Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
You'd probably want to ask one of the Mods (via the Report button) to move this to the Security forum.
That being said, try rkhunter for a start.
(& read the sticky post at the top of the Security forum)
Same as any other "unknown" situations, use caution and proceed slowly.
You'll have to elaborate further I'm afraid. There is little protection from generalized unknowns, except to use a "noscript" and "adblock" type plugins for your update-to-date browser choice.
The way to protect against malware is to incorporate much better security practices. For instance:
(1) Use "ad blockers" on all of your web site surfing. Consider "surfing" from a separate user-id which you use for no other purpose.
(2) Install software that creates protected backups continuously throughout the day. (Apple's Time Machine is a now-legendary example.)
(3) Never run as an "Administrator," a member of the wheel group on Linux, nor any other user-id that is capable of attaining elevated privileges. Never respond to a request for such a password unless you know damnedsure that it is valid, and then only when you are logged-on to the (one ...) administrative account. (This is the "Principle of Least Privilege.")
(4) Apply all updates especially security updates religiously.
(5) When managing servers, don't use software such as Plesk, PhpMyAdmin, and so on.
(6) Don't expose services to the outside world. Install OpenVPN with 4096-bit unique certificates and tls-auth, and confine all services to "listen" only to the virtual network-adapters created by OpenVPN inside the tunnel. Now, to the outside world, "there is nothing there," and yet authorized users can pass through effortlessly – if their credentials have not been revoked by you – and you know each one of them by name. Only once they have passed this first gantlet, they can even try to use ssh and so forth (only with more uniquecertificates, of course ... ) to get farther.
Remember that a computer is not a biological organism: it cannot "become infected." It will not run software unless told to do so and that software can't do anything you can't.
Last edited by sundialsvcs; 03-30-2017 at 07:57 AM.
Well, also be aware of this: OpenVPN is "a cryptographically-secure TCP/IPRouter (or Bridge), implemented almost entirely in user-mode software." Nothing more, nothing less.
If you are using it as a client, in order to connect to someplace else, OpenVPN will really do nothing for you nor against you: "it's just a pipe."
If you employ it as the outer-bastion of a computer that you have which is connected as a server to the public Internet, OpenVPN (with tls-auth and proper use of one-of-a-kind digital certificates) can absolutely shut down all(!) "unauthorized access attempts" to ssh or anything else. Simply make sure (by iptables rules as well as individual client configuration ...) that all of these services are listening only to "this side of the OpenVPN tunnel," and that they will accept traffic from nowhere else. Presto! They have now completely disappeared. No "open sockets" to scan. No indication whatsoever that they are even there. No way to reach them, and no way to detect them ... unless ...
... unless you are an authorized user bearing the proper (and, non-revoked ...) credentials, in which case you pass right through, virtually without pause. Now you can see and use these services.
Rootkit Hunter is NOT an antivirus app, it checks your system for local exploits and other security vulnerability's, on your local system!
I know that.
I just listed it because it was in the article. Anyway, the article mentions that it is a rootkit application. I don't know why the blogger/writer put rkhunter with the antivirus/malware category.
Distribution: Currently: OpenMandriva. Previously: openSUSE, PCLinuxOS, CentOS, among others over the years.
Posts: 3,881
Rep:
Quote:
Originally Posted by DDukes
I know that.
I just listed it because it was in the article. Anyway, the article mentions that it is a rootkit application. I don't know why the blogger/writer put rkhunter with the antivirus/malware category.
Because I wanted to helpful. And I was quickly copying and pasting the 7 names from the article to my post.
Anyway, you know and I know and others know that rkhunter is a rootkit application. And those who didn't know will find out in the article. The article has a description for each product listed.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.