Joke Collection Website - News headlines - What are the hazards and consequences of intentional mining?

What are the hazards and consequences of intentional mining?

The harm and consequences of intentional mining behavior include: causing a lot of energy consumption and carbon emissions, consuming a lot of computing resources, disrupting the normal financial order, and affecting the effectiveness of the state's rectification of virtual currency mining behavior. Details are as follows:

First, it will cause a lot of energy consumption and carbon emissions, which goes against the new development concept and is not conducive to achieving the peak of national carbon dioxide emissions and carbon neutrality.

Second, it consumes a lot of computing resources, which makes the system, software and application services run slowly. Once the personal computer or server is controlled by the "mining" program, it will cause data leakage or virus infection, which will easily lead to network security problems.

Third, it disturbs the normal financial order and even social order, and often becomes a tool for illegal and criminal activities such as money laundering and illegal transfer of assets; Some criminal gangs attract investors to buy the share of computing power by selling virtual currency "mining" equipment to the public or renting "mining" computing power, defrauding residents of personal money and affecting social order stability.

Fourth, some employees of state-owned units use state resources and public resources to make profits, which is a typical behavior that does not distinguish between public and private, harms public interests and personal interests, seriously violates party discipline and political discipline, and seriously affects the effectiveness of the state's rectification of virtual currency "mining".

Specific preventive measures are as follows:

1, anti-virus: install genuine anti-virus software and upgrade to the latest virus database, and must carry out comprehensive virus killing; Update the operating system patch and open the firewall.

2. Modify weak passwords: enhance the password complexity of operating system users. The basic requirements are: more than 8 digits, including the combination of uppercase and lowercase letters+numbers+special symbols; Delete or disable redundant and useless accounts.

3. Close sensitive ports: General sensitive ports are: 23, 135, 137- 139, 445, 1433, 3389, etc. If not, try closing them.

4. Improve safety awareness: Do not open email attachments, QQ or WeChat files of unknown origin, do not install pirated software, and do not click unknown links.

5. Make backup: backup important documents such as core data of scientific research, teaching and management.