How much does desktop mining earn a day
at present, the computing power of bitcoin in the whole network has reached 2.36 billion hash collisions per second, which is equivalent to the number of water droplets in more than 200000 50 meter long standard swimming pools. But even with such a large amount of computing power, it will take about 10 minutes to hit a hash value that meets the requirements
in 2012, bitcoin's output was halved for the first time, and in July 2016, bitcoin's output was halved for the second time. At present, 12.5 bitcoins are awarded for recording one page of account book. The next halving will take place around 2020, and the total number of bitcoins will not increase by 2040, with a total of 21 million. In other words, the difficulty of digging bitcoin is increasing, while the time required is increasing
It's about 37 yuan
let me first introce the reward mechanism of bitcoin system
bitcoin can basically dig out a block every 10 minutes through system settings. The reward for each block is given to the miners who dig out the block. The miner who digs out the block is called the block miner. The block miner will record the legal transactions in the bitcoin network to the blockchain, so that the miner can receive the service charge for bookkeeping
there are two parts in the reward for the block Miner: one part is the reward given by the system, which is called coinbase reward (also known as system issuance reward), the other part is the reward for bookkeeping, which is called miner's fee. The coinbase reward started with 50 bitcoins. For every integral multiple of 210000 blocks, the coinbase reward will be halved. This is what we often hear about bitcoin mining reward halved in four years
at the present stage, the reward of coinbase is 12.5 bitcoins. At the present stage, the average transaction miner fee received by miners for digging out a block is about 0.1 bitcoin (not fixed), that is to say, the average reward received by miners for digging out a block is about 12.6 bitcoin
about 99% of miners' rewards come from the system's coinbase rewards. According to the bitcoin system, one block can be g out every 10 minutes on average. The number of new blocks that can be g out in one day is 144 (60 * 24 / 10 = 144). At present, the number of bitcoins that can be g out every day is 1800btc (144 * 12.5btc = 1800btc). With the miner's fee of about 0.1btc per block, the total reward for all miners in one day is about 1814.4btc
You can't dig in a day. It takes 2000 years
the global unified computing difficulty of bitcoin is 2621404453 (expected to change in two days). It takes more than 2000 years for a 2.5GHz CPU to work out a bitcoin
in order to make the graphics card fully loaded for a long time, the power consumption will be quite high, and the electricity bill will be higher and higher. Many professional mines at home and abroad are operated in areas with extremely low electricity charges, such as hydropower stations, while more users can only mine at home or in ordinary mines, so the electricity charges are not cheap. Even in a certain residential area in Yunnan, there was a case of crazy mining, which led to a large area trip of the residential area, and the transformer was burned
extended data:
bitcoin network generates new bitcoin through "mining". In essence, the so-called "mining" is to use computers to solve a complex mathematical problem to ensure the consistency of bitcoin network distributed accounting system
bitcoin network will automatically adjust the difficulty of mathematical problems, so that the whole network can get a qualified answer about every 10 minutes. Then bitcoin network will generate a certain amount of bitcoin as block reward to reward the person who gets the answer
when bitcoin was born in 2009, block rewards were 50 bitcoins. Ten minutes after its birth, the first 50 bitcoins were generated, and the total amount of money at this time is 50. Then bitcoin grew at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the block reward will be halved to 25
when the total amount reaches 15.75 million (5.25 million new output, i.e. 50% of 1050), the block reward will be further halved to 12.5. The monetary system used to have no more than 10.5 million in four years, after which the total number will be permanently limited to about 21 million
the most important thing is that the ITGC client has built-in one click mining! One click mining! One click mining! Important things are to be repeated for 3 times. For Xiao, in fact, mining is not so difficult, as long as there is a computer, a mobile phone can, today teach you a key mining
first of all, we need to download ITGC's wallet client. We can search eppool, Download professional mining tools, and now support PC's win, Linux, MacOS's CPU and graphics card mining, as well as Android mobile phone mining! The second step is to download the official wallet client. After downloading and installing, we start ITGC wallet. Step three, start mining Mining command] enter go and enter to start your mining journey. It's so simple! It's amazing!
as a middle-aged miner for 13 years, let's talk about the feeling of mining before.
I bought four mining machines in the past. Bitcoin uses CPU and I'm not familiar with it, so I use the form of buying graphics card to dig Wright's coin.
the first one is a simple double card mining machine, not a mining machine strictly speaking, but a double 7950 machine, At that time, I thought about digging for a while. If I didn't make money, I could still play games by myself. As a result, I found that the efficiency was really not high. Later, I used to dig some dog money and play with it.
the second one was the popular 6-card miner in those years. At that time, there was a powerful motherboard, which could run for 6 yuan by connecting with the PCI adapter and changing the BIOS. At that time, I could dig a lot of Wright's money every day with this machine, It's a pity that there are too many people digging, so it took more than 80 days to dig the coins. The third and the fourth are professional mining machines. At that time, the new chips were used to mass proce mining machines. Although they were expensive, the power consumption decreased a lot. It took about a year to dig, In the end, he retired, g up other counterfeit coins for a while, and then sold them.
generally speaking, many websites have no credibility at all in the past few days. They actually know what the concept of excessive increase in computing power is after digging up the money.
when ZF suppressed it, the assets immediately shrank by nearly 70%, but they still didn't sell because of their faith, On the contrary, after selling the miner, I bought some coins and put them in my hand. When I bought 100, I g them and only bought 15. Hey, the miner was sealed and put under the bed. After waiting for three years, I found that it rose again. This year, when bitcoin rose to 2W, I sold some Leyte coins and paid the down payment. Almost 300 of them were sold. Now it seems that the highest is 380, Ha ha
now I still have some money in my hand, and I plan to hold it for a long time, but I won't dig any more. However, I still have a lot of orders with our first-class suppliers. In the past two months, I sold nearly 150 cards, and the more I sold, the more I sold. Some cards are about to double, which is even crazier than that in 2013, The existence of e-money has its own value in the end, but it does not deny that there are so many speculators who come in to fight. There are indeed those who pursue the price. After the boom, there will be a wave of leeks cutting. In the final analysis, bitcoin is just an investment. Everyone feels different about the risk. The strength of big funds is still strong, and it is inevitable for retail investors to be cut, But it's better than A-share at least.
mining is not a good thing. The big miners are in the remote areas with low electricity charges, many mining machines and low cost. Most people dig at home, and that's just a little fuss.
finally, it's not a good thing to grow too fast. Those who are confident can come in and show their operation. If they don't have much ability, don't come in, Only by routine
bitcoin mining refers to the creation and addition of bitcoin blockchain in the process of block transaction. Each block contains hundreds of transactions, and each transaction is paid from one or more bitcoin addresses, other addresses or addresses
the process of creating blocks is called bitcoin mining because there are rewards for each new block to be created and added to the blockchain. In 2017, the reward was 12.5 bitcoin. So as long as you are faster than others and create a new block, you can get a 12.5 bitcoin reward
obviously, the speed of mining depends on the running speed and stability of the computer. Therefore, only professional "mining machine" can be competent for this job. This kind of machine configuration is very high, power consumption is very large, often need more than one cooperation.
when installing Linux, if you have a network card, the installation program will prompt you to give the configuration parameters of TCP / IP network, such as the IP address of the local computer, the IP address of the default gateway, the IP address of DNS, etc, The installation program will automatically compile the network card (Linux system must first support) driver into the kernel. But we must understand the process of loading the network card driver, so we can easily operate when changing the network card and using multiple network cards in the future. The network card driver is loaded into the kernel as a mole, All the network card drivers supported by Linux are stored in the directory / lib / moles / (Linux version number) / net /, for example, the driver of Inter's 82559 series 10 / 100M self-adaptive boot network card is eepro100. O, 3Com's 3c509 isa network card is 3c509. O, dlink's PCI 10 network card is via Rhine. O, NE2000 compatible network card drivers are ne2k PCI. O and ne. O. after understanding these basic drivers, we can change the network card or add the network card by modifying the mole configuration file.
1. Modify the / etc / conf.moles file
this configuration file is an important parameter file to load the mole, Let's first look at a sample file
; / etc / conf.moles
alias eth0 eepro100
alias eth1 eepro100
this file is the content of conf.moles in a Linux system with two inter 82559 series network cards. The alias command indicates the name of the driver of the Ethernet port (such as eth0), If you use the command modprobe eth0, the system will automatically load eepro100. O into the kernel, So it is not necessary to use options in conf.moles to specify the IO address and interrupt number of the network card. However, corresponding to isa network card, you must specify the IO address or interrupt number of the hardware in conf.moles, as shown below, which indicates the conf.moles file of NE isa network card.
alias eth0 ne
Options ne IO = 0x300 IRQ = 5
after modifying the conf.moles file, You can use the command to load the mole, for example, the second network card to be inserted into the inter:
? Insmod / lib / moles / 2.2.14/net/eepro100. O
so that the mole eepro100. O can be loaded at the Ethernet port, You can also use the command to view the currently loaded mole information:
[ root@ice /Etc] # lsmod
mole size used by
eepro100 15652 (autoclean)
the meaning of the returned result is that the currently loaded mole is eepro100, with 15652 bytes in size and two users, The method is to clear automatically.
2. Modify the / etc / lilo.conf file
in some relatively new Linux versions, because the operating system automatically detects all related hardware, it is not necessary to modify the / etc / lilo.conf file at this time, You can modify the lilo.conf file. Add the following command to the / etc / lilo.conf file:
append = & quot; ether=5,0x240,eth0 ether=7,0x300,eth1"<
the meaning of this command is that the IO address of eth0 is 0x240, the interrupt is 5, the IO address of eth1 is 0x300, and the interrupt is 7.
in fact, this statement comes from the parameter passed when the system boot image file,
Lilo: Linux ether = 5,0x240, eth0 ether = 7,0x300, eth1
this method can also make the Linux system configure two network cards, When using more than three network cards, you can follow the same method.
after configuring the network card, you should configure the TCP / IP parameters. In general, when installing the Linux system, you will be prompted to configure the network parameters, You can use the following commands:
? Ifconfig eth0 a.b.c.d netmask e.f.g.h
a.b.c.d is the IP address of eth0, and e.f.g.h is the netmask.
in fact, in Linux system, we can set multiple IP addresses for a network card, such as the following command:
? Ifconfig eth0: 1 202.112.11.218 netmask 255.255.192
then, Use the command "ifconfig - a" to see the interfaces of all network interfaces:
eth0 link encap:Ethernet HWaddr 00:90:27:58:AF:1A
inet addr:202.112.13.204 Bcast :202.112.13.255 M ask:255.255.255.192
UP BROADCAST RUNNING MULTICAST MTU:1500 M etric:1
RX packets:435510 errors :0 dropped:0 overruns :0 frame:2
TX packets:538988 error s:0 dropped:0 overruns :0 carrier:0
c ollisions:318683 txqueuelen :100
I nterrupt:10 Base address:0xc000
eth0:1 Link encap:Ethernet HWaddr 00:90:27:58:AF:1A
inet addr:202.112.11.218 Bcast :202.112.11.255 M ask:255.255.255.192
UP BROADCAST RUNNING MULTICAST MTU:1500 M etric:1
I nterrupt:10 Base address:0xc000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask :255.0.0.0
UP LOOPBACK RUNNING MTU:3924 M etric:1
RX packets:2055 errors :0 dropped:0 overruns :0 frame:0
TX packets:2055 errors :0 dropped:0 overruns :0 carrier:0
c ollisions:0 txqueuelen : 0
there are three network interfaces, eth0, eth0:1, lo, Eth0 is the real Ethernet interface. Eth0:1 and eth0 are the same network card, but they are bound with another address. Lo is the sending address<
eth0 and eth0:
1 the IP addresses of different network segments can be used, which is very useful when the same physical network segment uses different network addresses<
in addition, the network card has a mode of prosimc. In this mode, the network card will receive all the data packets in the network. Some network monitoring tools under Linux, such as tcpmp, snort, etc., set the network card to hybrid mode.
the ifconfig command can change the IP address of the network card ring the running time, but if the system is restarted, Linux still starts the network interface according to the original default settings
at this time, you can use netconfig or NETCONF command to reset the default network parameters. Netconfig command is to reconfigure the basic TCP / IP parameters, including whether to dynamically obtain IP address (dhcpd and BOOTP), IP address of network card, network mask, default gateway and preferred domain name server address
NETCONF command can configure all network parameters in detail, which is divided into three parts: client task, server task and other configuration. In the client configuration, it mainly includes the configuration of basic host (host name, valid domain name, network alias, IP address of corresponding network card, network mask, network device name, kernel driver of network device),
DNS address configuration, default gateway address configuration, NIS address configuration, IPX interface configuration, PPP / slip configuration, etc. In the server configuration, it mainly includes NFS configuration, DNS configuration, Apache webserver configuration, samba configuration and Wu ftpd configuration
. Among the other configuration options, one is about the host configuration in the / etc / hosts file, one is about the network configuration information in the / etc / networks file, and the last is about the configuration information using linuxconf
under the command of linuxconf, you can also configure the network information, but you can find that the linuxconf program calls NETCONF to configure the network<
in addition, the system configuration files about the network are stored in the / etc / sysconfig / network scripts directory.
examples are as follows:
:
& lt; br>& lt; br> <
ifcfg-eth0 * ifdown post * ifup aliases * ifup PPP *
ifcfg-eth1 * ifdown PPP * ifup IPX * ifup routes *
ifcfg lo * ifdown sl * ifup PLIP * ifup sl *
ifdown @ ifup @ ifup post * network functions
ifcfg-eth0 is the configuration information of Ethernet port eth0,
its content is as follows:
device = & quot; eth0" /* Specify the network device name * /
IPADDR = & quot; 202.112.13.204" /* Indicate the IP address of the network device * /
netmask = & quot; 255.255.255.192" /* Specify network mask * /
Network = 202.112.13.192 / * specify network address * /
broadcast = 202.112.13.255 / * specify broadcast address * /
onboot = & quot; yes" /* Indicates whether the network card is activated at system startup * /
bootproto = & quot; none" /* Indicates whether to use BOOTP protocol * /
therefore, you can also modify this file to change network parameters under Linux[/ Size]
configuration of two network services
in this section, we do not introce the configuration of specific network servers (DNS, FTP, WWW, sendmail) in detail (that will be a huge space), but introce the files related to the configuration of Linux Network services.
1. Lilo configuration file
in Linux system, there is a system boot program, Lilo (Linux loadin) is used to realize the selective startup of multiple operating systems. Its configuration file is / etc / lilo.conf. In this configuration file, the configuration parameters of Lilo are mainly divided into two parts. One is the global configuration parameters, including setting the boot device, etc. the other is the local configuration parameters, It includes the configuration parameters of each boot image file.
I will not describe each parameter in detail here, but only two important parameters: password and restricted option. The password option adds password protection to each boot image file. As we all know, there is a single user mode in Linux system. In this mode, the, Users log in to the Linux system as super users. By adding parameters (Linux single or Linux init 0) ring Lilo boot, people can directly enter the single user mode super user environment without password, This will be very dangerous. So the password configuration option is added in lilo.conf to add password protection to each image file. You can use the password option in global mode (add the same password to all image files), or add a password to each indivial image file.
in this way, every time the system starts up, the, You may find it troublesome to enter the password every time. You can use the restricted option, which enables Lilo to check the password only when the parameters (such as Linux single) are entered ring Linux startup. These two options can greatly increase the security of the system, It is recommended to set them in lilo.conf file.
since password is stored in clear text in / etc / lilo.conf file, it is necessary to change the attribute of / etc / lilo.conf file to only root readable (0400).
in addition, in the early version of Lilo, there was a limitation that the boot sector must be stored in the first 1024 cylinder, which was broken in Lilo version 2.51, After downloading and decompressing the latest version, use the command make & quot; After that, use the command make install to complete the installation.
note: physical security is the most basic security, even if the password protection is added in lilo.conf, if there is no physical security, the password protection can be used, The malicious intruder can use the boot floppy disk to start the Linux system.
2. The configuration file of domain name service
(1) / etc / host name stores the host name and domain name of the Linux system in this file