Position: Home page » Equipment » How does bitcoin mine the computer

How does bitcoin mine the computer

Publish: 2021-05-23 02:05:48
1. The computing power and block output of the whole network can reach taobit http://www.taobtc.net/ See
1. First of all, as a node mine pool, the mine pool construction itself needs to add node files, showing the number of connections below the bitcoin wallet. After adding nodes, the number of connections can reach dozens or even more, depending on how many nodes you add, effectively recing invalid shares
2. How to fix the calculation difficulty of mining equipment for miners? Set it in your mining equipment startup bat
for example, if your single mining equipment is 10g, you can add / 1000 + 10 after the user name (wallet address) in the bat file. For example, in my bat - / 1000 + 10-p1, what does that mean? This means that your equipment is 10g computing power, and you use a fixed difficulty of 10g in p2pool mining. If you are a 1g device, write / 1000 + 1 at the back, so the difficulty is fixed and the efficiency of the device is effectively improved.
2.

At present, the mining machines in the market are mainly divided into two categories, one is PC based mining machine, the other is professional mining machine based on ASIC chip

the general PC mining machine can be used as a home computer, but the CPU performance is weak and the power consumption is high. Professional mining machine based on ASIC chip can not be used as ordinary computer because it has no graphics card and does not support mainstream desktop operating system

extended data:

mining machine is one of the ways to obtain Bitcoin is a kind of network virtual currency proced by open source P2P software. It doesn't rely on a specific currency institution to issue, but is generated by a large number of calculations of a specific algorithm. It uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions economically. The decentralized nature of P2P and the algorithm itself can ensure that the currency value cannot be manipulated by mass proction

any computer can become a mining machine, but the profit will be relatively low, and there may not be one in ten years. Many companies have developed professional mining machines, which are equipped with special mining crystal. They are tens or hundreds of times higher than ordinary computers

mining is actually a competition of performance and equipment. The mining machine composed of many graphics cards, even if it is just a garbage card like hd6770, can surpass the single graphics card of most users in terms of computing power

and this is not the most terrible. Some mining machines are made up of more such graphics card arrays. When dozens or even hundreds of graphics cards come together, the graphics card itself costs money. Considering the hardware price and other costs, there are considerable expenses in mining

in addition to the display card burning machine, some ASIC (application specific integrated circuit) professional mining machines are also put into the battlefield. ASIC is specially designed for hash operation. Although the performance may not be able to kill the display card in seconds, it is already quite strong. Moreover, because their power consumption is far lower than that of the display card, it is easier to form scale and the electricity cost is also lower, It is difficult to compete with these excavators. And this kind of machine will be more expensive

3.

You can't dig in a day. It takes 2000 years

the global unified computing difficulty of bitcoin is 2621404453 (expected to change in two days). It takes more than 2000 years for a 2.5GHz CPU to work out a bitcoin

in order to make the graphics card fully loaded for a long time, the power consumption will be quite high, and the electricity bill will be higher and higher. Many professional mines at home and abroad are operated in areas with extremely low electricity charges, such as hydropower stations, while more users can only mine at home or in ordinary mines, so the electricity charges are not cheap. Even in a certain residential area in Yunnan, there was a case of crazy mining, which led to a large area trip of the residential area, and the transformer was burned


extended data:

bitcoin network generates new bitcoin through "mining". In essence, the so-called "mining" is to use computers to solve a complex mathematical problem to ensure the consistency of bitcoin network distributed accounting system

bitcoin network will automatically adjust the difficulty of mathematical problems, so that the whole network can get a qualified answer about every 10 minutes. Then bitcoin network will generate a certain amount of bitcoin as block reward to reward the person who gets the answer

when bitcoin was born in 2009, block rewards were 50 bitcoins. Ten minutes after its birth, the first 50 bitcoins were generated, and the total amount of money at this time is 50. Then bitcoin grew at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the block reward will be halved to 25

when the total amount reaches 15.75 million (5.25 million new output, i.e. 50% of 1050), the block reward will be further halved to 12.5. The monetary system used to have no more than 10.5 million in four years, after which the total number will be permanently limited to about 21 million

4. Pro, are you going to get rich or interested in mining? If I'm interested, I won't say anything. If I want to get rich, I'll advise you. Forget it. It's not worth it. Now mining is a loss business
5. I suggest you don't go. I'm Lenovo. I g more than 10000 computers for a week and found 0.000034 bitcoins. It's not enough for electricity. If you want to speculate, it's better to go to the okex exchange.
6.

Computer mining is a bitcoin mining machine, which is a computer used to earn bitcoin

this kind of computer generally has professional mining chips, and works in the way of burning graphics card, which consumes a lot of power. It is one of the ways to get bitcoin that users download software from personal computer and then run specific algorithm to get corresponding bitcoin after communicating with remote server

7. First of all, whether a blockchain project is MLM or not should be judged from multiple perspectives.
in the process of development, blockchain has gone through three stages
blockchain 1.0. In this stage, it is mainly to realize digital currency, core nodes and front-end tools
the biggest feature of blockchain 2.0 at this stage is that it supports smart contracts, one of the representative procts is Ethereum. In Ethereum, the smart contract is used to develop the contract program, and finally deployed in the blockchain ledger
blockchain 3.0 blockchain goes beyond the scope of digital currency and regards blockchain as a wide range of solutions, which can be combined with other fields by using blockchain technology
however, many domestic blockchain related projects stay in the stage of blockchain 1.0, and one of their basic modes is to publish white papers, issue digital currency and go to the stock exchange, Then in accordance with the market, trading to earn profits
however, there may be some MLM money, air money and so on. What we can do is to take this kind of thing with a rational eye and not to invest blindly
8. < UL >
  • if you want to mine through the new route generation 2 or 3, you need to connect an external mobile hard disk with a capacity of at least 64GB, and the higher the capacity is, the faster the interface speed is, and the easier it is to generate high revenue

  • 9. It adopts the strong double factor authentication mode of one time one secret, which solves the security and reliability of identity authentication. The identity authentication method based on USB key is a convenient, safe and reliable identity authentication technology developed in recent years. It also provides USB interface, which is common with today's computers. USB key is a small hardware device with USB interface, The USB flash disk is no different from our common USB flash disk, but its internal structure is not simple. It has a built-in CPU, memory and chip operating system (COS), which can store the user's key or digital certificate, and use the password algorithm built in the USB key to realize the user's identity authentication.
    every USB key has hardware pin code protection, The pin code and hardware constitute two essential factors for users to use the USB key. Users can log in to the system only when they obtain the USB key and the user's pin code at the same time. Even if the user's pin code is leaked, as long as the USB key held by the user is not stolen, the legal user's identity will not be counterfeited; If the user's USB key is lost, because the finder does not know the user's pin code, and can't impersonate the legal user's identity,
    the USB key has a secure data storage space, which can store secret data such as digital certificate and key. The reading and writing operation of the storage space must be realized through the process, and the user can't read it directly, in which the user key can't be exported, To prevent the possibility of ing user's digital certificate or identity information,
    USB key has built-in CPU, which can realize various algorithms of encryption, decryption and signature. Encryption and decryption operations are carried out in the USB key to ensure that the key will not appear in the computer memory, so as to prevent the possibility of user's key being intercepted by hackers, The two application modes of USB key are as follows:
    first, based on the impact response authentication mode,
    USB key has built-in one-way hash algorithm (MD5), which stores a key to prove the user's identity in the USB key and the server in advance. When the user's identity needs to be verified on the network, First, the client sends a verification request to the server. After receiving the request, the server generates a random number and sends it back to the USB key inserted on the client PC. this is called "impact". The USB key uses the random number to perform MD5 operation with the key stored in the USB key to get an operation result, which is sent to the server as authentication evidence. This is called "response". At the same time, the client sends the result to the server as authentication evidence, The server uses the random number to perform MD5 operation with the client key stored in the server database. If the result of the operation of the server is the same as the result of the response sent back by the client, the client is considered to be a legitimate user.
    in the figure, "x" represents the random number provided by the server, "key" represents the key, "Y" represents the result of the random number and key after MD5 operation, Only the random number "X" and the operation result "Y" are transmitted through the network. The user key "key" is neither transmitted on the network nor appears in the memory of the client computer. Neither hackers on the network nor Trojan horse programs on the client computer can get the user's key. Because the random number "X" and the operation result "Y" used in each authentication process are different, Even if the authentication data is intercepted by hackers in the process of network transmission, the key can not be obtained by reverse dection, so the user identity can not be counterfeited fundamentally. I think the answer is OK, but if you write USBKEY code. You should look at embedded development books. Have you ever done MVC code?
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750