BTC positioning software
public key system: corresponds to a public key and a private key, keeps the private key in the application and publishes the public key. When Party A transmits information to Party B, it can use Party A's private key to encrypt the information, and Party B can use Party A's public key to decrypt the information, so as to ensure that the third party cannot impersonate Party A to send the information; At the same time, when Party A transmits information to Party B, it is encrypted with Party B's public key and sent to Party B, and then Party B decrypts it with his own private key, so as to ensure that the third party cannot eavesdrop on the communication between the two people. RSA is the most common public key system, but the lliptic curve digital signature algorithm is used in bitcoin protocol. What's the difference between cash and bank account? Bitcoin is an electronic currency in BTC. In this article, it is also used to refer to the whole bitcoin system. Like opening an account in a bank, the corresponding concept in bitcoin is address. Everyone can have one or more bitcoin addresses, which are used to pay and collect money. Each address is a string that starts with 1. For example, I have two bitcoin accounts, and. A bitcoin account is uniquely determined by a pair of public key and private key. To save the account, you only need to save the private key file. Unlike bank accounts, banks keep all transaction records and maintain the book balance of each account, while bitcoin's transaction records are jointly maintained by the whole P2P network through a pre agreed protocol. How much money is in my account address? Although the current account balance can be seen by bitcoin software, unlike banks, there is no place to maintain the book balance of each address. It can only calculate the account balance in real time through all historical transactions. How do I pay? When I pay from address a to address B of the other party, the payment amount is e. at this time, both parties will announce the transaction information to each network node, telling address a to pay to address B, and the payment amount is e. In order to prevent the third party from forging the transaction information, the transaction information will be encrypted with the private key of address A. at this time, the network node receiving the transaction information can use the public key of address a to verify that the transaction information is indeed sent by address a. Of course, trading software will help us do these things, we just need to input the relevant parameters in the software. What will the network node do after receiving the transaction information? This is the most important part of the bitcoin system, which needs to be elaborated. For the sake of simplicity, only bitcoin protocol has been implemented. In the current version, each network node will save all transaction information synchronously. There are two kinds of transaction information in history, one is & quot; Verified & quot; The transaction information, that is, the verified transaction information, is stored in a series of "blocks". Each & quot; block" Is the previous & quot; bock" The ID of each block is the hash code of the hash code of the block and the new transaction information (see an actual block). The other category refers to those who also & quot; Unverified & quot; The transaction information just paid above belongs to this category. When a network node receives new unverified transaction information (possibly more than one), it can calculate the book balance of each address at that time because the node keeps all the transaction information in history, so it can calculate whether the transaction information is valid, that is, whether there is enough balance in the payment account. After eliminating the invalid transaction information, it first takes out the last & quot; block" Then, the unverified transaction information is combined with the ID, and a verification code is added to form a new "block". It needs a lot of calculation to build a new block, because it needs to calculate the verification code, so that the above combination becomes a block, that is, the first several bits of the hash code of the block are 1. At present, the first 13 bits need to be 1 (generally, the specific method is uncertain), which means that if the block is generated by enumeration method, the average number of enumerations is 16 ^ 13. Using CPU resources to generate a block is called "gold mining", because the proction of the block will get a certain reward, and the reward information has been included in the block. When a network node generates a new block, it will broadcast to other network nodes. However, this network block may not be accepted by the network, because it is possible that other network nodes have proced the block earlier. Only the earliest block or the block with the largest number of subsequent blocks is valid, and the remaining blocks are no longer used as the initial blocks of the next block. How does the other party confirm that the payment is successful? When the payment information is distributed to the network node, the network node begins to calculate whether the transaction is valid (that is, whether the account balance is enough to pay), and attempts to generate blocks containing the transaction information. When six blocks (one direct block and five subsequent blocks) contain the transaction information, the transaction information is considered "verified", so that the transaction is formally confirmed, and the other party can confirm the successful payment. A possible problem is that I will pay the balance of address a to address B, and at the same time pay to address C. If I only verify that the single comparison transaction is valid. At this point, my way of cheating is to generate six blocks including B to B and six blocks including C to C before the truth is revealed. Because I need a very long CPU time to generate a block, compared with the whole network, the probability of my cheating success is very small. What is the motivation of network nodes to proce blocks? As can be seen from the above description, in order to make the transaction information effective, the network node needs to generate 1 and 5 subsequent blocks to contain the transaction information, and such block generation is very CPU intensive. How to let other network nodes help to proce blocks as soon as possible? The answer is very simple. The agreement stipulates that BTC will be rewarded for the address where the block is proced, as well as the Commission promised by both parties. At present, the reward for procing a block is 50btc, which will be halved every four years in the future. For example, the reward will be 25btc from 2013 to 2016. Is the transaction anonymous? Yes, and No. All bitcoin transactions are visible. We can check all transaction records of each account, such as mine. But what's different from the banking monetary system is that everyone's account itself is anonymous, and everyone can open many accounts. In general, anonymity is not as good as it claims. But bitcoin has another advantage in doing black market trading: it can't be frozen. Even if the police trace a bitcoin address, there is nothing they can do unless they trace the computer used by the exchange based on the Internet address. How to ensure that bitcoin does not depreciate? Generally speaking, in the case of equivalent trading activities, the value of money is inversely proportional to the amount of money issued. Unlike the traditional money market, the central bank can determine the amount of money issued. Bitcoin does not have a central issuing institution. Only by procing blocks can we get a certain amount of BTC currency. Therefore, bitcoin's new amount of money depends on: 1. The speed of procing blocks: bitcoin's agreement stipulates that the difficulty of procing blocks is fixed at an average of 2016 every two weeks, about 10 minutes. Moore's law of doubling CPU speed every 18 months will not speed up the proction of block. 2. The number of rewards for block proction: at present, 50 BTC is awarded for each block proced, which is halved every four years. In 2013, 25 BTC is awarded, and in 2017, 12.5 BTC is awarded. Considering the above two factors, bitcoin's currency issuing speed is not controlled by any single node in the network. Its protocol makes the currency stock known in advance, and the maximum stock is only 21 million BTC
the first point of investment is capital security, and bitcoin does not have the nature of basic currency. It is a kind of network currency. People recognize that it is valuable, and it is not worth money if they do not recognize it. Public opinion orientation and Zhuang become the key to its disk. Compared with other currencies (such as Euro), countries that do not issue it are uncontrollable, and security is even worse
- - - - - - - - - - - - - - - - - - - - - -
in China, the regulations on the administration of RMB prohibit the proction and sale of token tickets. Because there is no clear judicial interpretation of the definition of token ticket, if bitcoin is included in the "token ticket", the legal prospect of bitcoin in China will face uncertainty
- - - - - - - - - - - - - - - - - - - - - - - - -
the second point is profit calculation. Now 4970 is bought, where do you want to sell? Why is this bitcoin rising? For example, recing QE in the United States (generally speaking, recing the number of US dollars) will increase the value of the US dollar. What are the influencing factors of bitcoin, the normal fluctuation range of exchange rate, and the fluctuation of bitcoin
the third point is not to follow suit. In April last year, China's Auntie made a bottom bargain. According to news reports, Auntie beat Wall Street, and the bottom bargain price was $1500 / oz, while the current price is $1260 / oz. All people go to buy gold. Gold will soar in the short term, but then it will fall sharply. This is the same thing as buying vegetables. Can the whole village go to buy cabbage? More people raise pigs, can pork sell at a good price? The main thing is to look at it. People in the bitcoin world know how to make money. If you do it, you will lose money. If you don't believe it, you will throw tens of thousands. Look back in a year
I suggest the spot, because 40000 yuan can't reach the threshold of futures. As for foreign exchange, it is also affected by the change of the exchange rate between the US dollar and RMB. Spot silver and gold can make money both up and down, and it can be done with a computer and a network cable. The capital is safe, and nothing is reliable when it doesn't fall. If you have the intention of spot silver investment, you can contact me and give me a discount.
1. Q coin
Q coin, referred to as QB, also known as QQ coin, Tencent Q coin, etc. Usually its exchange rate is 1q currency = 1 RMB, with Tencent paipai net transactions are generally 10% off
QB is a virtual currency launched by Tencent, which can be used to pay for QQ bank number, QQ member service and other services. Tencent q-coin, through the purchase of QQ card, telephone recharge, bank card recharge, network recharge, mobile phone recharge card, one card recharge card and other ways to obtain
The face value of QQ card is 10 yuan, 15 yuan, 30 yuan, 60 yuan, 100 yuan and 200 yuan respectivelythere is another kind of electronic cryptocurrency, qqcoin, which is not related to each other
2. Litecoin
litecoin, abbreviated as LTC, currency symbol: Ł; It is a kind of network currency based on "peer-to-peer" technology. It is also an open source software project under MIT / X11 license. It can help users make instant payments to anyone in the world
lightcoin is inspired by bitcoin (BTC) and has the same implementation principle in technology. The creation and transfer of lightcoin is based on an open source encryption protocol and is not managed by any central organization
3, infinite coin
infinite coin (hereinafter referred to as IFC) is a new digital currency, which has more circulation advantages than bitcoin, and fills the short board of bitcoin in the field of commercial circulation and promoting commercial operation. The positioning of unlimited money is to serve the daily life of small transaction payment
one transaction of infinite coin needs three confirmations, each confirmation takes three seconds, and the transaction confirmation speed is very fast. Because bitcoin transaction needs 6 confirmations, which takes about 1 hour, and lightcoin transaction takes 15 minutes, infinite coin is used in daily common transactions, which is more practical
infinite coin was released on June 5, 2013. Based on scrypt POW algorithm. A block is generated in 30 seconds. In the initial block, there are 524288 infinite coins in each block. After that, for every 86400 blocks generated, the number of coins in the block is halved, with a total of 90.6 billion. The difficulty of mining is adjusted every hour
Quark coin is not the currency in real life, it exists safely in the computer of global networkquark network is protected by six most advanced encryption algorithms to ensure that it can become a digital ledger. The whole network uses each of the six functions to generate a proof of work, and the coin maker must "verify" these transactions to ensure that each coin increase is real and effective
only regular computer can participate in ensuring that it can maintain a highly secure peer-to-peer network, which makes it more decentralized
quark coins can only be g up through the CPU of regular computers. In the first 36 weeks, a total of 247605120 quark coins will be g out. Since March 30, 2014, the annual quark coins set at 1050000 can enter the market through "digging", and the block reward will never be less than one, which is currently two
Zetacoin is an open-source digital currency based on SHA-256 algorithm. The initial coin mining is 160 million coins, and the subsequent annual inflation is a better incentive, To keep the hash of the network is not pure transaction cost The total number ofzetacoin is 160 million, 1000 zets per block and half of 80640 zets per block
win10 platform is relatively simple, because Microsoft has released relevant patches for this virus vulnerability in early March, so as long as your win10 has been automatically updated and upgraded to the latest version (version number is higher than 1511), you can successfully resist wannacrypt virus
operation steps:
1. "Settings" → "update and security" → "Windows Update", check that this item is on
2. Click the Cortana search box in the taskbar, enter "winver" and confirm that the version number is higher than 1511<
win10 users directly upgrade the latest version
II. Win7, win8.1, WINXP processing flow
for non win10 platform computers, because most of them have exceeded the service period, or e to various reasons, they have not opened the update and received the security patch, which is the hardest hit area of this attack. The solution is to download ms17-010 patch manually. At present, Microsoft has urgently released ms17-010 patch for different platforms, and the direct link address is as follows:
Windows XP (kb4012598)
32 bits:
http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-chs_. Exe
64 bit:
http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsserver2003-kb4012598-x64-custom-enu_. Exe
Windows 7 (kb4012212, kb4012215)
32-bit:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x86_. msu KB4012212
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows6.1-kb4012215-x86_. MSU (kb4012215)
64 bits:
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/02/windows6.1-kb4012212-x64_. msu KB4012212
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/03/windows6.1-kb4012215-x64_. MSU (kb4012215)
windows 8.1 (kb4012213, kb4012216)
32-bit:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/02/windows8.1-kb4012213-x86_. msu KB4012213
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/03/windows8.1-kb4012216-x86_. MSU (kb4012216)
64 bits:
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/02/windows8.1-kb4012213-x64_. msu KB4012213
http://download.windowsupdate.com/d/msdownload/update/software/secu/2017/03/windows8.1-kb4012216-x64_. MSU (kb4012216)
for other platforms or server versions, please go to https://technet.microsoft.com/zh-cn/library/security/MS17-010 Download the corresponding patch file
to search your own windows platform, you need to pay attention to the number of version bits (such as 32-bit / 64 bit)
confirm the platform version number again, click the download button of the corresponding version
click the link to download the patch of this platform directly. It should be noted that indivial platforms (such as win7) will contain two patches, Please download and install in order
3. Temporary disposal method
if it is not convenient for the computer to install the patch, or if you don't have a downloaded patch file on hand, you can consider the following temporary disposal method. The temporary disposal method is to shut down the corresponding port number of the system for immunization, which is effective for the current version of the virus, but it does not rule out the possibility of breaking the virus after it has a variant, The specific methods are as follows:
1. Download the 360 NSA immunization tool
NSA Arsenal immunization tool
software version: XP version
software size: 125.34mb
software license: free
applicable platform: WinXP Vista win8 win7
download address: http://dl.pconline.com.cn/download/996906.html
download the NSA immunization tool released by 360 company immediately, It has the characteristics of time-saving, labor-saving and low operation difficulty. The whole toolkit is 125mb. Double click to decompress automatically. Later, you will enter a main interface and operate according to the screen prompts. When the interface is green, it means the system is safe
NSA immune tool released by 360 company
2. Manually close windows 445, 135, 137, 138, 139 ports
in addition to the existing tools, you can also manually close 445, 135, 137, 138, 139 ports to resist virus attacks. The specific operation steps are as follows:
2.1 close ports 135, 137 and 138
1. Run and input "dcomcnfg"
2. On the right side of the computer option, right-click My Computer and select properties
3. In the default properties tab of my computer properties dialog box, remove the check box before enable Distributed COM on this computer
4. Select the default protocol tab, select connection oriented TCP / IP, and click delete
5. Right click on the network neighborhood to select properties, right click the network tab, and remove the check boxes of Microsoft network file and printer sharing and Microsoft network client to close ports 135, 137, 138 of the sharing end
manually close port
2.2 close port 139
open "network and dial up connection" → "local connection", select "Internet Protocol (TCP / IP)" attribute, enter "advanced TCP / IP settings" → "wins settings", there is a "disable TCP / IP NetBIOS", check to close port 139
2.3 close port 445
"start" → "run", enter "regedit", confirm and locate to "HKEY"_ LOCAL_ MACHINE\ SYSTEM\ CurrentControlSet\ Servi ces\ NetBT\ Parameters ", create a new DWORD value named" smbdeviceenabled "and set it to 0, then port 445 can be closed
note: after manually closing the port number, some intranet services (such as file and printer sharing) may fail. Please choose carefully
write at the end
wannacrypt is one of the most harmful viruses in recent years, second only to the shock wave of that year. The most important thing is that this virus will affect the hard disk data, and it is almost impossible to crack at present. The current method is that wannacrypt will automatically delete the original file before encryption, so some professional data recovery software can be used to try to recover. In short, keeping the system up-to-date is the best way to defend against viruses.
You can download a bitcoin wallet or register on a trading platform. Everyone's bitcoin address is unique. If you have an address, you can make a bitcoin transfer. Download bitcoin client or bitcoin wallet, you can also register your own bitcoin address. A bitcoin address is a string of 26 to 34 bits of letters and numbers, which looks a bit like garbled code
the bitcoin address is an indivial's bitcoin account, which is equivalent to your bank card number. Anyone can transfer bitcoin to you through your bitcoin address. The red box is the bitcoin address. Log in to my bitcoin bag and you can see the money
extended materials:
the concept of bitcoin was first proposed by Nakamoto in 2009. According to Nakamoto's idea, the open source software was designed and released, and the P2P network on it was constructed. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system
unlike most currencies, bitcoin does not rely on specific currency institutions. It is generated by a large number of calculations based on specific algorithms. Bitcoin economy uses the distributed database composed of many nodes in the whole P2P network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction. The design based on cryptography can make bitcoin only be transferred or paid by the real owner. This also ensures the anonymity of money ownership and circulation transactions. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity. The monetary system used to have no more than 10.5 million in four years, after which the total number will be permanently limited to 21 million
bitcoin can be cashed and converted into the currency of most countries. Users can use bitcoin to buy some virtual items, such as clothes, hats and equipment in online games. As long as someone accepts it, they can also use bitcoin to buy real-life items
reference: network bitcoin
however, you really regard mining as fun and entertainment. If you don't care much about whether you can dig, you can also let your own machine dig all the time. However, the machine configuration above you should not be low, but it is not suitable for mining, just as the swimming champion is not necessarily good at mountain climbing
generally speaking, mining machines mainly focus on graphics cards, which have little to do with processors, main memory boards and hard disks. Of course, they need to be stable and not crash for a long time. In fact, a card is more suitable for mining. In principle, you can go to the network. It is said that before the emergence of R-Series a card, the card with good mining effect was not hd88708750, But we despise the old graphics card that has been eliminated
Hello, you can download an opencl.dll file again, and then follow the steps as follows:
1. After decompression, the file directly to the system directory:
1. Windows 95 / 98 / me system, and it to the directory of C: (Windows) system
2. For Windows NT / 2000 system, it to the directory C: WinNT / system32
3. Copy the Windows XP / win7 / Vista system to the directory C: (Windows) system32
4. If your system is 64 bit, please the file to the directory C: Windows / syswow64; Start run enter Regsvr32 opencl.dll & quot;, Just press enter
has been uploaded and provided with download connection, which can be downloaded as needed
tips: if you can't enter the desktop, you can start the safe mode or use PE to start the computer, and then repair it
[important]: you must select a DLL that is consistent with the system version to download opencl.dll http://www.ghosys.com/downinfo/? 28235.1.30874.htm
opencl.dll can not be located, lost, not found, loading failure and other problems have been repaired
Uploaded, in the attachment
you must see the DLL installation textbook: http://www.ghosys.com/dll/jiaocai/? 28235.opencl.dll.1.26298.shtml