Bitcoin Forum
May 28, 2024, 01:05:04 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Miners and antivirus  (Read 272 times)
andy.arden (OP)
Jr. Member
*
Offline Offline

Activity: 40
Merit: 1


View Profile WWW
October 01, 2017, 10:05:02 PM
 #1

Hello, i am new into mining and downloaded a lots of miners on their official links. CCminer, Claymore, CGminer and so on my Bitdefender sees them as trojan, malware viruses and this kind of stuff. I understood that this could mean false positive alerts. I also checked them with Virustotal and the same happened.

I wanted to ask you if there is a possibility that one of this software to really contain something malicious and steal something from my computer. What is the safest software for mining and the most generic one for a gtx 1070 to mine some altcoins?

Hope you can clear this for me. Thank you!
bathrobehero
Legendary
*
Offline Offline

Activity: 2002
Merit: 1051


ICO? Not even once.


View Profile
October 01, 2017, 10:11:39 PM
 #2

You can never be 100% sure to download a miner that doesn't have a malware in it.

But even legit miners are marked as viruses because people used them to secretly mine on other people's computers.


I'd just advise not running mining software on your work computer or computer that has valuable things on it and conversely, don't store anything valuable on your mining rigs.

Not your keys, not your coins!
NameTaken
Hero Member
*****
Offline Offline

Activity: 630
Merit: 502


View Profile
October 01, 2017, 10:15:15 PM
 #3

I run my miners using systemd on Linux. In my systemd service file I have

ProtectSystem=strict
ProtectHome=yes

Quote
ProtectSystem=
Takes a boolean argument or the special values "full" or "strict". If true, mounts the /usr and /boot directories read-only for processes invoked by this unit. If set to "full", the /etc directory is mounted read-only, too. If set to "strict" the entire file system hierarchy is mounted read-only, except for the API file system subtrees /dev, /proc and /sys (protect these directories using PrivateDevices=, ProtectKernelTunables=, ProtectControlGroups=). This setting ensures that any modification of the vendor-supplied operating system (and optionally its configuration, and local mounts) is prohibited for the service. It is recommended to enable this setting for all long-running services, unless they are involved with system updates or need to modify the operating system in other ways.

ProtectHome=
Takes a boolean argument or "read-only". If true, the directories /home, /root and /run/user are made inaccessible and empty for processes invoked by this unit.
makomako
Full Member
***
Offline Offline

Activity: 210
Merit: 100

altcom Aa4DWXQjrcEA8gPBLkx6t9VgCuWoCo1myE


View Profile
October 02, 2017, 02:42:38 AM
 #4

use VM then dump all your miner apps there, if you download the miner from the original souce/github well most likely your safe just beware of those sp's mod miner that you can just download anywhere.

BitcoinDefender
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
October 02, 2017, 03:06:46 AM
 #5

I run my miners using systemd on Linux. In my systemd service file I have

ProtectSystem=strict
ProtectHome=yes

You could use selinux, apparmor, firejail and enforce even stricter rules.


use VM

Try with a benchmark if you can get the same GPU power in your VM than on your real OS. Extremely unlikely.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!