Sponsored Content
Full Discussion: Bitcoin
The Lounge What is on Your Mind? Bitcoin Post 302531773 by KenJackson on Friday 17th of June 2011 09:37:44 PM
Old 06-17-2011
Quote:
Originally Posted by alister
Nothing validates the worth of a new currency like theft Smilie
You have a smiley there, and you're almost quoting one of those articles, but I hope you're not saying that tongue in cheek. There's some wisdom in your words. If bitcoins had no value, why would someone go to the effort of targeting them?

In fact, if I had thought it through, I should have been suspicious of them if no one was bothering to try to steal them. And, hey, no security is perfect, so there will be some thefts. The victim was storing them on Windows, for crying out loud!

Also, the possibility that someone had half a million dollars in bitcoins says an awful lot.

In fact, I'm starting to get more interested.


As for security there's almost a separate, more general, issue here. The second story you referenced said this:
Quote:
The malware, Infostealer.Coinbit, is fairly simple: it targets Windows machines and zeroes in on the standard file location for a Bitcoin wallet.
There are two very instructive things in that sentence about security in general:
  1. It targets Windows machines, and
  2. It looks for people doing things the standard way.
The lessons, if not obvious, are
  1. Don't use Windows (especially to protect your savings), and
  2. Don't accept defaults or do things in predictable, standard ways.
These 2 Users Gave Thanks to KenJackson For This Post:
 
AFS(5)								AFS File Reference							    AFS(5)

NAME
afs - Introduction to AFS files DESCRIPTION
A number of files must reside on the local disk of AFS server and client machines. They belong to the following general categories: o Configuration files define configuration parameters for specific server and kernel processes such as the Backup System Tape Coordinator or the Cache Manager. o Administrative files list information used in administration of server machines, such as a list of privileged users or server encryption keys. o Cache-related files contain cached data or information about cached data, on client machines. o Log files contain tracing messages about the operation of a specific process. o Database files contain database records used to administer the AFS cell. o Controller files control the behavior of a process. o Volume header files represent AFS volumes on server partitions. For a description of the format and contents of each file, see its reference page. Note for Windows users: Some files described in this document possibly do not exist on machines that run a Windows operating system. Also, Windows uses a backslash ("") rather than a forward slash ("/") to separate the elements in a pathname. SEE ALSO
Configuration files: BosConfig(5) CellServDB(5) NetInfo(5) NetRestrict(5) ThisCell(5) butc(5) cacheinfo(5) krb.conf(5) package(5) sysid(5) tapeconfig(5) uss(5) uss_bulk(5) Administrative files: KeyFile(5) UserList(5) Cache-related files: afs_cache(5) Log files: AuthLog(5) BackupLog(5) BosLog(5) FileLog(5) SalvageLog(5) VLLog(5) VolserLog(5) butc(5) fms.log(5) Database files: bdb.DB0(5) kaserver.DB0(5) kaserverauxdb(5) prdb.DB0(5) vldb.DB0(5) Controller files: FORCESALVAGE(5) NoAuth(5) SALVAGE.fs(5) salvage.lock(5) Volume header files: afs_volume_header(5) COPYRIGHT
IBM Corporation 2000. <http://www.ibm.com/> All Rights Reserved. This documentation is covered by the IBM Public License Version 1.0. It was converted from HTML to POD by software written by Chas Williams and Russ Allbery, based on work by Alf Wachsmann and Elizabeth Cassell. OpenAFS 2012-03-26 AFS(5)
All times are GMT -4. The time now is 09:29 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy