0 7 min 1 week

  

  In September 2021, the National Development and Reform Commission issued the

  On November 10th, the National Development and Reform Commission organized a special video conference on the governance of the

  With the issuance of a series of rectification documents and requirements for the

  Universities have a large number of high-performance servers, and users’ personal network security awareness is relatively weak. There are a large number of resources such as computing power that can be exploited, making them important targets for hackers to carry out mining activities and spread viruses.

  Mining consumes a large amount of school electricity energy, and the performance and service life of the equipment involved in mining will also be severely affected.

  The principle of mining

  Mining is a process of utilizing computer equipment resources (such as computing power, bandwidth, hard disk storage, etc.) to solve complex mathematical calculations, thus generating decentralized behaviors based on blockchain technology. The main products generated are Bitcoin and Ethereum.

  For example, Bitcoin achieves consensus between different nodes in the blockchain through Proof of Work, ensuring that the ledger on distributed nodes is the same.

  Proof of Work refers to the use of CPU or GPU computing power to solve complex mathematical problems. When a specific answer is calculated, a new block is generated, and the user who calculates this block receives a certain amount of Bitcoin as a reward. This process is called mining. The machines used for mining are called mining machines, and the people who operate them are called miners.

  To ensure the fastest possible calculation of the answer to the problem and thus obtain the reward from online casinos and how to find them, the miners involved in mining need to invest as much computing power as possible. Therefore, obtaining control over as many mining machines as possible has become a major means to increase mining revenue.

  The hazards of mining

  The main hazards of online casinos and how to find them mining are as follows:

  1. The mining activity requires the use of special mining machines for computation, resulting in significant energy consumption and carbon emissions. It does not have a positive driving effect on industrial development or technological progress. It can lead to a large consumption of school electricity resources and may result in increased punitive electricity prices.

  2. The emergence of online casinos and how to find them driven by mining has rapidly upgraded the cyber black industry, indirectly fostering various cybercrimes, such as ransomware, which are often associated with online casinos and how to find them, constantly threatening the campus network environment.

  3. The devices participating in ‘mining’ are in a high-load operation state for a long time due to their device resources such as CPU, GPU, storage, etc., which accelerates their aging, reduces their service life, and brings serious economic losses and security threats to the school.

  Methods of ‘mining’

  The common ‘mining’ methods are mainly divided into two categories: program-based ‘mining’ methods and website script-based ‘mining’ methods.sports betting platform and The latest method

  The program-based ‘mining’ method is that ‘miners’ upload ‘mining’ trojan programs, and then achieve the persistence of the ‘mining’ trojan program by setting scheduled tasks or modifying system file permissions, etc.

  The method based on website scripts is to execute ‘mining’ scripts written in JavaScript and other languages in the browser, embed scripts containing ‘mining’ code in the website, and when the browser accesses a website with ‘mining’ scripts, the browser will parse and execute the ‘mining’ script (such as Coinhive, JSEcoin, etc.) in the background to carry out ‘mining’. This method is more concealed than the traditional program-based ‘mining’ method and is difficult to detect.

  The common reasons for the current ‘mining’ activities on campus are as follows:

  1. Internal personnel私自 use school public resources for ‘mining’.

  2. Hackers infiltrate hosts by exploiting vulnerabilities, brute force password cracking, and other methods, gain control over the hosts, make the hosts fail, and plant ‘mining’ programs to carry out ‘mining’.

  3. Hackers take advantage of the fact that some campus network users have a weak awareness of cybersecurity to spread viruses, such as phishing fraud, malicious links, and伪装成 ordinary files, etc., so that users are unaware of ‘mining’ taking place.

  Prevention of ‘mining’

  1. All teachers and students should strengthen their cybersecurity awareness, maintain a vigilant attitude towards websites and devices with unclear source locations, avoid accessing files, websites, and unknown mobile storage media with malicious ‘mining’ programs, and at the same time, install necessary terminal antivirus and security protection software.

  2. All teachers and students should enhance their awareness and skills of cybersecurity, timely update the systems and service applications running on devices, fix existing vulnerabilities, promptly detect and clean up possible viruses, trojans, and security vulnerabilities, implement the responsibility system for cybersecurity, and avoid becoming a springboard and control target for ‘mining’.

  3. Do not use the same account and password on multiple machines, ensure that login passwords are long enough and complex, and change them regularly to avoid weak password issues with accounts.

  4. Regularly check whether there are abnormal situations with the server, including but not limited to:

  (1) Whether there are new accounts or unknown processes; 

  (2) Whether there are abnormal system logs; 

  (3) Whether there are abnormal blocking situations with antivirus software.

  5lottery local,We need you. Download and install software from official channels, do not install unknown third-party software, and do not click on unknown links.

  Previous Recommendations

  

  Legal Aid Law Online Quiz Activity Starts, Come and Increase Your Knowledge

  Cybersecurity Publicity Week‖Prevent Network Traps——The Cybersecurity Knowledge You Must Master!

  Source | China Education Network