At the end of the day, all of this can go over your head without much danger. Just remember that it’s good to know what you’re dealing with. Bitcoin wallets make use of a fundamental cryptographic principle that we use for things ranging from https for websites or sending anonymous tips to Wikileaks. Most importantly, by understanding private keys you’ll have a much easier familiarizing yourself with Cold Storage wallets.
Controlling and monitoring your mining rig requires dedicated software. Depending on what mining rig you have, you’ll need to find the right software. Many mining pools have their own software, but some don’t. In case you’re not sure which mining software you need, you can find a list of Bitcoin mining software here. Also, if you want to compare different mining software, you can do it here.
In January 2009, the bitcoin network was created when Nakamoto mined the first block of the chain, known as the genesis block. Embedded in the coinbase of this block was the following text: "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks." This note has been interpreted as both a timestamp and a comment on the instability caused by fractional-reserve banking.:18