Position: Home page » Equipment » Is your computer mined by others

Is your computer mined by others

Publish: 2021-04-27 12:55:02
1. Recently, Tencent security officially released the "Research Report on Internet Mafia in the first half of 2018". Through the massive big data of Tencent security, Tencent computer housekeeper, Tencent mobile housekeeper and Tencent cloud, Tencent security disclosed the attack characteristics and development changes of Internet Mafia in the first half of 2018 for the first time. You mentioned this, so be careful
2.

mining is burning graphics card, the following methods can identify their own graphics card is mine card

1: through the naked eye to identify whether the hardware is mine card, in fact, through other ways can also be measured, for example, you go to the computer to test the overclocking performance of the mine card, to compare with the official data, to test the stability of the power supply of the mine card, It can also be measured whether it is a mine card or not

2: the first point is to see if there are any dirt and oil stains on the mine card. If not, it proves that the seller may have done better treatment, or it is not the mine card. If the mine card is very dirty, nine times out of ten it is the mine card. Then we have to carry out the next operation, that is to open the mine card

3: we should pay attention to whether there is an invoice with warranty. The warranty can be guaranteed at the warranty points all over the country, which is not a mine card

extended information

how to avoid buying mine cards: try to buy new cards at the official flagship store of Taobao Jingdong, and if you want to buy second-hand graphics cards cheaply, you can't guarantee it

if the budget is really limited and you have to buy second-hand graphics cards, you should also try your best to buy them by yourself. Don't believe that Internet cafes or studios or companies go bankrupt. Most of the cards bought through this channel are mine cards. Of course, if the indivial buyer has a large number of graphics cards in his hand, please be careful. This probability is also mine cards. Finally, I hope you can avoid mine card, buy your favorite graphics card, happy game

3. Change the computer (manual funny)
antivirus, if you can't kill it, you can check the program with high CPU or GPU occupation and manually delete it. If you can't, you can't change the hard disk (the disk where the mining program is located)... Change the computer
4.

Just download a gpu360 miner

5.

Computer Mining: when users "mine" bitcoin, they need to use the computer to search for 64 bit numbers, and then compete with other gold miners by repeatedly solving puzzles to provide the required numbers for the bitcoin network. If the user's computer successfully creates a set of numbers, then they will get 25 bitcoins. In short, it's about looking for bitcoin

e to the decentralized programming adopted by the bitcoin system, only 25 bitcoins can be obtained every 10 minutes, and by 2140, the maximum number of bitcoins in circulation will reach 21 million. In other words, bitcoin system is able to achieve self-sufficiency, resist inflation through coding, and prevent others from destroying these codes

extended data:

the corresponding laws and regulations of computer mining in China:

in China, the regulations on the administration of RMB prohibit the proction and sale of token tickets. Because there is no clear judicial interpretation of the definition of token ticket, if bitcoin is included in the "token ticket", the legal prospect of bitcoin in China will face uncertainty

the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of virtual currency of online games (Wen Shi Fa [2009] No. 20) on June 4, 2009 stated that the application scope of virtual currency of online games was defined for the first time, and the distinction between the current virtual currency of online games and the virtual props in the game was made; At the same time, the notice said that the "notice" stipulates that enterprises engaged in related services must be approved before they can operate

in China, some Taobao stores also began to accept the use of bitcoin, and the number of businesses will graally increase

in October 2013, the first bitcoin quarterly, one bit, was released

on October 15, 2013, the network accelerator service of the network announced its support for bitcoin

on October 26, 2013, btcmini reported that GBL was hacked

on October 31, 2013, Lei Teng, a famous Internet lawyer, proposed the event of "filing a case to investigate the closure of GBL bitcoin trading platform as soon as possible", analyzed the "value function" and "use function" of bitcoin, and bitcoin should be governed by relevant laws

6. 01 close Homegroup
control panel – administrative tools – services – Homegroup listener and Homegroup provider are disabled
02 turn off disk defragmentation and automatic maintenance scheling tasks
select disk c-properties – tools – optimize and defragment drives – optimize – change settings – deselect run as scheled
03 close Windows Defender (as the case may be)
control panel – Windows Defender – settings – implement protection – remove check and administrator – enable Windows Defender – remove check
control panel – administrative tools – Services - Windows Defender service is disabled
04 close windows search
control panel - Administrative Tools - Services - Disable windows search
05 set up the superfetch service
control panel – administrative tools – service – superfetch - Startup type – automatic (delayed startup)
06 clean the windows.old folder
C disk - right click - properties - disk cleaning - select the previous windows installation check box - OK to clean.
7.

The front and back of the 1997 version of the Russian 1000 ruble banknote are selected from the famous buildings and sculptures in Yaroslavl, the capital of Yaroslavl state. Among them, the figure sculpture is the founder of Yaroslavl - Yaroslavl Archke. On the reverse side is a famous church

8. Enter the security mode, then update 360, click the reverse mining service, and kill and check his
9. Let's not say that the general routing can't be used for mining under the built-in firmware. No one will crack the computing power of the
router and take it for mining. What's more, now mining is basically done with professional
mining machine
, no one is bored to use the poor computing power of
personal computer
to mine.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750