Contacts

Requests permission to use your computing power. How to sell the resources of your computer. What you need to work

14:47 31.10.2017

When entering the site of the Minsk Time Plant "Light", the user began to see not quite ordinary message. "Luch. byrequests permission to use your computing power"," It says.

And further decodes: you can support the site, allowing you to use your processor for calculations. Calculations are performed in a secure isolated browser software. "You do not need to install anything," the text assures.

Also, the authors of the message warn: if the user came to the site with mobile deviceThis can lead to a quick battery discharge. Under the text, the visitor is invited to click on one of the two buttons: "Allow" and "Cancel".

When clicking on the first version, the site starts uploading a 100 percent computer computer processor. When clicking on the second message disappears, but then still stubbornly appears when entering other pages.

As told on the factory itself, the message appeared on the site is not the initiative of its employees, but most likely the work of the virus. Now programmers are already dealing with the problem.

Recall, the processor of your computer can really

The site browser found out how to use the "sleeping" computer resources - hardware and networks - so that they are not idle without affairs.

A significant part of the computer resources is often idle - the owner goes away to brew tea or participates in plates; I bought a "gaming laptop", and the time for the third month only enough to work; Deployed a small farm of video cards, but they threw a matery or rendering - yes, you never know what else.

To bookmarks

Why do it

Unused computing power can be needed to someone else - neighbor local networkwhich is engaged in three-dimensional modeling; scientists in small scientific centers that have no supercomputers, and only volunteer resources are available; Enthusiasts engaged in the search for extraterrestrial life. And they really need a hacker, creating a "zombie network" for the organization of DDoS attack, but about it separately.

The ideological foundations of distributed computing were laid for a long time. The first experience of appealing to the resources of "idle" devices is as early as 1973, when the two employees of the Xerox Parc research center - John Happ and John Shoch - wrote a program that at night was calculated on computers connected to the local network of the center.

Twenty years later, in 1993, Eric Schmidt, who was then worked at Sun Microsystems, said: "When the network becomes such a fast-acting, as a processor, the computer will cease to exist, it will spread over the network." This thought formed the basis of concepts cloud services And Grids, when interacting with which the user no longer matters, how quickly its device works, but it matters only the bandwidth of the channel.

But Cloud Computing is centralized and focusing computing on the side of the owners of the server owners. There is another path that allows individual users to be united to solve global tasks, not including these processes large corporations.

A year after Schmidt's speech, the idea of \u200b\u200ba project of voluntary distributed computing, which eventually became the most famous of them - [Email Protected]I search for signals from extraterrestrial civilizations.

The idea to abandon the concentration of computing capacities in one place has an important advantage over supercomputers - distributed systems have the potential for unlimited increases for their productivity due to free scaling.

No less important to understand the importance of voluntary computing and metacomputeting ideas of crowdsourcing and Utility Computing. At the heart of the UC is the idea that the ability to refer to remote resources that users are willing to share each other can significantly increase the overall productivity of computers in the world.

For example, David Anderson - Chapter [Email Protected] - Sees in the development of distributed computing the possibility of creating the fact that he calls "World Operating System Based on the Internet" - Internet-Scale Operating System (ISOS), in which users will be able not only to share their resources, but also to make money on it.

At the same time, distributed calculations are not a horizontal structure, in contrast to, for example, P2P. There is a certain hierarchy and subordination with common great tasks, on which users send their resources.

How to take a "sleep" computer

Participation in voluntary calculations is not the only way to "fully" use its computing power.

You can simply dial torrents with bibliographic raritets or old games and actively distribute them, fight for the ideas of free distribution of content, participating in the P2P transmission of content, pass their resources for rent or the Maja is cryptocurrencies where it is allowed.

Even if you are confident in your law-abnormality, it is also not to do without pitfalls here - for example, in March 2015, one of the updates μTorrent installed the Epic Scale software on the computers, without the knowledge of the owner of the bitcoinine mining. In Russia, it should be careful and follow the legislation and law enforcement.

Any freely idle resources are interested in hackers creating a "zombie network". On the other hand, there are also a number of projects using DDoS attacks as a form of acts of civil disobedience, when users on their own initiative provided their resources to create artificial loads on certain sites.

Projects of voluntary calculations

There are quite a lot of them. The part is organized at a fully voluntary basis, part offers participants financial promotion in one form or another, some created around themselves a powerful community, competing "who more needs", while others are focused on the fact that their tasks are attractive thanks to their meaning for humanity .

Today, most of the voluntary computing projects focuses on the boinc-software complex, which allows researchers from around the world to contact the resources that volunteers provide.

Boinc Crosplain, relatively simple in the setup, and requires minimal attention from the user. Its client launches "under the screensaver" and does not touch the resources that the owner itself, turning only to free (or, if you configure it differently, to those that he has been allocated).

For six years, the integral performance of projects on boinc increased from 5.2 Petaflops to 28.7, leaving far behind the peak performance indicators of the most powerful world supercomputers (for example, the Japanese "K Computer" processes 8.16 PETAFLOPS data).

Main BOINC projects

Guide to protect against hidden mining Bitcoin and other cryptocurrency.

Hidden

Hidden mining is gaining momentum that it cannot but cause certain concerns of users of personal computers. Brand recently, we wrote that hidden miners flooded almost the entire Internet. They do not hide them, scammers embed the scripts of web miners into the code of absolutely any websites: fromgovernment portals to the tailpornographic sites!

Each time, attending a particular website, you risk becoming a victim of intruders who want to start the computing capacity of your computer for mining virtual currencies, such asBitcoin.andMonero.In this article we will tell you how you can protect yourself and your computer from the "pest."

Hidden mining virtual currencies - an excellent way to get a decent profit with minimal effort (subject to availability good equipment, favorable tariff On electricity and growing course cryptocurrencies that you Major). Such activities can become an excellent alternative source of income, and some websites (and people with more dishonest intentions) are happy to enjoy such a tempting opportunity.

For example, Salon.com's website provides its visitors the opportunity to abandon advertising in exchange to allow the site to use the computing power of their processors for MoneRo cryptocurrency mining. It is worth noting that Monero is a virtual currency that much easier to the Majae than Bitcoin; The current cumulative market capitalization of this cryptocurrency is 4.6 billion US dollars.

Of course, it is worth an attractive option to make a legitimate way to earn good money as this option begins to "manham" unclean on the hand of people.

Malwarebytes Corporation, engaged in the development of antivirus software, as well as IT security issues, ESET, have repeatedly warned about the hidden use of JavaScript files that steal the computing power processors of website visitor websites for mining cryptocurrency without their knowledge (or their permission). A similar "criminal scheme" can be checked using the malicious software installed on the user's computer, or the unnecessary JavaScript file, which works in background mode Or in the pop-up mode mode, which allows you to continue to extract virtual currencies even after closing the browser.

If you do not know how to determine whether the computing power of your computer is "non-prescribed" without your knowledge or not, then you should certainly familiarize yourself with this article. And if suddenly it really is how you can stop this process and secure yourself in the future? In this article, we will introduce you to four ways that will save the computing power of your computer from the attacks of hidden miners.

Do I need to block hidden cryptocurrency miners?

To the question of whether you should allow the websites to use the computing power of your computer for mining cryptocolut, there is no single answer, it all depends on your desire and point of view. In most cases, it is absolutely safe, but it is worth noting, such "activity" cannot but affect the performance of your computer. But the main problem is how to ethically use other people's computing capacities in their own interests, not by their direct intended purpose.

When the website is absolutely honest in front of your visitors and does not hide that he is engaged in the web mining cryptocurrency, you can absolutely quietly visit a similar site and maintain its content or services, allowing it to use your computing power. This is an excellent compromise for those who are not a special advertising lover.

However, even though it will not cause any harm to your personal computer to the web mining, it can still significantly affect the performance of your computer (and his time autonomous work), as well as (albeit slightly) increase your account for electricity. If you understand this, you have nothing against and give your consent, then there are no problems. But when websites decide to do this without your knowledge, in the background, it is already becoming unethical.

How to prohibit websites secretly Main Cryptovalts using the computing power of your processor?

We will proceed from the assumption that malware has no malware for hidden mining cryptocurrency on your computer. In this case, you have several options, how to prohibit the websites of Major Cretatovatovat on your personal Computer Without your consent.

DisableJavascript.on certain sites

If you have suspicions that some specific website uses the computing power of your computer for mining cryptocurrency without your permission, you can simply completely block JavaScript.

This option is definitely not ideal and not devastable. The problem in this case is that this is a very aggressive way to block the work of the web, which can affect the work of many websites. For example, the site is social facebook network Not loaded without javascript enabled.

Blocks Web miners cryptocurrency

If you do not want to use the ad blocker or simply want to block exclusively web miners, then here's a list of available blocks of web miners cryptocurrency:

  • No coin (for Chrome, Firefox, Opera);
  • minerblock (for Chrome, Firefox, Opera web browsers);
  • Anti Miner (for Chrome web browsers);
  • Coin-Hive Blocker (for Chrome Web Browser).

These blockers "make their own" by entering a blacklist of well-known domains and mining scripts. This option is very convenient and provides a number of advantages compared to other alternatives. On the one hand, these blockers regularly update their databases and are one of the best options to solve the problem of hidden mining virtual currencies. On the other hand, if you want to "support" the website, allow him to resolve cryptocurrency to him with your computing power, then you can simply transfer this site from the black list to white.

Antivirus software

While browsers are not yet adapted to block the mining scripts (or at least cannot do so that this "function" is included only according to your consent), some antivirus programs Can help you solve the problem of hidden miners cryptocurrency. MalwareBytes software software, for example, offers the option of blocking web miners virtual currencies in its premium subscription.

You are equipped with a computer daily to work, watch a movie, chat in Facebook, Polystay News Tape in Vkontakte or read electronic book. In this case, part of the resources of the desktop is not used. And periodically it is just worth in active mode, buzzing, drives dust and consumes electricity. And you can make the PC at this time earn money. How? About one way you will learn after 3 minutes.

Processing: what is it and where he came from

Processing (from English. To Process - Calculate) is processing of data using a computer power. The prerequisite for its occurrence was the problem of the growth of information with limited resource opportunities for its collection, analysis and systematization. To work with large amounts of information, powerful and expensive servers are required. Their purchase, rental and content are a tangible blow to the budget. Not every company is capable of carrying such costs.

With such difficulties at the end of the last century, individual private and government organizations in the United States were encountered. As a result, an unprecedented solution was proposed - to draw to the processing of corporate data "labor force" from the outside.

The implementation of the idea was possible due to the development of the Internet and the multi-million6 army of its users. The bulk task is divided into small fragments and is distributed between the participants of the computer network. This method of performing complex calculations is much cheaper and simple from a technical point of view.

Where does the processing applied?

John Shoch and John Happ from the Research Center Xerox Parc (California) are pioneers in the field of processing. In 1973, the guys wrote a program that at night was connected to the local PARC network and forced working computers to perform mathematical operations. Massacing this approach acquired in 1994, and since then it is improved and popularizes.

Today, distributed calculations are used in various industries:

  • scientific research,
  • creating games
  • rendering of architectural projects,
  • human genome processing,
  • space Study
  • physics,
  • astronomy,
  • biology and others.

How is the processing network?

The computing system consists of separate PCs running the distributed operating system. Elements cooperate with each other to efficiently use network resources. Separate machines can work on several or only one OS. For example, all desktops use UNIX platform. But the option is more realistic when computers have different software complexes: one part functions running NetWare, the second - under Windows NT, the third is under Linux, the rest is under Windows 10.

Operating systems act independently of each other. That is, each of them independently makes decisions on the creation and completion of internal processes and managing local resources. But in any case, a set of mutually agreed protocols is necessary. They serve to organize communication processes running on ordinary machines, and distribution of power resources between individual users.

How to get income due to PC capacities?

Earnings on system block Does not require additional investments, and the money "drip" automatically, without the participation of the user. All that you need is an advanced (preferably) computer and access to the web.

To engage in such a fishery, you must pass four steps:

1) register on the company's website, which specializes in processing;

2) download and install a special software that will send the computing power of your car to the right track;

3) open a PayPal or WebMoney web wallet (payment is carried out mainly by Western companies and in electronic currency);

4) Run desktop and log in.

The rest of the program will do it yourself.

What processing project to choose?

Briefly focus on the working resources that offer to make money on processing. Examples are:

  • Gomezpeerzone,
  • WMZONA,
  • Minergate
  • Ltcraft,
  • UseRator.

Most projects are open to citizens of any states. It does not matter which method of connecting to the Internet (Dial-Up, ISDN-Connection, DSL, etc.) is applied.

As the developers declare, the use of partner computers is carried out for the purpose of research bandwidth Online channels, checks for errors of browser codes, sites and other software in the worldwide network.

During application installation, you must enter the username and the name of the desktop. It is necessary to do it very carefully that the money earned has been listed for their intended purpose.

How much can you earn?

The financial side of the question looks not too attractive. In other words, the state will not work. But also a small earnings serves a pleasant bonus, because practically nothing will have to do.

One day of work - 10 cents;

1 dollar for each active referral within the affiliate program;

The minimum payment of the month is 5 dollars;

Maximum output amount - 45 USD.

Distributed oS They combine tens of thousands of people from different parts of the Earth. The most active were able to kill several thousand dollars. But as long as the amount on the account of the absolute leader is expressed only by a four-digit number.

Advantages and disadvantages of processing

Finally, let's talk about the "pluses" and "minuses". Advantages are as follows:

  • The artist does not require any complex actions or special skills.
  • Free work schedule: You turn on the program when there is time and desire.

Disadvantages are expressed in three moments:

  • Some programs are "dragging" too much computer resources, which causes his hang and slow motion.
  • There is a danger to pick up the virus during the connection to the remote server.
  • Modest payment.

The nuances discussed. And the final choice is yours.

As you know, competition is an engine for the development of any industry, providing the most efficient allocation of resources. Perfect competition in the modern world has been preserved, perhaps, only in one place - on the stock exchanges.

About what is the stock exchange and what it is different from the usual market, a lot has told a lot on Habré. Read, for example, a series of articles IPO for dummies. I note only that the stock exchange comes in a standardized product, buyers and sellers compete only at a price.

The goods on the stock exchange may be anything: grain, metals, currency, securities, etc. In the form of an exchange, as the most just and convenient, trade with SEO links, banner shows, e-currency. So why not trade in what is based on the IT industry - computational resources.

What will be accepted for the unit of goods? Here are several options. This may be one floating point operation (1 FLOP). Then the process of selling computing resources will look like this: the seller provides the client some virtual implementation environment, in which a certain amount of memory is available, the processor core, possibly video card resources. In this case, there is an interface through which the source data is downloaded and the results of the calculations are returned. Calculations can follow any algorithm recorded in the form of assembler commands. Another option involves a larger unit of trade, for example, 1 HASH. That is, the algorithm for which hash will be considered, toughly asked for the clients of the exchange. Only data for calculations and results are changing. This does not mean that the client will have to transmit great amount information. After all, 1 lot on the stock exchange can be 1 mhash, the source data is transmitted as a range of values, and the result reports whether a certain sample string is found among the calculated haze. This is enough, for example, to implement the mining of those very Bitcoin.

The question arises here: what will the computing network constructed the competition and, for example, the Bitcoin network? The answer may be like this: a broader concept does not contradict narrower, but includes it in itself, takes into account as a special case. Thus, if the course in the global computing network is low, which will make it profitable to the Mainage Bitcoin-s, there will be several effects that restore the balance. First, the growth in demand for calculating in the global computing network will lead to an increase in the course, secondly, the increase in the BitCoIn-s offer will lead to a drop in the cost of coins, and, thirdly, a purely technical mechanism provided for by the Bitcoin network will increase network complexity And for mining, more computational resources will be required. And what if the course in the global computing network will be such that the Maine Bitcoin-s will not benefit? It will mean only one thing: new, more interesting projects have appeared, and all switched their resources on them. The same applies to the existing AWS, which, unlike the proposed model, is a simple auction in which only buyers compete, and the seller is only Amazon.

Thus, the economically proposed system is sustainable and dynamic. However, there may be two more problems that have a socio-ethical character.

The first is that the created system can be used by attackers for selection of passwords, RSA keys, etc. But world practice shows that the presence of only the possibility of unlawful use of any system cannot be a reason for refusing its development. After all, there are hosting on the Internet, dedicated servers, etc. Their administrators control the use of their resources. And the proposed distributed computing network Just pretends to absolute decentralization and anonymity. The Exchange is an intermediary for transactions and can check the good faith of participants.

The second ethical problem is that the material benefit can replace those who participated in free projects of distributed computing, such as [Email Protected], Boinc, [Email Protected] et al. But, on the other hand, some of these projects have dubious benefits. At the same time, there are many examples in history when purely commercial projects continued to benefit society.



Did you like the article? Share it