Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I move extensively to Linux from Windows XP (where there are viruses pretty often).
Would you advise me please what to read or to do - not to fall in viruses, not to repeat the windows experiences?
I just need common sense from any experienced user.
Distribution: x86_64 Slack 13.37 current : +others
Posts: 459
Rep:
Although I have installed avast and clam AV on some systems I have never used them... Linux is as far as I can tell pretty free from that sort of stuff with average use...as for using virified I very rarely use my plastic on line because that is always going to be a risk because its a worthwhile target for haxors.
I move extensively to Linux from Windows XP (where there are viruses pretty often).
Would you advise me please what to read or to do - not to fall in viruses, not to repeat the windows experiences?
I just need common sense from any experienced user.
Linux doesn't suffer from "the windows experiences" because it works very differently inside. Period.
No viruses, no registry, no DLL hell, no degrading over time.
Linux doesn't suffer from "the windows experiences" because it works very differently inside. Period.
No viruses, no registry, no DLL hell, no degrading over time.
"No viruses"? Citation needed ;-p
Windows XP is indeed much more malware-prone that Linux, but AFAIK, from a tech perspective, a GNU/Linux system isn't less vulnerable than, say, Windows 7.
Windows *is* a lower hanging apple due to the fact that it is still more common for desktop use.
Windows *is* a lower hanging apple due to the fact that it is still more common for desktop use.
A common argument which makes no sense when you consider the percentage of Linux SERVERS on the internet. Servers would have to be a more valuable or even 'prestigious' target than desktops. Which takes us back to Linux IS more secure due to it's inherent design.
A common argument which makes no sense when you consider the percentage of Linux SERVERS on the internet. Servers would have to be a more valuable or even 'prestigious' target than desktops. Which takes us back to Linux IS more secure due to it's inherent design.
A common argument which makes no sense when you consider the percentage of Linux SERVERS on the internet. Servers would have to be a more valuable or even 'prestigious' target than desktops. Which takes us back to Linux IS more secure due to it's inherent design.
I agree that Linux and lots of common server software (Apache etc.) are more secure due to the fact that they're open source, so finding (and eliminating) vulnerabilities is easier (and culturally more rewarding).
The fact that desktops are a more common malware target is not a higher base security IMO, though. Servers run a very limited set of software components with a high level of scrutiny wrt. security. Desktops are commonly a hive of third-party software that opens numerous holes.
I disbelieve that Windows servers are more readily compromised than *NIX servers.
OK, put it this way. I am an IT professional. The data center I work in has a mix of Windows and Unix/Linux servers. All the Windows servers run anti virus software. None of the Unix or Linux boxes run anti virus software. I am not a sys admin, so this setup has nothing to do with me. It was set up by people that know a hell of a lot more than I do. The kind of data we deal with would be extremely damaging to the company if compromised, so to me that is a strong indication that Windows servers are more readily compromised than Unix/Linux and also that servers are deemed to be a target as well as desktops. If this were not the case then why bother buying expensive licenses to protect the Windows servers?
I stand by my opinion. Not running rkhunter or similar protection on UNIX servers is optimistic at best, but often outright negligent.
I believe that the prime reason for buying expensive security software are insurance issues.
Yes, you should be more concerned about your Windows servers. No, the reason is not that *NIX is "somehow superior", except for two possible concerns:
1. Apparently, updating software is a lot less painful, which does indeed make it simpler to protect non-Windows servers.
2. Apparently, Windows is a magnet for poorly written software.
Only the former is a technical issue, and is only indirectly related to security.
There is also no technical reason why someone wouldn't deploy closed-source, poorly written and insecure software on a UNIX server.
I stand by my opinion. Not running rkhunter or similar protection on UNIX servers is optimistic at best, but often outright negligent.
I believe that the prime reason for buying expensive security software are insurance issues.
Yes, you should be more concerned about your Windows servers. No, the reason is not that *NIX is "somehow superior", except for two possible concerns:
1. Apparently, updating software is a lot less painful, which does indeed make it simpler to protect non-Windows servers.
2. Apparently, Windows is a magnet for poorly written software.
Only the former is a technical issue, and is only indirectly related to security.
There is also no technical reason why someone wouldn't deploy closed-source, poorly written and insecure software on a UNIX server.
Maybe you should read 'rkhunter'. If you were admin on either type of OS I am sure that every avenue would be approached to prevent poor performance. 'rootkits' are not a virus but the means for a person(s) to get control of your *NIX box. If safeguards are not in place then you surely deserve to experience unwanted conditions. As admin for any type of OS, one must be sure to provide safeguards to prevent unwarranted situations.
M$ is the largest user base so that is the primary condition for the number of attacks. UNIX systems can be and are generally secure because of knowledgeable managers that want a running secure system. Thus all possible conditions have been performed to allow this or should be done.
As to poorly written closed source, it would be identified at some point in time as something to avoid. So Joe IT admin would not install Poorly_Written_Application.tgz or suffer a pink slip if he/she did not do their job.
You can make all the assumptions but real time situations are what count.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.