A brief introduction of virtual coin Mining script Technology

Source: Internet
Author: User
Tags ssl certificate

Last week, the value of Bitcoin rose to $20,000 trillion, a record high. Recently, with the crazy rise of Bitcoin, the phenomenon of malicious implantation of mining scripts continues to occur, Southern weekend, Starbucks and many other platforms were found to be maliciously implanted mining scripts. The next step is to get to know the mining.

What is digging a mine.

The core principle of Bitcoin is "block chain", each block corresponds to a bill, all the blocks are linked to the block chain, any transaction information and transfer records are recorded in the block chain. Note that the block chain exists throughout the Internet, so any Bitcoin holder is not worried about the loss of the Bitcoin currency.

Every other point in time, the Bitcoin system will generate a random code on the system node, all the computers in the Internet can look for this code, who found this code, will produce a block, then get a bitcoin, this process is often said to dig ore.

Bits and coins to dig mine

is used to earn Bitcoin computer, this type of computer generally has a professional mining chip, more use of the way to burn graphics, the power consumption is large. Users use personal computers to download software and then run a specific algorithm, and remote server communication can be the corresponding Bitcoin, is to obtain a bit of the currency of one of the ways.

According to the latest foreign media reports, as the digital currency presents a rising trend, in order to obtain more digital currency. Hacking the Web site into a mining script, using the user's CPU to tap the digital currency is increasingly popular. The relevant data statistics, currently 2,496 running outdated software sites were hackers implanted malicious code, and the use of visitors to the CPU mining. Illegal implantation of malicious mining scripts has become a common way of black production.

It is understood that through the browser to visit these sites when the mining script will be in the background to occupy a large number of CPU, the computer will slow down or Kaka, seriously affecting the user's Internet experience. According to the resource manager, the CPU occupancy rate is over 95%, and the site is closed down to 9% immediately. Therefore, if users open the embedded mining code of the site does not close, each computer each month will consume more than 2.9-5 U.S. dollars of electricity, which is not a hardware life of the additional loss.

Finally, the domestic information security service providers in The Times (GDCA) recommended that the vast number of users do not randomly open the site of dubious origin, through the SSL certificate to identify the authenticity of the site identity. At the same time keep the security software open state, in time to intercept the malicious acts of dangerous web pages.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.