Insta virtual currency
Publish: 2021-03-25 15:47:46
1. bitcoin is a virtual currency, the world's general cryptocurrency. Just like sending and receiving e-mail, the remitter pays bitcoin directly to the other party through a computer or smart phone according to the recipient's address. But it's going to close soon. Bitcoin is a decentralized and open source digital currency, which will eventually reach a fixed unit of quantity: 21 million, which will not be reached before 2140. The current rate of money proction is 25 new bitcoins per 10 minutes, and the number will slowly decline. It will be halved in 2017, and then it will be halved every four years until it reaches the upper limit. Now who are the people who get those bitcoins that are proced every 10 minutes? It's a technical process, which is essentially to solve difficult mathematical problems, and hard systematic work will be rewarded. In short, mining is a process of running a program, which helps to verify transactions on the network. Unlike other transactions, it is completed by solving difficult mathematical problems. This special process also leads to its becoming a kind of free currency. Every few minutes, a new bitcoin finds a miner, so that they can protect themselves. Now mining is becoming more and more difficult. Under the leverage of market economy principle, their prices will be higher and higher. If the utilization rate is higher and higher, the prices will be higher. Using bitcoin, you can buy goods and services, convert them into real currency at any time according to the bitcoin exchange rate at that time, and sell bitcoin to other users. If you want to join the mining team, the early hardware and power costs are inevitable, so you can try various hardware settings and calculate its mining efficiency. Risk the price fluctuation of bitcoin is its biggest risk, because the whole market value has reached 1 billion US dollars, many people are eyeing this market. Last month, the value of a bitcoin rose from $30 to a peak of $75; But in 2011, the exchange rate of US dollar to bitcoin fell from US $33 to US $2.51, and it took a long time to recover. Now its transaction value is 125 dollars, so it is very valuable. Instawallet was closed as a bitcoin hosted wallet on Thursday because of the attack, and it indicates that 90 days later, if no one else claims to have received the same URL, users under 50 bitcoins will recover 50 bitcoins. For indivials, if you pay attention to privacy, want to trade a small amount of money without government regulation, and have a wallet that can be entrusted with the custody of bitcoin, you can have a try. There is still a long way to go before it can replace the existing currency. The infrastructure under it needs to be well constructed to be generally accepted. If you want to buy one or two in the near future, it is absolutely no problem.
2. I know that. It has many functions
3. Bitcoin is a virtual currency, the world's general cryptocurrency. Just like sending and receiving e-mail, the remitter pays bitcoin directly to the other party through a computer or smart phone according to the recipient's address. But it's going to close soon. Bitcoin is a decentralized and open source digital currency, which will eventually reach a fixed unit of quantity: 21 million, which will not be reached before 2140. The current rate of money proction is 25 new bitcoins per 10 minutes, and the number will slowly decline. It will be halved in 2017, and then it will be halved every four years until it reaches the upper limit. Now who are the people who get those bitcoins that are proced every 10 minutes? It's a technical process, which is essentially to solve difficult mathematical problems, and hard systematic work will be rewarded. In short, mining is a process of running a program, which helps to verify transactions on the network. Unlike other transactions, it is completed by solving difficult mathematical problems. This special process also leads to its becoming a kind of free currency. Every few minutes, a new bitcoin finds a miner, so that they can protect themselves. Now mining is becoming more and more difficult. Under the leverage of market economy principle, their prices will be higher and higher. If the utilization rate is higher and higher, the prices will be higher. Using bitcoin, you can buy goods and services, convert them into real currency at any time according to the bitcoin exchange rate at that time, and sell bitcoin to other users. If you want to join the mining team, the early hardware and power costs are inevitable, so you can try various hardware settings and calculate its mining efficiency. Risk the price fluctuation of bitcoin is its biggest risk, because the whole market value has reached 1 billion US dollars, many people are eyeing this market. Last month, the value of a bitcoin rose from $30 to a peak of $75; But in 2011, the exchange rate of US dollar to bitcoin fell from US $33 to US $2.51, and it took a long time to recover. Now its transaction value is 125 dollars, so it is very valuable. Instawallet was closed as a bitcoin hosted wallet on Thursday because of the attack, and it indicates that 90 days later, if no one else claims to have received the same URL, users under 50 bitcoins will recover 50 bitcoins. For indivials, if you pay attention to privacy, want to trade a small amount of money without government regulation, and have a wallet that can be entrusted with the custody of bitcoin, you can have a try. There is still a long way to go before it can replace the existing currency. The infrastructure under it needs to be well constructed to be generally accepted. If you want to buy one or two in the near future, it is absolutely no problem.
4. Winver -------- check Windows version
wmimgmt.msc -------- open windows management architecture (WMI)
wupdmgr -------- windows update program
Wscript -------- Windows Script Host settings
write -------- WordPad
winmsd -------- system information
wiaacmgr -------- scanner and Camera Wizard
winchat -------- XP comes with LAN chat
< br />Mem.exe -------- display memory usage
msconfig.exe ------ system configuration utility
Mplayer 2 ------ easy Windows Media Player
mspaint ------ drawing board
mstsc ------ Remote Desktop Connection
Mplayer 2 ------ media player
magnify ------ magnifying glass utility
MMC ------ open console
mobsync ------ same as Step command
dxdiag -------- check DirectX information
drwtsn32 ------ system doctor
devmgmt.msc --- device manager
dfrg.msc ------ disk defragmenter
diskmgmt.msc --- disk management utility
dcomcnfg ------ open system component services
ddeshare ------ open DDE sharing settings
DVD play ------ DVD player
A t/? & gt; Drive letter & 92; File name: pour files into Notepad
net stop messenger --- stop messenger service
net start messenger --- start messenger service
Notepad --- open Notepad
NSLOOKUP ------ network management tool wizard
NTBackup ------ system backup and restore
narrator ------ screen narrator
ntmsmgr.msc ------ mobile storage management Device
ntmsoprq.msc --- mobile storage administrator operation request
netstat - an --- - (TC) command check interface
syncap -------- create a briefcase
sysedit -------- system configuration editor
signerif -------- file signature verifier
sndrec32 -------- recorder
shrpubw -------- create shared folder
secpol.msc ------ local security Policy
syskey -------- system encryption, once encrypted, it cannot be undone, Double password to protect Windows XP system
services.msc --- local service settings
sndvol32 ------ volume control program
sfc.exe ------ system file checker
SFC / scan now --- windows file protection
tsshutdn ------ 60 second countdown shutdown command
tourstart ------ XP Introction (roaming XP program after installation)
taskmgr------ --Task manager
eventvwr ------ event viewer
eudcedit ------ Word Builder
Explorer ------ open resource manager
packer ------ object wrapper
perfmon.msc ------ computer performance monitor
progman ------ program manager
regedit.exe ----- registry
rsop.msc ------ group policy result set < B R / > regedt32 ------ registry editor
rononce - P ------ shutdown in 15 seconds
Regsvr32 / u *. DLL ------ stop DLL file running
Regsvr32 / u zipfldr.dll ------ cancel zip support
cmd.exe ------ CMD command prompt
chkdsk.exe ----- CHKDSK disk check
certmgr.msc ----- certificate management utility
Calc ------ start calculator
cha Rmap -------- start character mapping table
clicong ------ SQL Server client network utility
clipbrd ------ clipboard viewer
conf ------ start NetMeeting
compmgmt.msc --- computer management
cleanmgr ------ garbage collection
ciadv.msc ------ index service program
OSK ------ open screen keyboard
ODBC ad32------ -ODBC data source manager
OOBE / msoobe / a --- check whether XP is activated
lusrmgr.msc --- local users and groups
logoff -------- logoff command
ieexpress ------ Trojan horse binding tool, The system comes with
NSLOOKUP ------ IP address detector
fsmgmt.msc ------ shared folder manager
utilman ------ auxiliary tools manager
gpedit.msc ------ group policy
the content in run can be customized
Customize your run input box
in windows, Microsoft provides a new way to quickly start the program: run
to open [start] - [run], in which you can directly start some specific programs, such as: enter notepad.exe to start Notepad, enter xdict.exe to start Kingsoft, etc
what is the principle of startup? Very simple, in the registry HKEY_ LOCAL_ MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Under app paths, you can see many secondary primary keys, and each secondary primary key corresponds to a content that can be entered in the run
take the primary key of acdsee.exe as an example: there are two strings on the right, which correspond to the absolute path of the program by default, and the path corresponds to the directory of the program
the customization method is very simple: create a new secondary primary key with a different name under app paths (for example: smallfrogs. Exe), and then modify the default path on the right to the program you want to start (for example: C: 92; Program Files\ My APP\ Smallfrogs. Exe), and then create a new string path and modify it to the directory where the program is located (for example: C: 92; Program Files\ My APP\
then you can enter: smallfrogs.exe to start C: 92; Program Files\ My APP\ Smallfrogs. Exe
attention! The system identifies the program by the name of the secondary primary key. Even if you use sssss.exe to create the secondary primary key instead of smallfrogs.exe, if the content of any path is the same as the above example, the program started by inputting sssss.exe is still C: 92; Program Files\ My APP\ Smallfrogs. Exe
wupdmgr Widnows update
shutdown - A about:home Login home page
... (three half points) my computer
DVD play DVD player
fsmgmt shared console
Desktop open desktop folder
... (two points) open C: &; Documents and settings
(click) open start menu
Calc calculator
clipboard viewer
control open control panel
eventvwr event viewer
mstsc remote desktop
WIN2000 command complete set - & gt; Windows 2k/2003 Server
accwiz.exe > Accessibility Wizard for walking you through setting up your machine for your mobility needs; ACS setup DCOM server executable
actmovie.exe > Direct Show setup tool directly displays the installation tool
append.exe & gt; Allow programs to open data in specified directories as if they were in the current directory; Network display and modify IP - Hardware addresses displays and changes the corresponding list of computer IP and hardware physical addresses
at.exe & gt; At is a scheling utility also included with UNIX
atmadm.exe & gt; Displays statistics for ATM call manager; Display and modify attributes for files and folders
autochk.exe & gt; Used to check and repair windows file systems
autoconv.exe & gt; Automates the file system conversion ring reboots automatically transforms the system ring startup
autofmt.exe & gt; Automates the file format process ring reboots formats the process ring startup
autolfn.exe & gt; Used for formatting long file names
bootok.exe & gt; Boot acceptance application for registry
bootvrfy.exe > Bootvrfy.exe, a program included in Windows 2000 that notices the system that startup was successful. Bootvrfy.exe can be run on a local or remote computer; Displays or modifies access control lists (ACLS) of files; Windows calculators calculator
cdplayer.exe & gt; Windows CD player CD player
change.exe & gt; Change {user | port | logon} terminal server related queries
charmap.exe & gt; Character map character map* Table
chglogon.exe & gt; Same as using " Change Logon" Start or disable session logging
chgport.exe & gt; Same as using " Change Port" Change port (terminal service)
chgusr.exe & gt; Same as using " Change User" Change user (terminal service)
chkdsk.exe & gt; Check the hard disk for errors similar to ScanDisk 3 stages must specify a drive letter
chkntfs.exe & gt; Same as using CHKDSK but for NTFS NTFS disk detection program
cidaemon.exe & gt; Component of CI filer service constitutes CI document service
cipher.exe & gt; Displays or alters the encryption of directories [files] on NTFS partitions; Content index -- its the content indexing service for I
ckcnv.exe & gt; Cookie converter transforms cookies
cleanmgr.exe & gt; Disk cleanup, popular with Windows 98
clicong.exe & gt; SQL Server client network utility SQL client network tool
clipbrd.exe & gt; Clipboard viewer for local will allow you to connect to other clipboards
clipsrv.exe & gt; Start the clipboard server
clspack.exe & gt; Clspark used to create a file listing of system packages
cluster.exe & gt; Display a cluster in a domain_ cmd_. exe > There's nothing to say about famous command prompt< br />cmdl32.exe > Connection manager auto download connection management
cmmgr32.exe & gt; Connection manager connection manager
cmmon32.exe & gt; Connection manager monitor
cmstp.exe & gt; Connection manager profile manager connection manager profile setup
comcast.exe & gt; About cluster server cluster
comp.exe & gt; Comcluster add, remove, or join a cluster; Displays or alters the compression of files on NTFS partitions; Console ime ime console
control.exe & gt; Starts the control panel
convert.exe & gt; Convert file system to NTFS
convlog.exe & gt; Convert MS IIS log files to NCSA format
cprofile.exe & gt; Copy profiles convert display mode
cscript.exe & gt; MS Windows scripts host version 5.1 is
csrss.exe & gt; Client server runtime process client server runtime process
csvde.exe & gt; Comma separated variable import / export utility day to format converter
wmimgmt.msc -------- open windows management architecture (WMI)
wupdmgr -------- windows update program
Wscript -------- Windows Script Host settings
write -------- WordPad
winmsd -------- system information
wiaacmgr -------- scanner and Camera Wizard
winchat -------- XP comes with LAN chat
< br />Mem.exe -------- display memory usage
msconfig.exe ------ system configuration utility
Mplayer 2 ------ easy Windows Media Player
mspaint ------ drawing board
mstsc ------ Remote Desktop Connection
Mplayer 2 ------ media player
magnify ------ magnifying glass utility
MMC ------ open console
mobsync ------ same as Step command
dxdiag -------- check DirectX information
drwtsn32 ------ system doctor
devmgmt.msc --- device manager
dfrg.msc ------ disk defragmenter
diskmgmt.msc --- disk management utility
dcomcnfg ------ open system component services
ddeshare ------ open DDE sharing settings
DVD play ------ DVD player
A t/? & gt; Drive letter & 92; File name: pour files into Notepad
net stop messenger --- stop messenger service
net start messenger --- start messenger service
Notepad --- open Notepad
NSLOOKUP ------ network management tool wizard
NTBackup ------ system backup and restore
narrator ------ screen narrator
ntmsmgr.msc ------ mobile storage management Device
ntmsoprq.msc --- mobile storage administrator operation request
netstat - an --- - (TC) command check interface
syncap -------- create a briefcase
sysedit -------- system configuration editor
signerif -------- file signature verifier
sndrec32 -------- recorder
shrpubw -------- create shared folder
secpol.msc ------ local security Policy
syskey -------- system encryption, once encrypted, it cannot be undone, Double password to protect Windows XP system
services.msc --- local service settings
sndvol32 ------ volume control program
sfc.exe ------ system file checker
SFC / scan now --- windows file protection
tsshutdn ------ 60 second countdown shutdown command
tourstart ------ XP Introction (roaming XP program after installation)
taskmgr------ --Task manager
eventvwr ------ event viewer
eudcedit ------ Word Builder
Explorer ------ open resource manager
packer ------ object wrapper
perfmon.msc ------ computer performance monitor
progman ------ program manager
regedit.exe ----- registry
rsop.msc ------ group policy result set < B R / > regedt32 ------ registry editor
rononce - P ------ shutdown in 15 seconds
Regsvr32 / u *. DLL ------ stop DLL file running
Regsvr32 / u zipfldr.dll ------ cancel zip support
cmd.exe ------ CMD command prompt
chkdsk.exe ----- CHKDSK disk check
certmgr.msc ----- certificate management utility
Calc ------ start calculator
cha Rmap -------- start character mapping table
clicong ------ SQL Server client network utility
clipbrd ------ clipboard viewer
conf ------ start NetMeeting
compmgmt.msc --- computer management
cleanmgr ------ garbage collection
ciadv.msc ------ index service program
OSK ------ open screen keyboard
ODBC ad32------ -ODBC data source manager
OOBE / msoobe / a --- check whether XP is activated
lusrmgr.msc --- local users and groups
logoff -------- logoff command
ieexpress ------ Trojan horse binding tool, The system comes with
NSLOOKUP ------ IP address detector
fsmgmt.msc ------ shared folder manager
utilman ------ auxiliary tools manager
gpedit.msc ------ group policy
the content in run can be customized
Customize your run input box
in windows, Microsoft provides a new way to quickly start the program: run
to open [start] - [run], in which you can directly start some specific programs, such as: enter notepad.exe to start Notepad, enter xdict.exe to start Kingsoft, etc
what is the principle of startup? Very simple, in the registry HKEY_ LOCAL_ MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Under app paths, you can see many secondary primary keys, and each secondary primary key corresponds to a content that can be entered in the run
take the primary key of acdsee.exe as an example: there are two strings on the right, which correspond to the absolute path of the program by default, and the path corresponds to the directory of the program
the customization method is very simple: create a new secondary primary key with a different name under app paths (for example: smallfrogs. Exe), and then modify the default path on the right to the program you want to start (for example: C: 92; Program Files\ My APP\ Smallfrogs. Exe), and then create a new string path and modify it to the directory where the program is located (for example: C: 92; Program Files\ My APP\
then you can enter: smallfrogs.exe to start C: 92; Program Files\ My APP\ Smallfrogs. Exe
attention! The system identifies the program by the name of the secondary primary key. Even if you use sssss.exe to create the secondary primary key instead of smallfrogs.exe, if the content of any path is the same as the above example, the program started by inputting sssss.exe is still C: 92; Program Files\ My APP\ Smallfrogs. Exe
wupdmgr Widnows update
shutdown - A about:home Login home page
... (three half points) my computer
DVD play DVD player
fsmgmt shared console
Desktop open desktop folder
... (two points) open C: &; Documents and settings
(click) open start menu
Calc calculator
clipboard viewer
control open control panel
eventvwr event viewer
mstsc remote desktop
WIN2000 command complete set - & gt; Windows 2k/2003 Server
accwiz.exe > Accessibility Wizard for walking you through setting up your machine for your mobility needs; ACS setup DCOM server executable
actmovie.exe > Direct Show setup tool directly displays the installation tool
append.exe & gt; Allow programs to open data in specified directories as if they were in the current directory; Network display and modify IP - Hardware addresses displays and changes the corresponding list of computer IP and hardware physical addresses
at.exe & gt; At is a scheling utility also included with UNIX
atmadm.exe & gt; Displays statistics for ATM call manager; Display and modify attributes for files and folders
autochk.exe & gt; Used to check and repair windows file systems
autoconv.exe & gt; Automates the file system conversion ring reboots automatically transforms the system ring startup
autofmt.exe & gt; Automates the file format process ring reboots formats the process ring startup
autolfn.exe & gt; Used for formatting long file names
bootok.exe & gt; Boot acceptance application for registry
bootvrfy.exe > Bootvrfy.exe, a program included in Windows 2000 that notices the system that startup was successful. Bootvrfy.exe can be run on a local or remote computer; Displays or modifies access control lists (ACLS) of files; Windows calculators calculator
cdplayer.exe & gt; Windows CD player CD player
change.exe & gt; Change {user | port | logon} terminal server related queries
charmap.exe & gt; Character map character map* Table
chglogon.exe & gt; Same as using " Change Logon" Start or disable session logging
chgport.exe & gt; Same as using " Change Port" Change port (terminal service)
chgusr.exe & gt; Same as using " Change User" Change user (terminal service)
chkdsk.exe & gt; Check the hard disk for errors similar to ScanDisk 3 stages must specify a drive letter
chkntfs.exe & gt; Same as using CHKDSK but for NTFS NTFS disk detection program
cidaemon.exe & gt; Component of CI filer service constitutes CI document service
cipher.exe & gt; Displays or alters the encryption of directories [files] on NTFS partitions; Content index -- its the content indexing service for I
ckcnv.exe & gt; Cookie converter transforms cookies
cleanmgr.exe & gt; Disk cleanup, popular with Windows 98
clicong.exe & gt; SQL Server client network utility SQL client network tool
clipbrd.exe & gt; Clipboard viewer for local will allow you to connect to other clipboards
clipsrv.exe & gt; Start the clipboard server
clspack.exe & gt; Clspark used to create a file listing of system packages
cluster.exe & gt; Display a cluster in a domain_ cmd_. exe > There's nothing to say about famous command prompt< br />cmdl32.exe > Connection manager auto download connection management
cmmgr32.exe & gt; Connection manager connection manager
cmmon32.exe & gt; Connection manager monitor
cmstp.exe & gt; Connection manager profile manager connection manager profile setup
comcast.exe & gt; About cluster server cluster
comp.exe & gt; Comcluster add, remove, or join a cluster; Displays or alters the compression of files on NTFS partitions; Console ime ime console
control.exe & gt; Starts the control panel
convert.exe & gt; Convert file system to NTFS
convlog.exe & gt; Convert MS IIS log files to NCSA format
cprofile.exe & gt; Copy profiles convert display mode
cscript.exe & gt; MS Windows scripts host version 5.1 is
csrss.exe & gt; Client server runtime process client server runtime process
csvde.exe & gt; Comma separated variable import / export utility day to format converter
Hot content