How to determine whether you became a victim of secret mining?

03 October 2017, 10:56 | Technologies
photo InternetUA
Text Size:

Recently, there have been several news that some sites are engaged in crypto-currency mining, using for this purpose the computer power of their visitors. Initially, a message appeared about the famous pirate resource The Pirate Bay, then about the entertainment site Showtime, both sites were secretly engaged from it.

This led to dissatisfaction on the part of users of these sites, and many other users began to worry, and whether they will be using their computer to drop crypto-currencies without their consent when visiting a certain site. There really is such a danger and that's what can be done to avoid it.

Secret Mining For the sake of justice, it should be noted that many users were not so much dissatisfied that the resources from the computer are used for crypto-currency mining, but by the fact that it happens secretly, without their knowledge and consent.

Many actually expressed themselves positively about this method of monetizing sites.

What can be done?.

If you treat those who do not want your computer resources to be used for mining with your consent, then this is what you can do.

Check CPU usage Just by opening the task manager on your computer and looking at CPU usage, you can quickly understand whether someone is stealing your processing power or not.

In addition, if you do not have any active process, but the processor is still too busy, your resources may still be used for mining.

Ad blockers can help Usually, in order for your resources to be used for mining, you need to visit a certain site that uses one of the many scripts for this, but sometimes the mining can be initiated by clicking on an ad.

The use of ad blocker should help to cope with this problem. In addition, the ad blocker also filters out many of the known scripts that are used for the crypto currency. One such script is called Coinhive, and it should be noted that its creators do not consider themselves to be the creators of malicious software.

Coinhive tries to solve the problem of monetizing sites in an alternative way.

The developers of this script publicly spoke against Showtime for using its script without warning of users.

Other malicious programs It should be noted that not only the scripting scripts significantly load the processor, there are other malicious programs that are used for this.

A universal solution for all such problems does not exist, but the first thing you can do is identify the problem. To do this, you just need to check the CPU usage in Task Manager.




Add a comment
:D :lol: :-) ;-) 8) :-| :-* :oops: :sad: :cry: :o :-? :-x :eek: :zzz :P :roll: :sigh:
 Enter the correct answer