Position: Home page » Equipment » How to detect mining in software

How to detect mining in software

Publish: 2021-05-24 08:51:04
1. You can open the Tencent Smart Security page
and find the whole system of Yudian terminal in the proct
and then choose to apply for the use of Tencent Yudian, and then use the virus killing function to kill the virus
2.

In fact, it's not difficult. When we use mobile phones everyday, there will be some background applications, which will be "killed" after restart. However, if the mobile phone is hacked and rebooted, it will enter a high load state again, and the system running memory will be used up quickly. Therefore, if the mobile phone is stuck, hot or dead for no reason, it may be g

it is possible that hackers steal all the information before using mobile phones to "mine" cryptocurrency. People will not only encounter problems such as cell phone stuck, fever and even crash, but also other financial losses

moreover, it is worth noting that some mobile mining apps, in the name of "mining", allow users to invest money and continue to develop offline

3. It's hard to see if the CPU has ever been mined, because the CPU can hardly cause serious aging and discoloration e to long-term full load work, which is not like a graphics card. When the graphics card is fully loaded for a long time, some resistance and capacitance components near the GPU core on the PCB board will turn yellow and discolor e to long-term high temperature, even the PCB board will also change color
as there are not only GPUs, but also video memory, power supply unit and a large number of chip resistor capacitor components on the graphics card, long-term mining will lead to aging of some components, so the life of this kind of graphics card is worrying. But as long as the CPU heat dissipation has been good, basically do not worry, the vast majority can continue to serve for a long time.
4.

Mining is burning graphics card, the following methods can identify their own graphics card is mine card

1: through the naked eye to identify whether the hardware is mine card, in fact, through other ways can also be measured, for example, you go to the computer to test the overclocking performance of the mine card, to compare with the official data, to test the stability of the power supply of the mine card, It can also be measured whether it is a mine card or not

2: the first point is to see if there are any dirt and oil stains on the mine card. If not, it proves that the seller may have done better treatment, or it is not the mine card. If the mine card is very dirty, nine times out of ten it is the mine card. Then we have to carry out the next operation, that is to open the mine card

3: we should pay attention to whether there is an invoice with warranty. The warranty can be guaranteed at the warranty points all over the country, which is not a mine card

extended information

how to avoid buying mine cards: try to buy new cards at the official flagship store of Taobao Jingdong, and if you want to buy second-hand graphics cards cheaply, you can't guarantee it

if the budget is really limited and you have to buy second-hand graphics cards, you should also try your best to buy them by yourself. Don't believe that Internet cafes or studios or companies go bankrupt. Most of the cards bought through this channel are mine cards. Of course, if the indivial buyer has a large number of graphics cards in his hand, please be careful. This probability is also mine cards. Finally, I hope you can avoid mine card, buy your favorite graphics card, happy game

5. If there is a virus in the file, you can directly use the antivirus software to detect it.
use the computer Housekeeper - virus check and kill - specify the location to kill the virus - select the location of the file
and then directly kill the virus. The results show that if there is a virus, there is one, otherwise it is safe
6. There is basically no mobile mining software, as long as you don't install any app with unknown origin. Web mining is OK, but if you turn off the browser, it can't continue mining. So, the inspection you mentioned is not necessary at all.
7. Mobile phone mining are some fake, fake just, can mobile phone mining, even the computer configuration is a little poor can not mine, these mining projects are money, you have to pay attention.
8. Hehe, 360 is easy to use. Now I use 360 and super magic rabbit
if the process
magic rabbit is more practical
you can see all the processes in the process option of magic rabbit
the system process is green and marked as system process, other processes are black, and the location of the file of that process in your computer is displayed, And right click the process, there will be online check the process information, a little open, there is a very clear label, such as: whether it is a Trojan horse, whether it is an error, whether it is a background process, whether it occupies memory, whether it is a spy, and a series of instructions.
9. Task Manager - in the process, you can see that the use of GPU depends on the graphics card. If the load of the graphics card is 100% all the time, you can see the name of the occupied process software.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750