Black Coin mining order
Ethernet mining tutorial
1. Create a new folder on the hard disk, which is better than C: eth. Then all the mining software is stored here
2. Download the following software
1) geth -- select geth win download and unzip
2) ethernet -- download and unzip to the same folder and rename it as "miner"
3) Ethereum wallet -- Download the win Ethereum wallet and unzip it and rename it as "wallet"
install all the software
3 Open the command prompt (click win and R at the same time, or click Start menu and enter CMD). The command prompt is a command line parser that allows you to execute command input software in the operating system
After
, you will have Ethereum wallet. But there is no balance, so next you need to build an ethminer. It's time to minimize your wallet
Mining
You can't dig in a day. It takes 2000 years
the global unified computing difficulty of bitcoin is 2621404453 (expected to change in two days). It takes more than 2000 years for a 2.5GHz CPU to work out a bitcoin
in order to make the graphics card fully loaded for a long time, the power consumption will be quite high, and the electricity bill will be higher and higher. Many professional mines at home and abroad are operated in areas with extremely low electricity charges, such as hydropower stations, while more users can only mine at home or in ordinary mines, so the electricity charges are not cheap. Even in a certain residential area in Yunnan, there was a case of crazy mining, which led to a large area trip of the residential area, and the transformer was burned
extended data:
bitcoin network generates new bitcoin through "mining". In essence, the so-called "mining" is to use computers to solve a complex mathematical problem to ensure the consistency of bitcoin network distributed accounting system
bitcoin network will automatically adjust the difficulty of mathematical problems, so that the whole network can get a qualified answer about every 10 minutes. Then bitcoin network will generate a certain amount of bitcoin as block reward to reward the person who gets the answer
when bitcoin was born in 2009, block rewards were 50 bitcoins. Ten minutes after its birth, the first 50 bitcoins were generated, and the total amount of money at this time is 50. Then bitcoin grew at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the block reward will be halved to 25
when the total amount reaches 15.75 million (5.25 million new output, i.e. 50% of 1050), the block reward will be further halved to 12.5. The monetary system used to have no more than 10.5 million in four years, after which the total number will be permanently limited to about 21 million
Monroe reverse miner is suitable for CPU mining_ Title = "mining" data_ size="" data_ filelogo=" https://gss0.bdstatic.com//yun-file-logo/file-logo-6.png " data_ number="1" data_ sharelink=" https://pan..com/s/16T8rLa35JIEd89dzax9GMg " data_ Extract code: tra2
1. Download the mining software and unzip it. Right click: "start. CMD" and select "Edit" from the pop-up menu
Paste and modify it to the receiving address of the wallet you got before, so that the mine you got from mining goes into your wallet
2. Double click start.cmd to start mining
for the first time, the words "reboot" may appear. You can follow its English operation, right-click "start. CMD", select "run as administrator", and then restart the computer. After AES Ni takes effect, it can run normally and efficiently again to make money
a new customer recently consulted with sine security company, saying that his server often fails to open the website of the card, and the remote connection to the server is extremely slow. Sometimes the Ping value reaches 300-500, and he often switches. After listening to the customer's words,
will generally judge that he has been attacked by CC + DDoS mixed traffic, It's strange to say that there is no traffic attack on the computer room. It's not a traffic attack, but it also causes the server card and website to fail to open. What kind of attack is this? In order to solve the problem of
client server card, we immediately arranged a security engineer to carry out security detection and deployment on his Linux server
{rrrrrrr}
Mining Trojan horse is also designed. If the mining process is forced to stop by customers, it will automatically start to continue mining to achieve uninterrupted mining.
careful inspection shows that it is through setting the hourly task plan, remotely downloading shell mining Trojan horse, and then executing, Check whether the current process exists or not. If not, start the Trojan horse to mine
a detailed security inspection was carried out on the client's Linux server. It was found that fortunately, there was no encrypted server data, and the worm was infected with the disease
virus. If the data was encrypted, the loss would be great. The client was a platform, and the client's data was very important. After finding out the mining Trojan horse,
do customers need to know how the server is attacked? Was the Trojan horse uploaded? It can prevent the attack
in the later stage
through the security detection and analysis of our security engineers, we found that the server uses Apache Tomcat environment, the open architecture of the platform is JSP + Oracle database, and Apache Tomcat uses the version of 2016, which leads to the serious remote command execution vulnerability of Apache, Through this vulnerability, the intruder can directly invade the server and get the administrator permission of the server,
sine security engineer immediately repairs the Apache vulnerability and clears the Trojan horse. So far, the problem has been solved, the client server
runs stably, and the network station opens normally strong>
Computer Mining: when users "mine" bitcoin, they need to use the computer to search for 64 bit numbers, and then compete with other gold miners by repeatedly solving puzzles to provide the required numbers for the bitcoin network. If the user's computer successfully creates a set of numbers, then they will get 25 bitcoins. In short, it's about looking for bitcoin
e to the decentralized programming adopted by the bitcoin system, only 25 bitcoins can be obtained every 10 minutes, and by 2140, the maximum number of bitcoins in circulation will reach 21 million. In other words, bitcoin system is able to achieve self-sufficiency, resist inflation through coding, and prevent others from destroying these codes
extended data:
the corresponding laws and regulations of computer mining in China:
in China, the regulations on the administration of RMB prohibit the proction and sale of token tickets. Because there is no clear judicial interpretation of the definition of token ticket, if bitcoin is included in the "token ticket", the legal prospect of bitcoin in China will face uncertainty
the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of virtual currency of online games (Wen Shi Fa [2009] No. 20) on June 4, 2009 stated that the application scope of virtual currency of online games was defined for the first time, and the distinction between the current virtual currency of online games and the virtual props in the game was made; At the same time, the notice said that the "notice" stipulates that enterprises engaged in related services must be approved before they can operate
in China, some Taobao stores also began to accept the use of bitcoin, and the number of businesses will graally increase
in October 2013, the first bitcoin quarterly, one bit, was released
on October 15, 2013, the network accelerator service of the network announced its support for bitcoin
on October 26, 2013, btcmini reported that GBL was hacked
on October 31, 2013, Lei Teng, a famous Internet lawyer, proposed the event of "filing a case to investigate the closure of GBL bitcoin trading platform as soon as possible", analyzed the "value function" and "use function" of bitcoin, and bitcoin should be governed by relevant laws
1100 mining machine version or Warcraft gx700 mining machine version are very good mining machine power supply, very stable, and the conversion efficiency is very high, for a long time operation is no problem, coupled with solid materials, cost-effective, many mining people buy this oh.
BTC 2009 Satoshi Nakamoto is bitcoin / org ~ $24.3 billion is SHA-256; LTC 2011 coblee is litecoin / org ~ $3.6 billion is script infinite; IFC 2012 ifccion is ifccoin / org ~ $20 million is script quark qrk 2012 qrkcion is cgbcion / org ~ US $10 million is scrpt zeta coin, 2012 zetcony is ZET / org ~ US $10 million is scrpt proof of work / POS how to distinguish black heart coin. So how to distinguish these black heart coins
with the popularity of Shanzhai coin market, some unscrupulous developers, after developing a virtual coin, organize themselves to take a part of the total amount of virtual coin issued as their own before putting it on the market. This proportion is generally less than 2%, and a few even reach 90%. When the virtual currency has a certain value or on the trading platform, a large number of sell-off cash, so that miners and investors suffer huge losses, so the first factor to choose virtual currency is zero pre dig. So how to distinguish whether a virtual coin is zero pre dig? Here is the identification method. 1. Play the wallet and wait for the wallet to complete synchronization. Open the wallet - "help" - "debug window" - "console" 2. Input the command: getblockhash block. For example, input: getblockhash 1 to get the hash value of the first block. Input the command: getblock just got the hash value. We input: getblock to find the value of TX, Here we are: we enter: getrawtransaction 1 (the space 1 above and behind should not be omitted) 5. In the information, the value value is the content of this block: 8.00000000, which is the currency quantity of the first block. This query method is common to all virtual currencies
e to the irreversibility of virtual coins, unscrupulous developers need to pre dig a large number of virtual coins as soon as possible. They have to set a large number of 1-N early blocks to implement pre digging. This is a dilemma. The author who has no pre dig has no motivation to maintain it. There is a risk that the author will cash out and smash the market maliciously if there are too many pre digs. Generally speaking, the author will use part of the pre digs for promotion and maintenance, but the pre digs generally do not exceed 2%. But in practice, many authors have done a lot of pre excavation
1. For example, Wolong, the author of Panda Coin (transaction code: PND), had a serious pre excavation. When he went public, the author smashed 18e coin directly into the market, from 200 Cong bitcoin to the price of Jicong bitcoin. At the same time, the domestic promotion QQ group was disbanded, a large number of investors were deeply locked, resulting in a very bad impact
2. For those who are lucky in disguise, e to the failure of the author's pre dig, such as moleculars (transaction code: mol), the author stole about 10 million (total 2e) after the release of the coin. At that time, it caused a big stir in the foreign Shanzhai coin forum. Some Shanzhai coin lovers directly used big computing power (51% computing power attack) to cause the currency to split, After the restart of the block, all the pre g coins were lost, resulting in that the total amount of the coin is only 1.9e, because the zero pre g coin caused by the accident aroused the interest of the majority of coin friends, and the computing power of the whole network once exceeded 200g. At present, the author's maintenance power comes from the donation and reward of fans at home and abroad, and the author's enthusiasm for coin friends is unexpected
therefore, instead of worrying about pre excavation and no pre excavation, we should pay more attention to the amount of pre excavation and the purpose of pre excavated coins. It is recommended that you do not play with more than 2% of the pre g coins. The so-called POW refers to the proof of work, that is, the proof of work. In short, it is to get rewards through calculation, and it can be calculated by mining machine or computer CPU, GPU, etc., that is the so-called mining. Investors can get it by buying it from home or digging their own mines. Relatively fair, early investors can not monopolize the quantity and price of currency. Representative currency: bitcoin, etc
the so-called POS refers to the proof of stock. In this way, currency investors can only buy from the previous home, which is similar to the pyramid style. The distribution is extremely unfair. Many currency investors get a lot of currency at the initial stage, and later can only get it from the initial investors at a high price, which leads to the monopoly of the initial investors on the currency price. Representative currency: NXT, etc
the so-called IPO is more similar to crowdfunding in the field of Shanzhai currency, that is, the author or company initiates the investment target, and domestic and foreign investors invest and obtain a certain amount of currency or options. This kind of representative currency: PTS, etc. However, e to 3I company, PTS has been delayed again and again, which has a great impact on investors' confidence
so I suggest you be more careful.