The mystery of bitcoin
there are some points for attention in account setting. It is suggested to set a common account in e-mail
then there is the most important miner account setting. Miner obviously refers to CPU or GPU. You need to set an account for each CPU or GPU. Suppose you have two hd7990, you need to set four different accounts for four GPUs
after the account registration, it's time to take the second step. Download the bitcoin miner. Here we recommend the small and easy-to-use guiminer, which can support CPU, oepncl, CUDA and other computing modes. Your CPU and graphics card can achieve maximum performance
guiminer, a bitcoin miner, still needs to make certain settings. After the interface is changed to Chinese, it will be very simple
if the setting is correct, click the "start mining" button, the graphics card will soon enter the full speed running state, the temperature and fan speed will increase, and you can also monitor the state through gpu-z or graphics card driver
the computing power displayed by guiminer is only a theoretical value. To know the actual output of bitcoin, you need to log in to the mine pool website, btcguild, to monitor your account information
now let's assume that you have g up several bitcoins, which naturally exist in btcguild, a foreigner's website. They can't be traded or converted into paper money for the time being
the functions provided by bitcoin China trading platform are clear at a glance, and you can understand them as soon as you read them, so you don't need to introce them any more. After you register, you can study them slowly
click the "bitcoin recharge" function of bitcoin China trading platform, and the system will provide you with a one-time bitcoin digital wallet address. This address can only be recharged once (for security reasons of the platform). After successful recharge, it will be invalid, and then the system will provide you with another address. Remember to update the wallet address in time every time, Otherwise, it will lead to recharge failure or loss
OK, now we import bitcoin from foreign websites into bitcoin China website, and it's up to you to deal with it. Keep it for appreciation, listing and selling, and exchange it for RMB. Specific how to operate, this Chinese website is easy to operate, we slowly study it
finally, let's talk about the equipment used in the bitcoin mining test. At first, I thought it was just an ordinary hd7870, but its computing power was much better than that of the ordinary hd7870. The key is that guiminer recognized it as the Tahiti core, which is the only core of hd7900 series. Looking at gpu-z, the card originally had as many as 1536 stream processors, Generally, the hd7870 of Pitcairn core has only 1280 stream processors. No wonder Dylan's graphics card has super computing power
for friends who hang up for a long time, performance is not the most important, and stability is the most important.
[1] make necessary preparations before mining
to start mining, we need to prepare graphics card, bitcoin wallet, mining software, etc. Because the GPU has considerable computing power, the graphics card is a good "mining" equipment
[2] start mining and choose a good ore pool
to start mining, there must be a mine pool with convenient operation and stable output. Its function is to subdivide the data packets for each terminal, and pay the corresponding amount of bitcoin according to the proportion of the data packets calculated by the terminal through precise algorithm. The btcguild ore pool abroad is recommended here, although there are many ore pools in China now, because there is no specific research and no evaluation. However, I would like to remind you that the output and income gap of each mine pool must be compared when selecting
take btcguild mine as an example to teach you the specific process of registration: register mine account - mine account setting - miner account setting - Download bitcoin miner - configuration of bitcoin miner - mining has started - log in btcguild to view bitcoin
the bitcoin g up at this time is stored in the website where the bitcoin is g up. It can't be traded or converted into paper money for the time being. What we need to do is to register an account on a trading platform. The bitcoin g up by the graphics card is imported from the website of foreigners to bitcoin China website. Only in this way can the bitcoin be handled freely, and it can be exchanged for RMB when it is sold or appreciated.
first of all, your computer should be installed with the latest version of bitcoin client. After opening the client, all the transaction information data on the network will be automatically downloaded to the local. Depending on the network speed, this process may take several hours. At this time, the account balance is 0. Users can ask friends to send some coins, but a more feasible way is to do mining or merchant acquisition
mining as a miner
to be a miner is to proce bitcoin with one's own computer. In the early days, there was the option of mining in the client, but now it has been cancelled. The reason is very simple. With more and more people participating in mining, it may take several years for one person to dig for 50 coins, so now miners generally organize into miners' Guild, Let's dig together. Specific mining methods, you can go online search
buy as a businessman
as a businessman, you can use money to buy coins g up by miners, set up an online shop to sell things and collect bitcoin, and even go to the exchange to speculate in coins. Now there are many websites providing bitcoin exchange services, which can be converted into almost any kind of currency. If you really don't know how to exchange, you can also come to laoan for help
the difficulty of bitcoin mining is directly proportional to the amount of money that has been mined. The more difficult it is to mine, the more difficult it will be. After 20 million bitcoins are mined out in 2030, the remaining 1 million bitcoins will probably take decades to be mined out. And bitcoin has no central issuing authority, which is generated by network nodes through complex calculations. Anyone can run bitcoin software on a computer to make it. During circulation, enter the quantity 1 on the client software, then come to the other party's bitcoin address and sign with the payer's password. After that, the bitcoin is the other party's
jr123 Internet Financial navigation network includes bitcoin principle explanation, mining tutorial, domestic and foreign information and other related websites. The home page also has bitcoin price real-time update, and you just want to know what to look at
warm tips:
1. According to the notice and announcement issued by the people's Bank of China and other departments, virtual currency is not issued by monetary authorities, does not have monetary attributes such as legal compensation and compulsion, is not a real currency, does not have the same legal status as currency, and cannot and should not be used as currency in the market, Citizens' investment and transaction of virtual currency are not protected by law
2. Before investing, it is recommended that you first understand the risks existing in the project, and clearly understand the investors, investment institutions, chain activity and other information of the project, rather than blindly investing or mistakenly entering the capital market
3. The above explanation is for reference only. Investors should not use such information to replace their independent judgment or make decisions only based on such information, which does not constitute any investment operation
response time: February 5, 2021. Please refer to the official website of Ping An Bank for the latest business changes
[Ping An Bank I know] want to know more? Come and see "Ping An Bank I know" ~
https://b.pingan.com.cn/paim/iknow/index.html
Novice first of all to know how to calculate your cost, recharge, trading, cash, there are fees. At least you can understand the K-line. There are a lot of people on the K-line. You can look at it casually and understand it. You need to be risk aware. Bitcoin is a high-risk and high profit investment. It may double overnight, or BMW may become a bicycle overnight. At the beginning, we suggest a small amount of investment
but it's hard to get bitcoin for indivial mining, so it's basically large-scale mining, and you need to cooperate with the mine pool. So if you still want to make money by mining, at present, the most suitable mining method is cloud mining or mining machine hosting. After all, the era of single person mining is over
As we approach the end of the year, when we plan to sprint for the goal of the end of the year, earn more bonus and prepare to release ourselves in the Spring Festival, don't forget that the fraudsters also have such a plan. At this time, the tide of shopping on double 12 and new year's day comes one after another, and people working outside are also busy booking tickets and air tickets for the Spring Festival, which provides opportunities for fraudsters. Here, liewang, the first online fraud information reporting platform linked by the police and the people in China, makes an inventory of the new trends of online fraud in 2017. Can you see through all these scams
trend 1: mobile payment has become the mainstream, beware of two-dimensional code trap
mobile payment has greatly facilitated people's life and made people travel easily. However, there are many criminals who use the way of scanning two-dimensional code to carry out fraud, which is impossible to prevent. For example, on bike sharing, a fake QR code is used to cover the regular QR code, and the avatar is set as the official icon of bike sharing to cheat users to pay or recharge; Next to the store's two-dimensional code, there are words full of temptation, such as "scan code to grab red packets", "scan code discount", etc., to lure users to scan the code, and then obtain user information or directly guide users to transfer money. There are even criminals who the illegal parking notice posted on the car by traffic police. The fake ticket is attached with a payment QR code to lure the car owner to scan the code to pay a "fine"
trend 2: fake businesses want to refund. Users should be careful of being" loaned online "
generally, people think that their bank card balance is small, even if they encounter swindlers, it doesn't matter. However, according to the report cases received by liewang platform, In the common refund fraud in 2017, fraudsters use mobile phones to receive SMS verification code to lure victims into Internet micro loan business, and finally transfer the loan to the swindler's account. This kind of fraud often involves a high amount of money and brings serious property losses to users
trend 3: mobile phones also contain extortion virus, and the payment method is more" people-friendly "
mobile phone extortion software has become a common tool for criminals to seek benefits e to its low proction cost and fast cash flow. At present, there are different forms of blackmail software in the mobile application market. Different from the blackmail software in the computer, bitcoin is needed to pay for it. The payment form in the mobile blackmail software is more "people-friendly"
a batch of blackmail software captured in 2017 attached wechat two-dimensional code information to the blackmail interface, and prompted the winner to directly scan the two-dimensional code for payment by wechat, which will automatically unlock after successful payment, and the user will automatically enter the transfer interface after scanning the code. However, through technical analysis, this kind of blackmail software does not have any code related to wechat transfer. The so-called "scan payment, automatically unlock" is actually a fraud, even if the user transfers, it will not automatically unlock
trend 4: fake customer service requests to provide payment code and swipe only by numbers
because code scanning payment is simple and convenient, in 2016, many fraudsters took a screenshot of the two-dimensional code to swipe. But in 2017, as payment companies added anti fraud tips or confidentiality settings in the process of payment QR code screenshots, swindlers immediately thought of countermeasures and swindled the numbers under the payment code, forming a new instrial chain
criminals often disguise themselves as merchants customer service, requiring users to provide figures such as Alipay, WeChat and other payment bar codes, and then, on the grounds of digital failure, require users to refresh the numbers and send them several times to achieve the purpose of stealing. p>
trend 5: download the specified software, but the account password is shared by cloud disk
users' privacy information can be stolen without using phishing websites and Trojan horse software. This year, swindlers have come up with new tricks: as long as the victims' trust is obtained, they can download cloud disk, synchronization software and other procts, log in to the account designated by the swindler to upload files and synchronize, and then they can easily get information. What's more, if the user synchronizes the SMS verification code at any time, the swindler can easily steal the funds in the bank card
fraudsters often disguise themselves as e-commerce, suppliers and other customer services, requiring users to download some cloud disk synchronization software, and then provide the specified account password for users to log in. At this time, if the user logs in and synchronizes the personal account, password and other information on the software according to the swindler's instructions, the funds on the account will be transferred quietly
trend 6: new phishing websites on mobile terminals are more covert and easy to be recruited
as security manufacturers increase their efforts to crack down on phishing websites, phishing website makers also strengthen their covert means, spread links by using proct sharing functions such as short URL, cloud disk service, browser and social tools, and finally jump through the URL, Guide users to phishing sites to launch online fraud
trend 7: indemnity should be paid in intimate way. Be careful with this kind of fraud SMS
as early as 2013, 360 company discovered a high-risk fraud binding the victim's online banking account. In recent years, with the use of mobile payment becoming more and more popular, In 2017, there was a similar kind of fraud, which used a payment platform to bind accounts and swipe victims' accounts
in May 2017, Mr. Di received a flight delay text message sent in the name of the airline, with flight information and customer service phone number attached in the text message, and said that Mr. Di could get 300 yuan of delay compensation. Fake customer service in the phone to guide Mr. Di refund operation, and provide the enterprise account, but also ask Mr. Di to open intimate payment function. However, after Mr. Di opened, he found that he had two dections, and realized that Mr. Di was cheated and immediately called the police
trend 8: investment in the circle of friends? Do not gambler psychology
in everyone's wechat group or circle of friends, there are often many activities or proct recommendations under the banner of discount. Not long ago, Mr. Wang saw a WeChat official account named "double half price win" in WeChat group chat. Mr. Wang then identified the official account as having an enterprise certification and believed that the platform had high credibility. p>
Mr. Wang invested a small amount in the early stage, and found that there was a certain income every day, so he subsequently invested in batches, but graally began to lose money“ He wants to invest more in order to earn back the capital. As a result, when contacting customer service again, he found that the other party had blackmailed him. Only then did he realize that he had been cheated and that the money he had invested had gone to nothing
trend 9: identity impersonation has a new pattern, be careful that "friends" are high imitations
in the past, online fraud of identity impersonation often occurred on QQ, wechat and other social platforms, but this year, swindlers shifted their focus to microblog. The swindler specially studies the social habits of the victims, such as the relationship between microblog staff and chat content, and then changes their avatars and nicknames to create high imitation numbers. Because most of the fake users are abroad, it is difficult for their microblog friends to distinguish the true from the false in time
trend 10: the combination of various means makes it impossible to prevent the" ghost "fraud.
in March 2017, 360 assisted the Shenzhen police in successfully cracking down the" midnight ghost "Telecom fraud Gang, which the police identified as an illegal trade instry chain relying on personal information, It is a high-tech, high intelligence, cross platform, remote-control new type of telecom network fraud crime that combines mobile cloud service, operator's deputy number service and Internet financial service. And this kind of stealing brush mainly uses different services of various platform service providers. A single service does not have the security risk of stealing brush, but it is combined to form stealing brush. In order to make it difficult for the victims to detect, the criminals choose to commit crimes late at night. The whole process does not need to have any contact with the victims, and the victims do not need to reply to any SMS, so prevention is very difficult
from the above ten cases, the current situation of network fraud is still not optimistic. The anti fraud experts of liewang platform hereby remind the netizens that the new year is approaching, the fraudsters are highly active, and all kinds of fraud means emerge in endlessly. At this time, we need to improve the anti fraud awareness, so that the fraudsters have no chance to take advantage of it
net hunting platform is jointly launched by Beijing Public Security Bureau and 360. It is an innovative platform to crack down on Internet fraud through Internet platform and Internet technology. Up to now, liewang platform has established contact with public security organs in more than 300 regions of the country, helped to detect more than 100 major Internet fraud cases, involving 170 million yuan, and knocked down more than 10 large-scale fraud gangs with strict organization and clear division of labor. Internet users can report malicious programs, malicious web addresses, fraulent phone calls, etc. to 360 Internet security center through the platform. Every piece of information reported by Internet users will be included in the big data of liewang platform, providing effective clues for the police to solve cases
scan first, wait for the end of scanning, and then kill the virus according to the prompt. It adopts cloud detection and killing technology, which can thoroughly kill the virus through Intelligent Cloud Identification, so as to protect your mobile phone from now on; thank you
Users can buy bitcoin, and at the same time, they can use computers to do a lot of calculations according to the algorithm to "mine" bitcoin. When users "mine" bitcoin, they need to use the computer to search for 64 bit numbers, and then compete with other gold miners by repeatedly solving puzzles to provide the required numbers for the bitcoin network. If the user's computer successfully creates a set of numbers, then they will get 25 bitcoins
e to the decentralized programming adopted by the bitcoin system, only 25 bitcoins can be obtained every 10 minutes, and by 2140, the maximum number of bitcoins in circulation will reach 21 million. In other words, bitcoin system is able to achieve self-sufficiency, resist inflation through coding, and prevent others from destroying these codes
extended materials
many websites for technology players have begun to accept bitcoin transactions. For example, websites like hotcoin, coin an and okex, as well as some Taobao stores, can even accept services such as bitcoin exchange for us dollars and euro. There is no doubt that bitcoin has become a real currency in circulation, rather than a virtual currency like Tencent Q coin
you can use money to buy bitcoin, or you can be a miner to "mine" them, and use computers to search for 64 bit numbers. By repeatedly decrypting with a computer, it competes with other gold miners to provide the number needed for the bitcoin network. If the computer can successfully create a set of numbers, it will get 12.5 bitcoins
source: Internet bitcoin