2、安全厂商称Zcash将使挖矿程序回归
标题:Zcash, or the return of malicious miners
作者信息:December 12, 2016. 9:01 am By Alexander Gostev
//BEGIN
On 28 October, the cryptocurrency world saw the emergence of a new player, the Zcash (ZEC) cryptocurrency. Its developers have described it rather figuratively: “If Bitcoin is like HTTP for money, Zcash is HTTPS.” They continue by noting that “unlike Bitcoin, Zcash transactions can be shielded to hide the sender, the recipient and value of all transactions.”
著名的比特币恐怕要遇到竞争对手了!最近一个被称为Zcash的虚拟货币粉墨登场了。
Zcash的开发人员这样形容为啥已经有了比特币还需要开发这个Zcash币:如果把比特币比喻为HTTP的话,那么Zcash就是HTTPS。
Zcash的整个传输过程都可以被加密:不仅仅是接受者可以匿名,发送者以及交易的金额都可能是匿名的。是不是很诱惑?
//END
So, what are the threats facing a user who is unaware that their computer is being used for cryptocurrency mining?
Firstly, these operations are power hungry: the computer uses up a lot more electricity, which, in some countries, could mean the user ends up with a hefty electricity bill.
Secondly, a mining program typically devours up to 90% of the system’s RAM, which dramatically slows down both the operating system and other applications running on the computer. Not exactly what you want from your computer.
To prevent the installation of mining programs, Kaspersky Lab users should check their security products and make sure detection of unwanted software is enabled.
那么如何预防Zcash来挖矿呢?
其实这个挖矿程序严格来说,还不能算是恶意代码,顶多算一个用户可能并不需要的程序PUP。
尽管如此,为了发现潜在的风险,建议用户注意以下事项:
首先:机器的耗电情况,如果突然您的机器耗电量大增(电费单子高得离谱),那么就要特别留意了。说不定就是那些“勤奋”的挖矿程序在搞怪。
其次:内存占用情况:挖矿程序通常会占用整个系统RAM内存的90%,使得操作系统变得很慢很慢,运行程序基本不能动,这时也要特别注意仔细检查您的计算机。
点评:Zcash可以称为Z币吗? |