Position: Home page » Bitcoin » Bitcoin virus English news release

Bitcoin virus English news release

Publish: 2021-05-17 18:43:29
1.

Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money

so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening

a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...

hope to catch criminals as soon as possible and give them severe punishment by law

this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers

some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code

the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus

2.

The virus in the "bitcoin virus" incident is known as "ransomware". By encrypting the files in the victim's computer, you can't open them completely to ask for ransom. This is a virus attack launched by lawless elements by using "eternal blue" leaked from NSA hacker's weapon library. It does not need any operation of users. As long as it is turned on and connected to the Internet, lawless elements can implant blackmail software into computers and servers

What's more terrible is that this is just the beginning. Now this blackmail virus has spread to all over the world, including many colleges and universities in China. You can see many students on the Internet showing pictures of their computers being attacked. I have to say that hackers are really well intentioned, even in simplified Chinese

3. 1、 Prepare a U-disk or mobile hard disk. Before going to work on Monday, you can download 360 security guard [offline disaster relief version] under the safe network environment at home. 2. After arriving at the company, first unplug the network cable of the office computer, turn off the wireless network switch, and then turn on the computer. 3. Insert the prepared U-disk or mobile hard disk into the office computer, and install 360 security guard [offline disaster relief version]. 4 The NSA Arsenal immune tool of 360 security guard [offline disaster relief version] will run automatically, and detect whether there is a vulnerability in your computer. 5. Please wait patiently ring the process of repairing the vulnerability, which generally takes 3-5 minutes. After the repair is successful, you will be prompted by a pop-up window. Please [restart computer] so that the repair operation will take effect completely. 7、 After restarting the computer, you can run the NSA defense tool again through the desktop shortcut [blackmail virus relief] to ensure that your system has been repaired.
4.

Internet security once again because of a large-scale outbreak of computer viruses and caused everyone's attention: bit virus. The emergence of this virus will make the computer's documents locked, hackers to coerce ransom, and most of the places are important units. For example, Chinese universities and British hospitals. The data of these units are very important. Most of the time, the school is not only an ecational unit, many key universities also undertake a lot of scientific research tasks. From a certain point of view, it also shows that hackers are very selective and targeted

Of course, the explanation given by Microsoft said that the virus was an attack against the vulnerability supplemented in March. In a way, hackers are also a test of users' security awareness. Microsoft has added software to the vulnerability in March. From this point of view, the hacker's attack is not brilliant. Because it is through the official patch, and then imagine no patch defects, so as to attack. Hackers also know the update awareness and security awareness of users. Of course, as a domestic company, 360 also seized this opportunity to quickly adjust the security housekeeper to check and kill the virus

from this point of view, Microsoft's vulnerability supplement is targeted and prescient, and the possible vulnerabilities should be supplemented in time

from the user's point of view, this virus attack is different from the previous one. In the past, it is generally in the form of camouflage and loading to ince customers to take the initiative to download. And this time the virus is mostly spread through the LAN, as long as you boot, the virus will invade. The document cannot be opened normally

if this virus attack has any inspiration for us to use computers and pay attention to Internet security, I think it can be inspired from at least two aspects: the first is to strengthen the security of computer systems, such as using official patches to repair vulnerabilities in time; the other is to install regular anti-virus software, update it in time, and strengthen the firewall


5.

Hayek studied business cycle theory and monetary theory with his teacher Mises early in his academic career. In 1931, he published "price and proction". Because the proposition in the book is contrary to Keynes's "on money" published a year ago, they launched a debate

The most typical example of

is gold and silver. For a long time, gold and silver were the common currency in the world. The hard currency of trade in all countries did not belong to any one country. Even in the era of gold standard, the state issues legal paper money, but legal paper money is still anchored by the free competition of gold. Gold circulates freely in the world and is more rigid than paper money

There are at least three reasons that lead to the existence of a large number of competitive currencies:

one is the existence of multi-level market, because the metal currency is not easy to cut, super zero denomination currency and silver currency coexist

In the 18th and 19th centuries, there were long-standing high-ranking gold coins in Bangladesh, such as mulu, Sika rupee, middle akut rupee, and low ranking copper coins and BEIBI coins. Because silver coins are not easy to cut, a large number of shell coins with zero denomination are needed in remote areas and small exchange

this situation existed for a long time in ancient China, and the copper coin standard lasted for more than a thousand years in ancient China, but the iron coin also circulated for a long time (such as the Song Dynasty), and the face value of iron coin was smaller than that of copper coin. In the Qing Dynasty, with the discovery of Potosi silver mine in South America, a large number of silver coins flowed into China. Around 1730, the use of silver and money accounted for half of the transactions. Compared with copper coin, silver coin has a larger denomination, which is convenient for large transaction and solves the problem that copper coin is not easy to transport

The second is seasonal deflation, and private coins balance market demand

in the agricultural era, the transaction volume of agricultural procts accounted for a large proportion, and a large amount of money was used for agricultural procts transaction. However, agricultural procts have obvious seasonality, and the transportation and supply of metal money is extremely inconvenient, so the problem of insufficient money often appears in the harvest season. In his book, Professor Kuroda cites the example of Quanzhou, Fujian Province, China in 1606. The original inventory management money could not meet the rice trade, so the private money was imported to meet the market demand to balance supply and demand. This kind of situation happens every year in China. Every year, it is the peak of money demand near the Spring Festival. The central bank will release part of liquidity to balance supply and demand

Thirdly, metal currency is a kind of deflation currency, which circulates a variety of currencies in regional and specific areas

In his book, Professor Kuroda cites Nadina Jebel's case, "the transactions of grains such as rice are used for sonoto silver coins, the transactions of oils and fats are only used for French akote rupees or British akote rupees, and the transactions of flax are only used for French akote rupees."

At the beginning of the 20th century, in China, all kinds of silver coins were circulated in Jiujiang, Jiangxi Province. Mexican silver coins were used for the export of tea and porcelain procts in Shanghai, and silver coins issued locally in Jiangsu Province were used for the trade of local markets such as tobacco or beans. There are also silver bills used in Shanxi business circle, and various copper coins used in the coin community around the China Sea, including Japan, North Korea, Southeast Asia and other countries

the problems of metal currency in multi-level market, seasonal deflation, regionality and specific fields do not exist in today's credit currency era. Many of the competitive currencies listed by Professor Kuroda also disappeared in the globalization of silver coins and the legal tender system

therefore, the monetary pattern of countries in the world we see today is one country one currency, which is legally issued by the state monopoly

Zhiben society is a hard core learning society that listens to hard lessons, reads hard books and reads hard texts. Wechat search "benshe" (ID: benshe0-1) to learn more in-depth content

6. Bitcoin virus
病毒
[词典] [医] virus; inframicrobe 滤过性; [电影] Wirus;
[例句]
In the effort to understand AIDS, attention is moving from the virus to the immune system.
7.

Around 20:00 on May 12, 2017, bitcoin blackmail computer virus broke out in the world, which is a global blackmail software infection event


5.360 security guard has provided "NSA Arsenal immunization tool", which can be downloaded and installed

8. According to the report from the Internet news, experts say that once they win the recruitment, there is no solution at present.
ZHENG Wenbin said that there has been a worm virus spreading through port 445 in China, so some operators have blocked port 445 for indivial users. However, because the ecation network does not have this restriction, the campus network has become a "disaster area" attacked by blackmail virus
ZHENG Wenbin said that for computer users infected with blackmail virus whose files are encrypted, if they want to get the files back, at present, they can only pay bitcoin, and there is no other better way. But even if they pay bitcoin according to the requirements of criminals, there is no guarantee that they can get the encrypted files back. "We are also trying to find a way, Try to see if you can decrypt the encrypted file, but there is no other way
according to Zheng Wenbin, according to their monitoring, at present, in addition to the ecation network and campus network of some domestic colleges and universities, enterprises have also been affected by viruses, and some civil facilities, such as the computer systems of gas stations, have also been attacked by viruses.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750