BTC in May
bitcoin is just like the currency in the game, but no one releases bitcoin. Instead, it relies on a specific algorithm to generate , so now people looking for bitcoin also call themselves miners, but they rely on computers to mine
the rise of bitcoin is e to the restructuring of global risk assets , and the widening of investment channels for encrypted assets . Since the beginning of this year, the volatility of securities and foreign exchange markets has intensified, and global investors are looking for safe assets. Traditional safe asset gold is more dependent on the real economy and inflation expectations, Bitcoin is more like a sensitive index, gaining a certain asset hedging advantage
in this global computer virus incident, mobile China also received a blackmail. Fortunately, the machine that received the email was a testing machine, which did not affect us. However, it's different for college students in the graation season. The thesis is locked, which is related to graation. So in the face of this outbreak of blackmail virus, how should we deal with it and what protective measures should we take<
first of all, let's understand the characteristics of this virus
the computer virus initiated by hackers will encrypt a large number of files on the system into files with. Onion suffix. After poisoning, they are required to pay bitcoin ransom to decrypt and recover the files, causing serious losses to personal data, and anti-virus software cannot decrypt these encrypted files. But we must not listen to the hacker's so-called "give money to decrypt" saying, because hackers do not necessarily keep their promises, in addition, bitcoin is expensive, and it is also a large number for ordinary users< Secondly, we need to pay attention to the background of the virus outbreak.
according to the domestic experts, according to the network security agencies, this is a virus attack event launched by lawless elements using the "eternal blue" leaked from NSA hacker's weapon library“ "Eternal blue" will scan windows machines with open 445 file sharing port, without any user operation. As long as the machine is turned on and connected to the Internet, criminals can plant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
e to the previous outbreak of worms using port 445 in China, operators have blocked port 445 for indivial users, but the ecation network has no such restriction, and there are still a large number of machines exposing port 445. According to the statistics of relevant institutions, at present, more than 5000 machines in China are attacked by NSA "eternal blue" hacker weapons every day, and the ecation network is the hardest hit area
What are the coping methods
1. Close port 445, and you can search and query by yourself
2. At present, Microsoft has released a patch ms17-010 to fix the system vulnerability of "eternal blue" attack. You can install this patch for your computer as soon as possible
as for XP, 2003 and other Microsoft machines that no longer provide security updates, microblog professionals recommend using "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being attacked by blackmail software and other viruses
If I'm not careful, the anti-virus software itself will bring a lot of rogue software tail binding.
it is suggested that the landlord download and install Tencent computer housekeeper to carry out anti-virus. This software is free and easy to use. I always use it,
it has passed three anti-virus tests of global authoritative evaluation organizations, creating the best result of killing software in China
it can open Tencent computer manager -- antivirus -- full scan -- to complete
in addition, the computer clinic of computer manager can usually solve these common problems with one click, without worry
the global blackmail virus is spread through port 445 by taking advantage of the vulnerability of windows system
in other words, if you are a Windows system that has not been patched and has port 445 turned on, you have a very high risk of being infected as long as you are connected to the Internet
1. If you are a MAC system, a Linux system or an updated win10 system (win10 has been patched for this vulnerability as early as March this year), don't worry that you won't win
2. If you are a different system, but your home computer is closed and port 445 is updated, don't worry that you won't win
3. If you are a different system and have not closed port 445 yet, you have a good chance to be in trouble
let's see what's going on with you<
once you've got the solution:
format the hard disk, then [disconnect] reload the system, install software and patch it
or... Replace it with a new hard disk...
Open Tencent computer Housekeeper - virus detection and killing
One of the most special currencies is undoubtedly bitcoin. The biggest characteristic of bitcoin is that the quantity is limited! Moreover, bitcoin supporters believe that one of the advantages of bitcoin is that the number of bitcoins is fixed{ RRRRR}
although bitcoin is limited, there is no need to worry about the problem of insufficient use, because bitcoin, as an electronic currency, is too easy to be divided. For example, in our real life, 10 yuan banknotes can be changed into 10 pieces of 1 yuan banknotes, and 1 yuan banknotes can be changed into 10 pieces of 1 jiao banknotes. Limited by the real currency, it's hard for you to find 1 Fen banknotes now, let alone tear 1 Fen banknotes into 10 pieces. But bitcoin is different. In the current data structure of bitcoin, the smallest unit is 0.00000001 bitcoin, that is & lt; 1 Cong & quot;, On top of that, there are micro bits (0.000001 bitcoin). If necessary in the future, bitcoin can also consider smaller partition units. Money can be divided into small pieces, which means it's easier to circulate, so bitcoin is limited and no problem