How to prevent mining by computer
Publish: 2021-05-21 16:32:13
1. To understand the problem of home computer mining, we must first explain the mining clearly. As like as two peas came out, they shared a identical record book, so they need a person with a right word to decide the record. Who will record it? Through a topic to decide whose computer is right first, then it has the right to record all the data of this block. This is the popular explanation of mining. And reward the bookkeeper to get an extra sum of money, which is the reward for mining. Reward the person who has contributed enough computing power to solve the problem, which is also the reason why we go mining. Money is money, in order to make money. In the beginning, bitcoin mining was just about CPU. Then, for more money, technicians developed faster and faster accounting methods for graphics cards, FPGA and ASIC chips. Please note here that bitcoin is only the bookkeeping method. Bitcoin is the sha256 algorithm, which is only applicable to this kind of algorithm and can only be used for mining. Later, more algorithms appeared, such as ethash, kawpow, cryptonight, zhash, x16r, randomx, etc. Pay attention to the concepts, algorithms (the above pile) and devices (CPU, graphics card, FPGA, ASIC). They complement each other. A currency may have multiple algorithms or a single algorithm for accounting. The same device can also run different algorithms to get different rewards. The only difference is the efficiency of accounting and the speed of making money. So bitcoin can be g with CPU, graphics card, FPGA and ASIC, but ASIC has the highest efficiency and cost performance. Let's go back to the topic, what can a home computer dig? Home computer = CPU + graphics card. The more suitable CPU is the monero under the randomx algorithm. For graphics card, it is suitable for the automatic selection of nicecash. Now I should talk about the specific mining tutorial to complete the answer, but I recommend a simpler and more convenient method, even without knowing all of the above.
2. You can apply to use Tencent Yudian on Tencent Smart Security page, and then use the vulnerability repair function on this software to directly detect and repair the computer vulnerabilities
3. Using a closed system or an unpopular system is the simplest and most crude method, which is to some extent fruit powder welfare
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
to prevent hackers from mining with your machine is just like anti malware. Don't visit messy websites, Download messy software, insert picked up USB flash drives, install anti-virus software (Windows Defender on windows is very good, but it's too strict), check and kill viruses regularly, and check abnormal processes and files regularly. If a program attracts UAC, If you don't understand, try to choose no, and don't believe that "it may be misled by anti-virus software". If possible, you'd better install an isolation machine, shadow system, or create a virtual machine directly with Hyper-V of windows system for daily work
for Android phones, phones before Android 6 are unlikely to win. After all, mobile phone mining also needs good hardware. After Android 6, mobile phones have the management of the authority of each application, as long as they don't go blind root, don't install applications of unknown origin, try to download apps from the official market and rece the unnecessary authority as much as possible (you can also use "refrigerator" and "black domain" to prohibit other apps from running in the background)
for the mobile phones of apple, windows and other operating systems, I think that as long as we don't break the prison blindly and keep the system in the latest version, we can prevent the hooliganism of most apps.
4. Crime tools: all the articles used by criminals to commit crimes, including all kinds of weapons or tools
using a computer to plant a Trojan horse and use the computer to attack and obtain other people's information is also regarded as a crime tool
there is another possibility. In a computer, the behavior of embedding Trojan horse, obtaining the computer information, and the U disk of embedding Trojan horse will be regarded as a crime tool. Computers, on the other hand, are not tools of crime
judgment should be made according to the specific situation.
using a computer to plant a Trojan horse and use the computer to attack and obtain other people's information is also regarded as a crime tool
there is another possibility. In a computer, the behavior of embedding Trojan horse, obtaining the computer information, and the U disk of embedding Trojan horse will be regarded as a crime tool. Computers, on the other hand, are not tools of crime
judgment should be made according to the specific situation.
5. Just download a gpu360 miner
common computer mining methods:
1. Download and install gpu360 miner
2. The software will be set to boot, it is recommended to boot. Because it has a very human function, when you don't use the computer, it will automatically mine, when you use it, it will stop instantly, it will not affect the normal work and use
3. After the software is started, change it to your own mobile phone number. After the software starts, there are three setting options:
4. The first time you start mining, you will test the equipment, and it will test your best mining scheme. It usually takes about ten minutes
5. After testing, it will automatically enter the mining state
6. Click stop and close to minimize to the tray, so that when you don't use the computer, it will automatically open to make money
right click the icon to shut down the software completely
7. Bitcoin earned can be exchanged directly in online stores.
common computer mining methods:
1. Download and install gpu360 miner
2. The software will be set to boot, it is recommended to boot. Because it has a very human function, when you don't use the computer, it will automatically mine, when you use it, it will stop instantly, it will not affect the normal work and use
3. After the software is started, change it to your own mobile phone number. After the software starts, there are three setting options:
4. The first time you start mining, you will test the equipment, and it will test your best mining scheme. It usually takes about ten minutes
5. After testing, it will automatically enter the mining state
6. Click stop and close to minimize to the tray, so that when you don't use the computer, it will automatically open to make money
right click the icon to shut down the software completely
7. Bitcoin earned can be exchanged directly in online stores.
6. Change the computer (manual funny)
antivirus, if you can't kill it, you can check the program with high CPU or GPU occupation and manually delete it. If you can't, you can't change the hard disk (the disk where the mining program is located)... Change the computer
antivirus, if you can't kill it, you can check the program with high CPU or GPU occupation and manually delete it. If you can't, you can't change the hard disk (the disk where the mining program is located)... Change the computer
7. 4 try Tencent computer housekeeper killing, the second generation engine eagle eye antivirus engine
, which greatly reces the occupied system space, and supports cloud killing and Trojan horse killing. More comprehensive and thorough
turn on computer Housekeeper / lightning antivirus / full scan / complete. Restart the computer after antivirus, because many viruses can only be cleared after restarting the computer
after poisoning, the computer often fails to power on normally. When restarting the computer, press F8 all the time to enter the advanced option, and then enter the computer system from the network security mode. The first thing after boot is to carry out anti-virus treatment immediately.
, which greatly reces the occupied system space, and supports cloud killing and Trojan horse killing. More comprehensive and thorough
turn on computer Housekeeper / lightning antivirus / full scan / complete. Restart the computer after antivirus, because many viruses can only be cleared after restarting the computer
after poisoning, the computer often fails to power on normally. When restarting the computer, press F8 all the time to enter the advanced option, and then enter the computer system from the network security mode. The first thing after boot is to carry out anti-virus treatment immediately.
8. It depends on what monitoring software is installed on your computer. Don't open some malicious links or web pages at will. Besides, you should have security awareness. Secondly, there should be monitoring software on your computer to be more secure. For example, Tencent computer manager suggests that we should improve our network security awareness and keep Tencent computer manager and other security software running all the time when we use our computer, Be alert to links and documents of unknown origin, so as to prevent criminals from taking advantage of them.
Hot content