![]() |
Re: Anti-virus pgm for N810?
Quote:
|
Re: Anti-virus pgm for N810?
Quote:
;) |
Re: Anti-virus pgm for N810?
Quote:
|
Re: Anti-virus pgm for N810?
But aren't there attachments you could look at in Linux without effect, yet get a virus from in Windows?
Butt of course your grandmother's antivirus software should detect it. |
Re: Anti-virus pgm for N810?
Quote:
Nowadays creation and distribution of viruses/trojans is mostly driven by commercial interests. Why shoud virus authors bother to write viruses for Linux when the >95% Windows users are an easier, more profitable and much bigger target? |
Re: Anti-virus pgm for N810?
Quote:
|
Re: Anti-virus pgm for N810?
Quote:
|
Re: Anti-virus pgm for N810?
It might be possible to port clamav; it's open-source AFAIK and runs on Linux. I use it to clean my mail stream mostly to reduce the volume not that I think I'll get infected.
In case anyone gets too cocky about Linux and viruses, there is nothing whatever to prevent a virus being written that exploits .profile, $HOME/bin, cron, etc in userspace, or various application vulnerabilities. A while ago now you could write an email virus in PostScript - P/S is actually a scripting language and unless run in safe mode is able to write to the filesystem, e.g. ~/.signature Right now there is this huge pool of idiots surfing the Web as root in various Microsoft O/S, but that may change. |
Re: Anti-virus pgm for N810?
executables cannot be run without root permissions, and then only after that executable has been saved to a folder. yes there are instances where people run all day long as root, for instance the eeepc has no sudoers file. the user can install apps with out password on the highly modified xandros stock os. as far as linux getting more popular, I think with all the different distros being run, it would be hard to write something that would infect more than one or two distros. I may be wrong on that, but it just seems logical.
|
Re: Anti-virus pgm for N810?
Quote:
This is obviously not the case. The point is that root has access to *everything* and so any executable being run by root has the same level of access. An executable run by a user account generally has significantly less access, and so cannot do some of the basic things that malware likes to do - hide itself, and run independently of an account - and of course run as root itself. Quote:
Quote:
|
All times are GMT. The time now is 17:19. |
vBulletin® Version 3.8.8