing: you can steal your game account< Destructive: directly destroy your computer system and files. Cause the file to be deleted, lost, infected, etc. The plot is very serious
the first and second are usually not infectious. The third and fourth are highly infectious~
9. As a distributed transmission protocol, IPFs is becoming more and more ecological, and there are many ways to participate in the investment. Let's sort it out one by one:
1. Participate in the mining of filecoin. Filecoin, as the incentive layer of IPFs, has a total amount of 2 billion tokens. At present, more and more people are involved in mining. But generally speaking, it is still in the early stage, with huge dividends and low price of fil. It is a good early stage of investment. At the same time, there are many ways of mining, such as investing in mines, purchasing cloud computing power and mining machinery. Among them, purchasing computing power is the most suitable for ordinary investors. The spot computing power of star harbor has the advantages of low threshold, high income and controllable risk
2. Purchase fil token. Since the main online line in October 2020, except for a wave of market just launched, it has not fluctuated much until now. Now it is the low-lying land of its value. We can start to build positions and lay out filecoin
3. Participate in ecological construction. As a distributed storage network, filecoin has great potential for the development of its storage applications, and the government has also given a lot of support. Therefore, if a team with technical development strength can independently participate in the development and construction of ecological applications, although the benefits of this participation method are not the most direct, it has huge explosive power in the later stage, which is worth considering.
1. Participate in the mining of filecoin. Filecoin, as the incentive layer of IPFs, has a total amount of 2 billion tokens. At present, more and more people are involved in mining. But generally speaking, it is still in the early stage, with huge dividends and low price of fil. It is a good early stage of investment. At the same time, there are many ways of mining, such as investing in mines, purchasing cloud computing power and mining machinery. Among them, purchasing computing power is the most suitable for ordinary investors. The spot computing power of star harbor has the advantages of low threshold, high income and controllable risk
2. Purchase fil token. Since the main online line in October 2020, except for a wave of market just launched, it has not fluctuated much until now. Now it is the low-lying land of its value. We can start to build positions and lay out filecoin
3. Participate in ecological construction. As a distributed storage network, filecoin has great potential for the development of its storage applications, and the government has also given a lot of support. Therefore, if a team with technical development strength can independently participate in the development and construction of ecological applications, although the benefits of this participation method are not the most direct, it has huge explosive power in the later stage, which is worth considering.
Hot content