I know Slackware probably doesn't require too much protection from viruses or spyware, but I'm wondering if there's anything I can do to help protect it (other than Common Sense).
I ask this for 2 reasons:
1. I'm Paranoid
2. Every now and then I mistype a website I go to and it takes me to a completely different website which frightens me because of my paranoia.
So is there anything I can do to help protect Slackware, and in the rare case I get a virus is there a way to remove it directly?
Is it also possible to use Slackware (currently Master drive) to remove a virus on Windows (slave drive)?
I've fedora 11/12 in my desktop in home- some other members in the house also the desktop for various reasons. I noticed that there have been a lot PORNO site visits from the desktop. The computer kinda running slow- Although I tried to scan - avg and f-prot- somehow I don't see theme scanning my pc - so I can't find any kind of spyware or virus- which I think impossible since there have 100 s of visits on those free adult sites and I am sure they would leave some footprints on my machine.
Recently, I've been contacted through AIM by a showgirl who wants me to watch her webcam. I found it very unusual that I was contacted about this, especially through AIM. Now, I don't actively give out my AIM screen name. The only place I am aware of it being posted up is on Facebook, and even I have my privacy on Friends so no one outside my network could see it... and even then my birthday on Facebook is underaged for this scandalous activity.
So I don't believe my screen name was gathered from Facebook in its use in this.Is it possible that I am infected some data mining spyware? How does Ubuntu deal with tracking cookies? I also consider that my screen name was mined from someone else's AIM account by which I was then contacted.
I would like to use Linux in a VMWare Player window within Windows 7 to circumvent spyware infections. Is this a feasable idea or should I just dual boot?
Im a long time windows user and just installed Ubuntu 9.10 and have heard that i dont need any antivirus or spyware program on it, also is the firewall enabled by default if there is one and last thing do you need to do things like disk clean and defrag if so how.
Advised on another forum to install XP pro then Linux on HD. Decided to try it. Not that savy with computers and have a mini-laptop in addition to desktop that was attacked. Virus cause most programs to fail. Disc was nearly full (250GB) so I'm buying a refurbed Seagate (500GB) and need to learn to back up files onto flash drive or something. Lost a lot of photos and emails that were good reference material. Heard a lot about Linux so I'm going to give it a try.
Since it makes Windows apps work there is a possibility that also its viruses will work. I searched and a few sites mentioned such things, but none confirmed this issue.
In Wikipedia, it said this: "Because of Wine's ability to run Windows binary code, concerns have been raised over native Windows viruses and malware affecting Unix-like operating systems. Wine can run much malware, but programs running in Wine are confined to the current user's privileges, restricting some undesirable consequences. This is one reason Wine should never be run as the superuser."
Here is the link.
As far as I know, I cannot install unless I'm a root user, and I keep my Terminal as a root user opened for hours. Also, if I were to install windows apps under Wine, I'll have to log in as a root!
So let me line the questions here:
1- Does Wine activate Windows viruses? 2- Can viruses run on their own while I log in as root in Terminal or while installing apps (whether under Wine or not)?
I am a very new Linux user. My first OS is Fedora 12, which I just recently installed into my laptop. So far, I am thoroughly enjoying it. I do have a question bugging my mind though. Linux systems are known to be very safe from viruses, mainly due to programmers targeting the Windows platform. In Windows, common methods for virus infections are from infected executable files, external drives autorun... ETC.
Now my question is how do viruses spread into a Linux system? And with so few viruses known to exist for Linux systems, do I really need to be aware and take precautions for viruses (For example in Windows, disabling autorun function for external drives)?
How can i do this? I have both clamav and Bitdefender scanner for unices and I need to scan a shared folder, but it seems none of the AV programs understand samba dirs (ie. smb://compname/sharedfolder/)
I read some articles about viruses in Linux and about some antiviruses which work in Linux and delete Windows viruses but I still don't understand: is there any antivirus which specializes in Linux viruses? Even though there are very little of Linux viruses, I know.
I have a dual boot computer. The WindowsXP "side" has been infected with a rootkit virus. So far UBUNTU has not been affected to my knowledge. I have not yet been able to remove the virus from the WindowsXP "side". I am thinking of deleting the NTFS partition and have the computer fully dedicated to UBUNTU.
Now for my question. Is there a possibility that the virus resides in the MBR and that I need to "rebuild" the MBR to actually remove the virus? Even more extreme, should I totally re-install UBUNTU in the name of safety and precaution.
I have postfix setup with amavisd and I tried to send myself an email with the eicar file however it lets the email go through to my inbox. When I restart the amavisd service, there are no errors in the log and it finds all the decoders for different file types and I also see this come up:
Feb 8 14:45:44 Mailgate amavis[3116]: Using primary internal av scanner code for ClamAV-clamd Feb 8 14:45:44 Mailgate amavis[3116]: Found secondary av scanner ClamAV-clamscan at /usr/bin/clamscan
Everything seems to work but it doesn't scan the file for viruses. Also, I've double and triple checked and my amavisd.conf file doesn't have the option enabled to bypass virus scanning.
I just ran a scan of my home folder with avast for linux and it detected multiple instances of 'WMA:Wimad [Drp] . Im pretty sure this is a window based virus so opensuse 11.2 should be actually infected right?
On a small side note is there any point in running a antivirus program on opensuse-do linux viruses exist in the wild? I recently read this Think Linux is free from malware? Think again; it's been hacked. - Computerworld Blogs and this Linux infection proves Windows malware monopoly is over; Gentoo ships backdoor? [updated] | ZDNet
I found today that ClamTK identifies items in /usr/share/doc/nautilus-clamscan/examples folder as possible viruses. The four files in question, "clam.exe, clam.cab, clam.exe.bz2, and clam.zip" are all part of the standard file list in packages.ubuntu.com. None are marked as executable, but are identified as binary files by less. Any ideas why these files are here or what they do, besides generate false warnings?
i was thinking that is there a way to check data flow for viruses? i mean if i set up calm av in my internet sharing server could it detect anything in incoming and outgoing data ?!!
I've prepared a Samba fileserver at work without much too problems and I've prepared a batch file to mount it as z: letter on windows machine at startup.As a sad result the share gets filled with many viruses and became a vehicle of infection.
folder1 ----> folder2 and many other files and folders
folder1 has a condivision access read and write for everyone so I get no problems with passwords for all those who have access but i use ntfs security to do it read only (viruses act like if a pendrive is connected and mainly put infected files just in the "root" of it, in my case in folder 1) and then give everyone full control in folder2. I've been trying to understand how to do this but I'm quite new to linux and smb.conf really scared me. I've tried samba graphical tool which was a lot easier but I'm not able to achieve this kind of result: no need of user password for users to mount the share and no write possibilities in folder 1 and full control in folder 2.
I would like to use my Ubuntu 9.10 Karmic system to scan and clean viruses from Windows based HDD. I have KlamAV, AVG, and AVAST. I couldn't get F-prot to work. I don't find a debian package of it and don't know how to install tar.gz and the tutorials don't help a lot. Are there other antivirus solutions which are good for cleaning Windows OS but work on Linux/WINE? I wonder if I can install antivirus software in WINE and scan with no problem the hard disks.
I have been told that some virus scanners for linux (including but not limited to AVG, Antivira, clamAV, others) are available to ubuntu. My question is which of these still CURRENTLY support detection of WINDOWS viruses in addition to linux viruses. I would like to boot the Ubuntu live jump drive I have to scan windows machines and at least detect viruses, dont really need to repair. who knows which virus scanners compatible with ubuntu that will detect windows viruses as well
Just a few words in the form of introduction.I have just purchased an older server to use on my home LAN.I understand that the use of Linux or Unix as an operating system will be effective in detering the gathering of viruses from the internet.I am totally unfamiliar with either system, but if this is the case, that's about to change.
I have set up a virtual machine under VMware Player 3.1.2 in Debian. Operating system of this virtual machine is a Windows Server 2003. I would like to periodically test this Windows Server 2003 installation for viruses. Obvious solution would be to install an AV software under this Windows Server 2003 installation. However, I was wondering, is this possible to use NOD32 for Linux or clamav in order to test this Windows Server 2003 installation for viruses? Is NOD32 for Linux able to detect viruses inside the .vmdk file?
Being used to the pc i have always used resource draining virus protection programs. now that i have switched to ubuntu 10.10 i wanna kno is there rly any need for virus protection on my linux?
I'm setting up a fileserver for a client which will host their client invoices. They're looking for a system whereby invoices can be converted from RTF to PDF with copy protection (no right click / copy-paste). In addition to this I'm thinking of using a one-way hash to verify document integrity.
Are there any command-line utilities for Linux which allows adding this kind of copy protection / DRM to pdf documents?
I'm using Debian 6 to host a website (with apache2) and a game server. But because of attacks to my server, my hosting company have now set it offline.
These are the two logs that they provided (I replaced all IPs): Direction IN Internal ***.***.***.***
I've been attempting to back up my collection of DVDs to an external hard drive using Brasero. I've successfully ripped many of the DVDs to ISO with Brasero, but am now wondering if it'd be possible to burn these back to other discs if I bought them in the future. In other words, does Brasero leave copy protection in place and just bypass it when ripping to ISO, or does Brasero remove copy protection all together leaving me with an decrypted ISO?
I have an external hard drive that is actually a 2.5" HDD from a laptop, in a hard drive enclosure. Now I have an issue, because the hard drive had linux Ubuntu installed on it, the hard drive is write protected. So I cant copy any files. I need to copy about 12GB of pictures from it, to my current comp, so I can format it. Does anyone know how I can remove the write protection so I can copy or delete files?