Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
But how? I mean Windows has a regestry
How would spyware install itself on a *nix box and modify start up?
it wouln't have root permissions ... I dont think it is possible to do it
You don't need a registry for spyware.
Spyware could, potentially be installed as an extension to whatever browser you are using. Mozilla/FF explicity asks if you wish to install an extension, so called 'drive by downloads' won't work. Other than that, spyware could be incorporated into an app (lower chance if it's Opensource, but if you want to be sure, check the code)
Other, less melicous stuff, such as bad cookies could be installed, btu that's about it.
There is also a way of dynamically loading modules to the kernel. AFAIK root kits work this way, and as such a module runs in ring 0, it has full access to all system resources and can, therefore, spy everything. Spyware, like such integrated into browser plugins, are of course restricted to the rights of the user who is working with it (as long as they don't make use of security holes in kernel or other software which allows them to gain root rights).
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.