Linux DeepinThis forum is for the discussion of Linux Deepin.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I recently downloaded the latest Deepin distro, and scanning it with Bitdefender I was notified there were 12 password protected files the exe could not check.
I'm not familiar enough with such things to know if this is normal, or if the distro has files in it which I would not want having access to my system.
Can someone tell me what this is for, and if I'm at risk.
Holding down my cursor for a print screen takes off the reveal of the full line in the Object Path, but perhaps you can tell something from the attached JPG.
I also thought it might be a false positive, but since this came from China, I want to be safe rather than sorry.
All the files begin with this prefix, with differing endings:
=>casper=>initrd.lz=>gzip)=>lib=>firmware=>vxge=>X3fw.ncf=>T1:X3_101025_1_8_1_*
Last edited by batrot; 06-13-2014 at 01:00 PM.
Reason: add info
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680
Rep:
I would say if the md5 (or sha1) of what you have matches those on the Deepin website then ignore the warnings entirely.
Whether you trust the people at Deepin or not they would have to be practically brain-dead to hide something in a way almost guaranteed to set of virus scan alerts when they could just compile spyware directly into the kernel or anywhere else they see fit since it's their distribution.
So, either you trust the people who made the distribution or you don't -- the virus scan is irrelevant. Using a virus scanner on a live CD is pointless and counter productive. Use the sha1 or md5 or both and if they don't match don't burn the image to bootable media but simply delete it, if they do match then there is no problem.
I'm not familiar with the md5 and sha1 commands, but I'll find out how to use them and do the check. And the point is well made that it would not wise to allow a distribution out that contains malicious code.
As you note, I'm a newbie and not familiar with Linux. Even though I first looked into it a couple of years back, I've not yet ventured into its use, but the demise of XP is probably driving a lot of folks to look for a good alternative.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.