Reply
Thread Tools
Posts: 5,335 | Thanked: 8,187 times | Joined on Mar 2007 @ Pennsylvania, USA
#31
Originally Posted by Benson View Post
You're saying that doesn't purport to be distilled evil? Giraffe porn, all-Caps, looks like distilled evil from here...
You're not Tycho Brahe.
 
GeneralAntilles's Avatar
Posts: 5,478 | Thanked: 5,222 times | Joined on Jan 2006 @ St. Petersburg, FL
#32
Originally Posted by Benson View Post
You're saying that doesn't purport to be distilled evil? Giraffe porn, all-Caps, looks like distilled evil from here...
Fine, in Benson's case it'll read: flamethrower-wielding-robot-orgy-sdl.4.1-1_armel.deb

 

The Following User Says Thank You to GeneralAntilles For This Useful Post:
Posts: 5,335 | Thanked: 8,187 times | Joined on Mar 2007 @ Pennsylvania, USA
#33
Originally Posted by GeneralAntilles View Post
Fine, in Benson's case it'll read: flamethrower-wielding-robot-orgy-sdl.4.1-1_armel.deb
Hey, just so long as it's in Maemo Extras with a good description and a version number of reasonable length.
 
Posts: 5,795 | Thanked: 3,151 times | Joined on Feb 2007 @ Agoura Hills Calif
#34
But aren't there attachments you could look at in Linux without effect, yet get a virus from in Windows?

Butt of course your grandmother's antivirus software should detect it.
 
Posts: 161 | Thanked: 99 times | Joined on Jan 2008
#35
Originally Posted by GeneralAntilles View Post
There are no viruses.
At least not yet in the wild. But this will certainly change once the Linux desktop marketshare significantly increases.

Nowadays creation and distribution of viruses/trojans is mostly driven by commercial interests. Why shoud virus authors bother to write viruses for Linux when the >95% Windows users are an easier, more profitable and much bigger target?
 
GeneralAntilles's Avatar
Posts: 5,478 | Thanked: 5,222 times | Joined on Jan 2006 @ St. Petersburg, FL
#36
Originally Posted by iskarion View Post
At least not yet in the wild. But this will certainly change once the Linux desktop marketshare significantly increases.
Possibly, but the "security through obscurity" argument doesn't really pan out. *NIX is simply straight-up more secure than Windows.
 
Posts: 344 | Thanked: 26 times | Joined on Jan 2007
#37
Originally Posted by rcadden View Post
The person who forwarded an attachment 1. from someone they didn't know 2. that they hadn't opened themselves are culpable.

Prevention is better than a cure.
Abstinence or Wear Protection?
 
Posts: 52 | Thanked: 22 times | Joined on Apr 2008
#38
It might be possible to port clamav; it's open-source AFAIK and runs on Linux. I use it to clean my mail stream mostly to reduce the volume not that I think I'll get infected.

In case anyone gets too cocky about Linux and viruses, there is nothing whatever to prevent a virus being written that exploits .profile, $HOME/bin, cron, etc in userspace, or various application vulnerabilities.
A while ago now you could write an email virus in PostScript - P/S is actually
a scripting language and unless run in safe mode is able to write to the filesystem, e.g. ~/.signature

Right now there is this huge pool of idiots surfing the Web as root in various Microsoft O/S, but that may change.
 
Posts: 51 | Thanked: 1 time | Joined on Mar 2008
#39
executables cannot be run without root permissions, and then only after that executable has been saved to a folder. yes there are instances where people run all day long as root, for instance the eeepc has no sudoers file. the user can install apps with out password on the highly modified xandros stock os. as far as linux getting more popular, I think with all the different distros being run, it would be hard to write something that would infect more than one or two distros. I may be wrong on that, but it just seems logical.
 
Posts: 422 | Thanked: 244 times | Joined on Feb 2008
#40
Originally Posted by bootdoc View Post
executables cannot be run without root permissions, and then only after that executable has been saved to a folder.
Hello bootdoc - have a think about this. In order to run anything it must be executable. If root was required to run executables, then users could not run email programs, browsers or anything else without being root.

This is obviously not the case. The point is that root has access to *everything* and so any executable being run by root has the same level of access.

An executable run by a user account generally has significantly less access, and so cannot do some of the basic things that malware likes to do - hide itself, and run independently of an account - and of course run as root itself.

yes there are instances where people run all day long as root, for instance the eeepc has no sudoers file. the user can install apps with out password on the highly modified xandros stock os.
This is not quite true. The eee pc does have a sudoers file, but is set that all users can run as sudo without a password. This is an important difference, as it means a few changes to the sudoers file can increase security. Having a free for all sudoers is not a good idea imo, and I would say that it is unlikely that the majority of eee pc users will do this.

as far as linux getting more popular, I think with all the different distros being run, it would be hard to write something that would infect more than one or two distros. I may be wrong on that, but it just seems logical.
Remember that a distribution is just a collection of applications that run on the GNU/Linux kernel. Yes, distribution will have its own setup and foibles but fundamentally they are the same, and in many cases a binary executable will run on many distributions without modification - particularly if it has no library dependencies by being self contained or using static linked binaries.
 
Reply

Tags
770, antivirus, bora, chinook, diablo, fremantle, gregale, internet tablet os, itos, maemo, maemo 2, maemo 3, maemo 4, maemo 5, mistral, n800, n810, n900, os2005, os2006, os2007, os2008, scirocco, virus


 
Forum Jump


All times are GMT. The time now is 05:27.