Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
This guy claims he was infected with Malware in Linux, but he lost me during the Video, if somebody is board they can see if there's any merit to what he's saying or just an idiot. http://www.youtube.com/watch?v=94QsgdXnsmU
I've run Linux for over 10 yrs and never had an issue like I assume most people haven't.
The video you are linking requires FP to see it, I have to use Unplug for FF and download it if I want to see it (which is really pointless in this case) and then I open it with VLC.
I took a paranoid approach to the web: I have NoScript & Flashblock to block most of the web junk, Firebug for debugging (most of the time I use it to remove layers of nasty ads), Stylish for sites like Facebook (to permanently remove ads), and User Agent Switcher for some web sites.
I know NoScript and Flashblock may be redundant, ok. just my opinion.
whether this user was talking rubbish about their own situation or not,linux is definitely not invincible-the metasploit framework is just one place where various linux and native linux program exploits are databased as well as produced.
First of all, I suggest that we stop using "biological metaphors," such as "infect" or (for that matter...) even "virus."
If you, as a biological organism, inhale a virus particle that your immune system doesn't manage to destroy, then you will get sick whether you wanted to do so or not. But a digital computer is not a biological organism.
Call them: "rogue programs."
Windows users are historically vexed with rogues because they run their systems with the OS's formidable protective mechanisms turned off. There are no passwords, and the user is designated as "all powerful." Since rogues necessarily run with the credentials of their unwitting user, the rogues possess supreme privileges that the operating system has no reason to question. But it's not because the rogue programs are bearing some secret wafer of Kryptonite: it's because the security of the entire system has been knowingly disabled by its vendor. (Which makes a lot of money for Mr. McAfee, who pays a lot of that money to Microsoft.)
But ... every operating system, including Linux, has vulnerabilities. The reason for the sharp decline in rogue problems in Linux or OS/X is simply that, in these systems, security is even slightly "turned on." Rogues are strictly opportunistic. They troll through millions of systems looking for open doors, and, as it were, find millions of them open. Even the most trivial padlock will turn them away.
Last edited by sundialsvcs; 01-12-2012 at 09:33 AM.
Heh... "rogue programs". They're called "viruses" in the computer world because they self replicate/propagate, like a real world virus. Just like trojans don't come from Troy, but get on systems by posing as something you actually want to run. "Virus" is far easier to say than "rogue program that spreads by exploiting and replicating onto remote systems".
What you're going off about isn't totally off-yer-rocker, though. Most malware are incorrectly classified as a virus. Viruses are viruses, malware are malware, rootkits are rootkits... bootloaders, trojans, and the classifications go on. You'll notice that the classifications are based on the behavior of the "offending code".
Most of these get plugged into the moniker of "virus" however, so that legislation doesn't require differentiating all the classifications when writing up ways to penalize the authors.
Back to the thread though... yes. I've seen rootkits get onto linux boxes because they weren't sufficiently updated and firewalled; usually to construct temporary phishing sites. Pick your platform and keep it up to date. And use tools to keep tabs on your system, like rkhunter.
Last edited by Mahalito; 01-12-2012 at 04:04 PM.