It is now the flood season, and competition among miners has become urgent and fierce. For miners, the most frightening thing when mining is that they work so hard but end up with someone else’s coins. In the end, all their efforts are in vain and even their mining machines become “disabled”. This is the scary thing about hackers, they are silent and invisible. We can't deal with hackers, but we can take some measures and actions to prevent and deal with viruses. The flood season has finally arrived, but what should we do if the mining machine is suddenly poisoned? I will directly share the practical stuff, hoping it can help fellow miners. How to prevent mining machine poisoning?First, do not visit irregular or unknown websites . For example, you know those websites. Irregular websites are often implanted with viruses. Once you open them, they will automatically attack your machine, or hide temporarily and wait for the opportunity to launch an attack. Second, do not download and use unofficial firmware . The official website of innosilicon mining machine reminds you to pay special attention to the overclocking firmware of the mining machine. Note: Overclocking can increase the running speed, but it may reduce stability. If the overclocking firmware comes from an inappropriate source, you don't know what is implanted, and the security is not guaranteed. If you make it yourself, you should know that the life of the graphics card will be reduced. Third, change the mining machine login password in time . The login password is very important, very important, very important. Fourth, before using a second-hand machine, be sure to check it carefully to ensure that it is non-toxic and has no Trojans . You can refresh the firmware and change the login password. Fifth, try not to go to unofficial repair shops for repairs , after all, official ones are more reliable. Innosilicon officially provides one-stop services for mining machines during the flood season, including hosting, electricity search, ore dressing and machine operation and maintenance, which avoids a lot of unnecessary troubles for miners. How to determine whether you are poisoned?Take the innosilicon mining machine as an example. First, the information of the miners in the mining pool has been tampered with . Therefore, we need to check frequently and deal with it in time. Second, the firmware cannot be upgraded in the background . After entering the background and clicking on the upgrade, a 120-second countdown display immediately appears, and the upgrade is not successful at all. If it is normal, there will be an upload prompt in the lower left corner, which is displayed in the form of a percentage (only supported by Google Chrome). Third, the backend password has been tampered with and you can no longer access the backend . This excludes those who have remembered the wrong password. Fourth, a large number of mining machines suddenly have zero computing power, the hardware and network are normal , and the background cannot upgrade the firmware. But there is also a situation where only a small number of mining machines have computing power problems, which cannot be ignored. Some hackers are still very cunning and often take difficult-to-detect methods. What should I do if I have been poisoned?First, network isolation . Check all computers and machines, isolate the infected machines to avoid affecting other normal machines. Specifically, you can use secondary routing to isolate; isolate subnets at the network aggregation layer, prohibit communication between subnets; block FTP, HTTP and HTTPS protocols in the corresponding network segment of the mining machine. Second, restore factory settings . Third, change your login password . (So, it is very important!) It is a bit more complicated, but you can remember it. It is not recommended to use your brain to memorize it. Check the running status in "Miner Management". If it shows "Modification Successful", it means it is completed. |
<<: Brazilian police accidentally discovered Bitcoin mine laundering money
>>: Antminer S17 Pro actual test video released for the first time: unparalleled performance!
In fact, there is a saying in physiognomy whether...
Ma Yi's Divine Physiognomy: The Physiognomy T...
Japanese companies are still reaping the benefits...
The center of the eyebrows is actually a very obv...
Hdac is a blockchain-based IoT contract platform....
What does a red mole look like? Everyone has a mo...
IT consulting giant Infosys believes speculation ...
Three white eyes are a kind of eye shape, but acc...
In physiognomy, both the nose and the philtrum oc...
There is a well-known software called Glassdoor o...
We often hear and see the character of the fox sp...
Physiognomy is a kind of traditional Chinese phys...
Bitcoin Press Release: San Francisco, USA — Tende...
Hope line: Hope line is also called auxiliary lin...
Dating expressions reveal a man's heart Datin...