Page 4,510«..1020..4,5094,5104,5114,512..4,5204,530..»

Cloud Server | Start your cloud hosting today | 1&1

NEW:Recommended configurations providing an affordable first step:

This configuration is only available with Linux operating systems

The entry-level configuration for testing purposes and mini-projects

1 vCore

512 MB

30 GB

Ideal as a development environment and for small projects

1 vCore

1 GB

40 GB

The right web server solution for small to medium-sized websites

2 vCore

2 GB

80 GB

Perfect for online shops and smaller database applications

2 vCore

4 GB

120 GB

The configuration for larger websites and projects

4 vCore

8 GB

160 GB

Ideal for SaaS projects and media streaming

8 vCore

16 GB

240 GB

Perfect for large projects and applications

12 vCore

32 GB

360 GB

Suitable even for extensive data processing demands

16 vCore

48 GB

500 GB

Configure your Cloud Server with full flexibility:

1 vCore

1 GB

20 GB

Number of CPUs (vCores) (7.20/vCore/month*)

RAM Memory (GB) (7.20/GB/month*)

SSD Storage (GB) (7.20/100 GB/month*)

See the original post:
Cloud Server | Start your cloud hosting today | 1&1

Read More..

Cryptocurrency-Stealing Malware Landscape – Dell SecureWorks

Introduction

Bitcoin, a digital currency and payment system introduced in 2009, has been subject to an increasing amount of attention from thieves. Although the system itself is protected by strong cryptography, thieves have stolen millions of dollars of bitcoin[i] from victims by exploiting weaknesses in Bitcoin private key storage systems.

Since Bitcoin's introduction, an increasing number of alternative digital currencies (altcoins) have been created, based on the original Bitcoin client's source code. Even though none of these altcoins have approached the per-coin value of Bitcoin, some have achieved total market caps measuring in the millions of dollars. As a result, these altcoins have also been targeted for theft.

Mass theft of cryptocurrency is usually accomplished through the hacking of exchanges or marketplaces. These thefts are typically well-publicized, and the total number of stolen coins is known. However, another category of Bitcoin theft targets individual users' wallets or exchange accounts via malware such as general-purpose remote access trojans (RATs) or specialized cryptocurrency-stealing malware (CCSM). Due to the skyrocketing value of cryptocurrencies since the beginning of 2013 and the relative simplicity of coding malware and tools to steal cryptocurrency, the Dell SecureWorks Counter Threat Unit(TM) (CTU) research team predicts that CCSM will become one of the fastest-growing categories of malware.

CCSM classification project

To understand the scope of this new threat, CTU researchers embarked on a project to obtain and classify as many CCSM samples as possible. Researchers scanned incoming malware streams with YARA rules, searching for samples that refer to known cryptocurrency software wallet filenames and locations. These samples were classified into families based on similarity. As of this publication, there are more than 100 unique families of malware on the Internet with functionality to steal wallet files or to steal cryptocurrency using other means.

Overall trends

Figure 1 shows the increase in the Windows-compatible CCSM over time. This chart tracks only Windows malware because the Windows portable executable format includes a timestamp in the file headers showing exactly when the malware was compiled. Most malware authors do not bother to alter this timestamp post-release, so it a reasonable and reliable indicator of when a particular sample was created. This chart shows the relationships between average monthly Bitcoin price, new family emergence, and overall total number of families. These variables show a correlation between malware emergence and the price (acceptance) of the currency.

Figure 1. The correlation between Bitcoin price, new malware emergence, and total threat of cryptocurrency-stealing malware. (Source: Dell SecureWorks)

The trend shown in Figure 1 closely follows the overall price trend of Bitcoin. As Bitcoin has become more valuable, more malware authors are targeting it. The record-breaking highs in Bitcoin value from the end of 2013 into 2014 have been accompanied by record-breaking numbers of new CCSM families.

Popularity of coins in CCSM

All CCSM analyzed by CTU researchers targeted Bitcoin. Figure 2 shows the distribution of CCSM-targeted altcoins between January 2009 and the middle of February, 2014.

Figure 2. The distribution of altcoins targeted by CCSM between January 2009 and mid-February, 2014. (Source: Dell SecureWorks)

Figure 3 shows the overall ratio of samples belonging to each malware family. A few malware families seem to be in widespread distribution, while others may have only one or two variants. The "Unclassified" group represents cryptocurrency malware that CTU researchers have not classified as of this publication. The "Miscellaneous" group includes the cryptocurrency malware families the CTU research team has discovered that would not fit into the chart.

Figure 3. The overall ratio of discovered samples belonging to each malware family. (Source: Dell SecureWorks)

CCSM categories

Wallet stealer

The most common type of CCSM is the wallet stealer, a category that includes nearly every family of CTU-analyzed CCSM. This type of malware searches for "wallet.dat" or other well-known wallet software key storage locations, either by checking known file locations or by searching all hard drives for matching filenames. Typically, the file is uploaded to a remote FTP, HTTP, or SMTP server where the thief can extract the keys and steal the coins by signing a transaction, transferring the coins to the thief's Bitcoin/altcoin address.

Most cryptocurrency security guides recommend protecting the wallet with a strong passphrase, preventing the thief from decrypting and using the private keys if the file is stolen. To counter this protection, many of the analyzed wallet-stealer malware families use a keylogger or clipboard monitor to obtain the wallet file's passphrase and send it to the thief.

Credential stealer

Many wallet-stealer families also steal credentials for various web-based wallets, such as Bitcoin exchanges. Some individuals keep a significant amount of bitcoin or other currency in exchanges to trade on price movements. Malware authors are aware of this activity, and many victims have reported that their exchange wallets were emptied without their authorization. In most cases, it is impossible to know exactly what malware was used in the theft, because a full forensic analysis of the victim's hard drive is rarely performed.

Many exchanges have implemented two-factor authentication (2FA) using one-time PINs (OTP) to combat unauthorized account logins. However, advanced malware can easily bypass OTP-based 2FA by intercepting the OTP as it is used and creating a second hidden browser window to log the thief into the account from the victim's computer. Simultaneously, the malware displays a fake "authentication failed" message and blocks the victim's access to the website while the thief empties the account. CTU researchers have not observed a verified example of this type of attack against cryptocurrency exchanges. However, this technique has been successfully used against online banking sites for several years, and it is only a matter of time before CCSM uses this approach.

Man in the middle

CTU researchers have observed at least one family of CCSM that does not exfiltrate wallet files or private keys. Instead, it acts as a "man in the middle," altering the recipient address of a transaction before it is signed. The observed sample runs in the background, monitoring the contents of the clipboard. The malware checks new data in the clipboard for a valid Bitcoin address. If the data is a valid address, the malware replaces it with the thief's Bitcoin address. Victims who do not notice the replacement send the bitcoins to the thief.

RPC automation

Bitcoin and altcoin "reference client" software includes remote procedure call (RPC) functionality, which allows another program to interact with the wallet software. In many cases, a thief with access to this functionality could connect to a running client on a local TCP port and steal the balance of an unencrypted wallet using only two commands (three if the wallet is encrypted and the malware has obtained the passphrase). CTU researchers have not witnessed any CCSM malware taking advantage of this technique as of this publication. It would be difficult to detect this type of theft from a network standpoint, as the transaction would look like any authorized transaction. Another advantage to this technique is that it requires no external command and control (C2) or exfiltration server that can be shut down or blocked.

Detection rates

Across the CCSM samples analyzed by CTU researchers, the average unweighted detection rate across all major antivirus (AV) vendors was 48.9%. Figure 4 lists the major CCSM families classified by the CTU research team and their respective detection rates averaged across all major AV vendors.

Figure 4. Top CCSM families and their detection rate across AV vendors as of February 20, 2014. (Source: Dell SecureWorks)

Wallet protection

Client software choices

When the private keys for a cryptocurrency are stored on a computer connected to the Internet, the potential for theft exists. For Bitcoin there are alternative wallets, such as Armory and Electrum, which can protect against theft-by-malware by using a split arrangement for key storage. One computer, disconnected from any network, runs a copy of the software and holds the private key that can sign transactions. A second computer connected to the Internet holds only a master public key of which addresses belong to the offline wallet. This computer can generate transactions, but it cannot sign them because it does not have the private key. A user wishing to transfer coins generates an unsigned transaction on the online computer, carries the transaction to the offline computer, signs the transaction, and then carries it to the online computer to broadcast the transaction to the Bitcoin network.

Using a split Armory or Electrum wallet can make processing transactions much safer, although the user must still verify the transaction details to ensure malware on the online computer has not altered the transaction before it is signed. Unfortunately, no such clients currently exist for altcoins, although the need for them is recognized and bounties have been offered for their development.

Hardware wallets

Using two computers in a split arrangement where transactions are carried via "sneakernet" is relatively secure, but the logistics are complicated. A much more convenient method would be to use a dedicated hardware device to store the private keys and verify transactions without the possibility of theft. These devices are already in development, with one (the "Trezor" wallet) due to be shipped within the first quarter of 2014.

Transaction integrity verification

Hardware wallets work well for local transactions but not for safely interacting with a remote website on a potentially infected computer. Securely verifying a transaction that has transited a potentially compromised waypoint requires an offline device that can display the details of the transaction before it is processed. Public-key cryptography signs the transaction data on the bank's server before the data is sent to the user. The offline device can verify the signature of the transaction and determine if any changes occurred in transit. If the transaction shows no tampering, the offline device generates a one-time code that authenticates the transaction. This transaction integrity verification (TIV) should become standard for all financial entities, including institutions and sites that accept cryptocurrencies.

Conclusion

After observing CCSM, CTU researchers drew the following conclusions:

As discussed in Enterprise Best Practices for Cryptocurrency Adoption, wallet security is the most pivotal aspect to keeping funds secure. Implementing the practices outlined in that publication will mitigate most, if not all, of the current threats to cryptocurrency wallets.

Appendix

Table 1 lists the most commonly observed malicious filenames in the CTU research team's sample set.

Table 1. Common filenames in malware samples.

Endnotes

[i] Bitcoin (capitalized) refers to the protocol, software, and community, while bitcoins (lowercase) are currency units.

Excerpt from:
Cryptocurrency-Stealing Malware Landscape - Dell SecureWorks

Read More..

Comparison of crowdfunding services – Wikipedia, the free …

Crowdfunding is a process in which individuals pool money and other resources to fund projects initiated by other people or organizations. Crowdfunded projects may include creative works, products, nonprofit organizations, supporting entrepreneurship, businesses, or donations for a specific purpose (e.g., to pay for a medical procedure). Crowdfunding usually takes place via an online portal that handles the financial transactions involved, and may also provide services such as media hosting, social networking, and facilitating contact with contributors.

Crowdfunding is donation-based fundraising for businesses or creative projects, typically via an online funding portal. Some but not all crowdfunding projects offer contributors rewards, which may differ based on the amount of money donated. Rewards can include copies of a creative work, products created with the funding, special or personalized incentives (such as autographed works or promotional merchandise), or public recognition.

In equity crowdfunding, a crowdfunding approach is used to raise investment capital and contributors receive equity in the resulting business. Contributors may act as investors and receive shares directly, or the crowdfunding service may act as a nominated agent.[1]

There are two basic models provided for some sites offer a choice between them:

Some services invite people to donate to projects for the pleasure of giving. Philanthropy based services usually have other benefits such as tax credits or rebates.

Crowd funding can be used to raise capital (equity) or borrow money. While organized informally, they typically involve large numbers of small investors or lenders:

Some services allow for a continuous funding model as opposed to a one-time donation. These tend to apply to, but are not limited to, art projects such as music, YouTube videos, podcasts, web-comics, etc. anyone who makes content on a regular basis. They differ mainly in the frequency in which payments are charged to the funders.

Some services invite people to award creators after they already published their work.

Read this article:
Comparison of crowdfunding services - Wikipedia, the free ...

Read More..

bitaddress.org

Open Source JavaScript Client-Side Bitcoin Wallet Generator

Private Key (Wallet Import Format)

SECRET

A Bitcoin wallet is as simple as a single pairing of a Bitcoin address with its corresponding Bitcoin private key. Such a wallet has been generated for you in your web browser and is displayed above.

To safeguard this wallet you must print or otherwise record the Bitcoin address and private key. It is important to make a backup copy of the private key and store it in a safe location. This site does not have knowledge of your private key. If you are familiar with PGP you can download this all-in-one HTML page and check that you have an authentic version from the author of this site by matching the SHA256 hash of this HTML with the SHA256 hash available in the signed version history document linked on the footer of this site. If you leave/refresh the site or press the "Generate New Address" button then a new private key will be generated and the previously displayed private key will not be retrievable. Your Bitcoin private key should be kept a secret. Whomever you share the private key with has access to spend all the bitcoins associated with that address. If you print your wallet then store it in a zip lock bag to keep it safe from water. Treat a paper wallet like cash.

Add funds to this wallet by instructing others to send bitcoins to your Bitcoin address.

Check your balance by going to blockchain.info or blockexplorer.com and entering your Bitcoin address.

Spend your bitcoins by going to blockchain.info and sweep the full balance of your private key into your account at their website. You can also spend your funds by downloading one of the popular bitcoin p2p clients and importing your private key to the p2p client wallet. Keep in mind when you import your single key to a bitcoin p2p client and spend funds your key will be bundled with other private keys in the p2p client wallet. When you perform a transaction your change will be sent to another bitcoin address within the p2p client wallet. You must then backup the p2p client wallet and keep it safe as your remaining bitcoins will be stored there. Satoshi advised that one should never delete a wallet.

Comma Separated Values: Index,Address,Private Key (WIF)

The traditional approach to accepting bitcoins on your website requires that you install the official bitcoin client daemon ("bitcoind"). Many website hosting packages don't support installing the bitcoin daemon. Also, running the bitcoin daemon on your web server means your private keys are hosted on the server and could get stolen if your web server is hacked. When using a Bulk Wallet you can upload only the bitcoin addresses and not the private keys to your web server. Then you don't have to worry about your bitcoin wallet being stolen if your web server is hacked.

Unconfirmed transactions can be viewed at: http://blockchain.info/ You should see the transaction there within 30 seconds.

Private Key (Wallet Import Format):

Copy and paste the above into the Your-Part-Public-Key field in the Vanity Pool Website.

Copy and paste the above Private Key field into a text file. Ideally save to an encrypted drive. You will need this to retrieve the Bitcoin Private Key once the Pool has found your prefix.

The above is your new address that should include your required prefix.

The above is the Public Key in hexadecimal format.

The above is the Private Key to load into your wallet.

Bitcoin v0.6+ stores public keys in compressed format. The client now also supports import and export of private keys with importprivkey/dumpprivkey. The format of the exported private key is determined by whether the address was generated in an old or new wallet.

Public Key (130 characters [0-9A-F]):

Public Key (compressed, 66 characters [0-9A-F]):

Private Key Hexadecimal Format (64 characters [0-9A-F]):

Private Key Base64 (44 characters):

Private Key Mini Format (22, 26 or 30 characters, starts with an 'S'):

Private Key Base6 Format (99 characters [0-5]):

Private Key BIP38 Format (58 characters base58, starts with '6P'):

An important part of creating a Bitcoin wallet is ensuring the random numbers used to create the wallet are truly random. Physical randomness is better than computer generated pseudo-randomness. The easiest way to generate physical randomness is with dice. To create a Bitcoin private key you only need one six sided die which you roll 99 times. Stopping each time to record the value of the die. When recording the values follow these rules: 1=1, 2=2, 3=3, 4=4, 5=5, 6=0. By doing this you are recording the big random number, your private key, in B6 or base 6 format. You can then enter the 99 character base 6 private key into the text field above and click View Details. You will then see the Bitcoin address associated with your private key. You should also make note of your private key in WIF format since it is more widely used.

Excerpt from:
bitaddress.org

Read More..

Concept:Cloud Computing – Wikinvest

Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing data storage, processing and bandwidth.

A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. All you need is just an internet connection and you can start sending emails. The server and email management software is all on the cloud ( internet) and is totally managed by the cloud service provider Yahoo , Google etc. The consumer gets to use the software alone and enjoy the benefits. The analogy is , 'If you need milk , would you buy a cow?' All the users or consumers need is to get the benefits of using the software or hardware of the computer like sending emails etc. Just to get this benefit (milk) why should a consumer buy a (cow) software /hardware?

Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world. In June 2011, a study conducted by V1 found that 91% of senior IT professionals actually don't know what cloud computing is and two-thirds of senior finance professionals are clear by the concept,[1] highlighting the young nature of the technology. In Sept 2011, an Aberdeen Group study found that disciplined companies achieved on average an 68% increase in their IT expense because cloud computing and only a 10% reduction in data center power costs.[2]

Community cloud shares infrastructure between several organizations from a specific community with common concerns , whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than that of a private) to realize its cost saving potential.

A public cloud is established where several organizations have similar requirements and seek to share infrastructure so as to appliance. In addition, it can be economically attractive as the resources (storage, workstations) utilized and shared in the community are already exploited.

This is the cloud computing model where service providers make their computing resources available online for the public. It allows the users to access various important resources on cloud, such as:Software, Applications or Stored data. On of the prime benefits of using public cloud is that the users are emancipated from performing certain important tasks on their computing machines that they cannot get away with otherwise, these include:Installation of resources, their configuration; and Storage.

For obvious reasons, public cloud is bound to offer a multitude of benefits for its users, which can be sensed by its ubiquitous demand. Some of the most important ones are mentioned here:

A paradigm shift to cloud computing will affect many different sub-categories in computer industry such as software companies, internet service providers (ISPs) and hardware manufacturers. While it is relatively easy to see how the main software and internet companies will be affected by such a shift in Ginger's chunky nuggets, it is more difficult to predict how companies in the internet and hardware sectors will be affected. Most of the major companies have launched their product. IBM launched their new SmartCloud data center in Japan in 2011.

Cloud Computing ideal as a Disaster Recovery solution?[6]

See the article here:
Concept:Cloud Computing - Wikinvest

Read More..

Cloud computing | Define Cloud computing at Dictionary.com

Contemporary Examples

cloud computing makes it more difficult for a forensic investigation.

But nobody has yet delivered a cloud computing system that is glitch free.

"cloud computing" really captured the imagination and became the common name before the technology was even all that common.

Tablets and cloud computing have reshaped the information industry.

To be sure, Apple has been doing a form of cloud computing with its MobileMe service.

British Dictionary definitions for cloud computing Expand

a model of computer use in which services stored on the internet are provided to users on a temporary basis

Contemporary definitions for cloud computing Expand

noun

a type of computing based on sharing computing resources rather than having local servers or personal devices to handle applications

Examples

Cloud computing has started to obtain mass appeal in corporate data centers as it enables the data center to operate like the Internet.

cloud computing in Technology Expand

architecture A loosely defined term for any system providing access via the Internet to processing power, storage, software or other computing services, often via a web browser. Typically these services will be rented from an external company that hosts and manages them. (2009-04-21)

View original post here:
Cloud computing | Define Cloud computing at Dictionary.com

Read More..

Cloud Security Services – Cloud Computing Technology – Trend …

What you can expect from a trusted leader in security

With our threat defense experts focused on your digital security, you can count on having a safer place for your digital informationwhether its on a mobile device, on your network, in the data center, in the cloud, at work, or at home.

By safeguarding your information, we give you the confidence to work and play in the digital world. From business security solutions to software for online security at home, weve helped people and companies protect their valuable information from hackers and the evolving threat landscape for over 25 years. From the endpoint to the network to the cloud, we never stop looking for new ways to protect you from current and emerging threats.

Learn more about Trend Micro

From large organizations to home sweet home, Trend Micro has what you need to secure your digital information with smart, simple security that fits.

Trend Micro solutions for your enterprise or medium-sized business provide layered security with centralized visibility and control to protect information on mobile devices, endpoints, gateways, servers, and public cloud environments. Trend Micro delivers smart protection of information with innovative security solutions that are simple to deploy and manage. So you can have security that fits your evolving ecosystem.

Small businesses are fast at adapting to innovation and change, but often have limited resources for online security. This makes you more vulnerable to cyber threats than larger enterprises with dedicated security teams. We help you create a safer business with security solutions that protect your employees anywhere, anytime, and on any device. So you can focus on your business.

Your home is where your personal and digital lives intersect. This means now its more important than ever to have strong online security that is comprehensive and easy to use. Ranked by NSS Labs as having the highest threat-blocking rate and the fastest time to protection, Trend Micro safeguards your Mac, PC, and mobile devices against current and emerging threats. So you can enjoy your digital life safely.

Since 2009, IDC has ranked Trend Micro as the global market leader in server security (*IDC, Worldwide Corporate Endpoint Server Security Research, 2009-2013, market share based on revenue). Our Cloud and Data Center Security supports physical, virtual, and cloud environments so you can manage your data security as it moves from the data center to the cloud.

NSS Labs ranked our Custom Defense solution: most effective recommended breach detection system" for protecting your network from targeted attacks and advanced threats. And InfoTech named Trend Micro a Champion in endpoint security, making our Complete User Protection solution simply the best endpoint protection available.

Read more:
Cloud Security Services - Cloud Computing Technology - Trend ...

Read More..

cloud computing – cloud computing and more

2014 cloud computing had broadly, the acceptance of the technology companies. Nearly 60% of small and medium companies said they use cloud services, while 72% of them use it for their servers. For this half of 2015, further growth of cloud technology for all fronts, including infrastructure, software with personalized service and security policy is Continue Reading

Cloud computing is here to stay. More and more users move their data to an online server, and back up their files in the cloud instead of making physical copies. Space limitations GB dwindle and low price. Competition is so easy to find a piece of free cloud.

Remember that the Cloud Computing is an Internet-based computer system and remote data centers to manage information services and applications. Cloud computing allows consumers and businesses use to manage files and applications without installing them on any computer with Internet access. This technology offers a much more efficient use of resources such as storage, memory, Continue Reading

The cloud computing concept also known under the terms cloud services, cloud computing, cloud computing or cloud concepts, English cloud computing is a paradigm that can offer computing services over the Internet. Since it was aware of this new paradigm, criticism around it have referred to the issue of security and privacy of data users Continue Reading

The amount of information currently generated by organizations makes it difficult local management of all data, to which should be added the need for employees to have access to this information from anywhere in the world and at any time. These circumstances have created that cloud computing has grown exponentially and service providers are implementing Continue Reading

Cloud computing is fraught with security risks, according to analyst firm Gartner. smart clients make you tough questions and consider getting a security assessment from a neutral third party before committing to a cloud vendor, Gartner says in the June report entitled Assessing the Security Risks of Cloud Computing.

This video shows the advantages of Cloud Computing. You can watch why the Cloud is the best form of computing:

Today in Cloud Computing speak about cloud types. Various types of cloud depending on the needs of each company, the service delivery model and the implementation of the same, but there are basically three groups:

In 1961, Professor John McCarthy (MIT, Stanford) introduces the concept of cloud computing as a service, like electricity, water, gas and others. However, at that time the technology did not allow that this concept was widely adopted as a general purpose computer and disappeared for a while.

Today clients communicate more directly, are much more resourceful and demanding about the services they receive. This scenario has led to MSMEs to implement technological solutions and mechanisms that allow them to survive and remain in an increasingly competitive market. This is where the topic of cloud computing (cloud computing) plays a crucial role in Continue Reading

Link:
cloud computing - cloud computing and more

Read More..

The Bitcoin Foundation | Supporting the development of Bitcoin

Welcome to the new and under construction website for the Bitcoin Foundation.

Weve undergone a migration from the old site.

What we had: An overly complex and non-functioning site spread accross 8 servers and two hosting companies. The ambitious aim had been to have integration with Lighthouse, ERIS, community building apps and other features. This was well intentioned by those who worked on it but not as functional as it should be.

We we have now Weve migrated everything over to one, straightforward server. The new system will allow much easier updates and the easy ability for committee chairs, board members, staff and others to make updates and create pages.

Current status The old site at Rackspace was not functioning and Rackpsace does not provide support so we made the decision to move to the new site rather than fix the old one before moving. So right now this site is UNDER CONSTRUCTION the forums still need to be migrated and activated, there might be some floating lorum ipsum text or a non functional donate button but this format is the general format of the new site.

We should have the member section, forums and other features ironed out by weeks end.

Thank you!

See the rest here:
The Bitcoin Foundation | Supporting the development of Bitcoin

Read More..

Everything you need to know about Bitcoin mining What is …

Currently, based on (1) price per hash and (2) electrical efficiency the best Bitcoin miner options are:

Manufacturer

$474.97

$499.97

$33.87

Bitcoin mining is the process of adding transaction records to Bitcoin's public ledger of past transactions or blockchain. This ledger of past transactions is called the block chain as it is a chain of blocks. The block chain serves to confirm transactions to the rest of the network as having taken place.

Bitcoin nodes use the block chain to distinguish legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere.

Bitcoin mining is intentionally designed to be resource-intensive and difficult so that the number of blocks found each day by miners remains steady. Individual blocks must contain a proof of work to be considered valid. This proof of work is verified by other Bitcoin nodes each time they receive a block. Bitcoin uses the hashcash proof-of-work function.

The primary purpose of mining is to allow Bitcoin nodes to reach a secure, tamper-resistant consensus. Mining is also the mechanism used to introduce Bitcoins into the system: Miners are paid any transaction fees as well as a "subsidy" of newly created coins.

This both serves the purpose of disseminating new coins in a decentralized manner as well as motivating people to provide security for the system.

Bitcoin mining is so called because it resembles the mining of other commodities: it requires exertion and it slowly makes new currency available at a rate that resembles the rate at which commodities like gold are mined from the ground.

A proof of work is a piece of data which was difficult (costly, time-consuming) to produce so as to satisfy certain requirements. It must be trivial to check whether data satisfies said requirements.

Producing a proof of work can be a random process with low probability, so that a lot of trial and error is required on average before a valid proof of work is generated. Bitcoin uses the Hashcash proof of work.

Bitcoin mining a block is difficult because the SHA-256 hash of a block's header must be lower than or equal to the target in order for the block to be accepted by the network.

This problem can be simplified for explanation purposes: The hash of a block must start with a certain number of zeros. The probability of calculating a hash that starts with many zeros is very low, therefore many attempts must be made. In order to generate a new hash each round, a nonce is incremented. See Proof of work for more information.

The Bitcoin mining network difficulty is the measure of how difficult it is to find a new block compared to the easiest it can ever be. It is recalculated every 2016 blocks to a value such that the previous 2016 blocks would have been generated in exactly two weeks had everyone been mining at this difficulty. This will yield, on average, one block every ten minutes.

As more miners join, the rate of block creation will go up. As the rate of block generation goes up, the difficulty rises to compensate which will push the rate of block creation back down. Any blocks released by malicious miners that do not meet the required difficulty target will simply be rejected by everyone on the network and thus will be worthless.

When a block is discovered, the discoverer may award themselves a certain number of bitcoins, which is agreed-upon by everyone in the network. Currently this bounty is 25 bitcoins; this value will halve every 210,000 blocks. See Controlled Currency Supply.

Additionally, the miner is awarded the fees paid by users sending transactions. The fee is an incentive for the miner to include the transaction in their block. In the future, as the number of new bitcoins miners are allowed to create in each block dwindles, the fees will make up a much more important percentage of mining income.

View post:
Everything you need to know about Bitcoin mining What is ...

Read More..