Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
Until just you get infected by one of those 10 virusses
Do you have anything other than FUD for this? I mean, do you actually know anyone who got one of those very few Linux-compatible malwares? All things considered, if you've got a firewall blocking everything (i.e. not running a webserver), and if you don't routinely run as root, it's very difficult for malware to make any headway with Linux.
Most of the so-called anti-virus products for Linux are actually products to strip Windows viruses from email so that you don't infect someone with Windows.
On its official website, it is stated that ClamAV can detect over 20,000 viruses, and it can also recognize many different data types (including a variety of compressed files). It is designed for file servers and mail servers that serve Windows-based clients. In addition to Windows malware, it also scans for the handful of Unix malware.
Last edited by Quakeboy02; 10-21-2009 at 05:58 PM.
Mail servers running Linux are usually installed with Clam AV. Theres no harm though to have a AV on desktop. Prevention is always better than cure. You never know the limits to human stupidity.
Sure, kinda, sorta. But, if you're not running a mail server, what is clamav going to do other than take up space and the occasional CPU cycle?
My point is that in Linux, it's not enough to just go down a laundry list and checkoff the "AV, yep using clamav" box. Are you running a mail server? Is it going to protect you from malware you encounter on the web? Do you even store your email locally, or do you, like me, use yahoo or something similar to manage your email? Do you practice safe surfing techniques, or do you download every piece of software you find and run it? Do you access the web while logged in as root? Do you have a firewall with all external ports closed? I'm sure there are other questions that you need to answer to really discern your vulnerability to malware, but it's not such an easy job to just say "I have this so I'm safe".
There is the point that if you have mates with MS (& we all do) then you might be able to warn them if they send you an email with an MS specific virus.
As above, there's a lot more to safe surfing than just anti-virus though.