• Crazyslinkz@lemmy.world
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    4 months ago

    When you get to server levels it’s about making sure the firewall rules are filtering correctly. Need external access for support, while blocking script kiddies attempts to gain ssh access. (Figuratively speaking)

    • Omega@discuss.online
      link
      fedilink
      arrow-up
      6
      ·
      4 months ago

      Wayland and Flatpak actually somewhat protects you though, as long as you know to NOT give it the permissions to read all of /home

      • easily3667@lemmus.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        As long as you know the foot guns and know why flatpak is important…isnt a good starting point.

      • jaschen@lemm.ee
        link
        fedilink
        arrow-up
        6
        ·
        4 months ago

        I mean, that logic also applies to Windows and Mac. This meme is just stroking the Linux ego.

        • Duamerthrax@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 months ago

          Yes, that also works in Windows and Mac. When I still dual booted Windows, I gave up on anti-viruses and just didn’t download suspicious things and used Firefox with all the regular blockers. Never had a problem.

    • confusedwiseman@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      4 months ago

      Does this work? I would think scanning a *.package would only assess that content. Wouldn’t something malicious likely be in the code or dependency it could call via some form of get request? That .deb package itself could be completely “safe” until it calls a git clone <URL> to then run something malicious.

      I think this would be more likely to work for appimage or flatpak, though the same approach could compromise the validity of the scan. Am I thinking too hard, or did I just miss the point?

  • bleistift2@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    66
    ·
    4 months ago

    A few years ago I found a text (probably as image) where somebody ‘tried’ to run a virus on linux. It went something like this:

    Wanted to install a virus on Ubuntu, but it was only available as an aur package. Tried converting. Didn’t work … Tried make virus, but didn’t work. Upgraded cmake, tried again, but some libraries were missing.

    Tried installing libraries, but they were very outdated and I couldn’t find proper versions.

    Checked the source to see what the libs were doing and replaced them.

    and so on.

    Does someone know what I’m talking about and possibly has the source?

  • Fushuan [he/him]@lemm.ee
    link
    fedilink
    arrow-up
    77
    arrow-down
    2
    ·
    4 months ago

    A single .sh file with exec permission that asks for sudo will easily download appimage keyloggers and then set a cron job to run it every X time to keep it alive and sends it all to whatever remote location. Or whatever else you let the appimage do.

    95% of regular users will double click that, and then write their pass in the popup without blinking twice and that will work in most Linux systems.

    Most viruses don’t target Linux, sure, but that’s wishful thinking. Always be creful with what you run.

  • Dizzy Devil Ducky@lemm.ee
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    1
    ·
    4 months ago

    As someone who may obtain games and shows/movies through less than rights holder approved methods, ClamAV is a necessity.

    • Maiq@lemy.lol
      link
      fedilink
      arrow-up
      19
      ·
      4 months ago

      Not just for the pirate though. If you share any files between nix and win OS’s. I wouldn’t want to share any computer std with those I care for, friend, family or business.

      There are also cool tools like chkrootkit and rkhunter that might come in handy.

  • MidsizedSedan@lemmy.world
    link
    fedilink
    arrow-up
    10
    ·
    4 months ago

    I recently learnt you can fully delete your root account. Can that fully deter viruses? (Assuming viruses need root access to cause damage)

  • yesman@lemmy.world
    link
    fedilink
    arrow-up
    9
    arrow-down
    1
    ·
    4 months ago

    This argument is 30years out of date. I haven’t installed antivirus software since WindowsXP. And I don’t think it was necessary for an experienced user then.

  • Screen_Shatter@lemmy.world
    link
    fedilink
    arrow-up
    17
    ·
    4 months ago

    I just switched to linux and totally forgot about this. Do I really not need one? 99% of what I do is steam gaming anyway so I’m not too worried, worst case I just format and reinstall, but still…

    • Forester@pawb.social
      link
      fedilink
      English
      arrow-up
      18
      arrow-down
      1
      ·
      4 months ago

      Most malware is not Linux compatible. However the stuff that is will fuck you over very hard. Get clamav set a cron

    • azha@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      4 months ago

      better be safe than sorry so get Clamav and scan your system frequently

    • kernelle@0d.gs
      link
      fedilink
      arrow-up
      10
      arrow-down
      1
      ·
      4 months ago

      ‘The best anti-virus is common sense [current year]’ - was a meme more than decade ago and is still true. Linux is not safer than any other OS.

      The reason why people think otherwise is because statistically, when bad actors release malware it’s made for the OS with the largest market share. Which for computers, is still Windows by a landslide.

      • UnderpantsWeevil@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        4 months ago

        Linux is not safer than any other OS.

        Apache web servers were, are, and will continue to be common thanks to their cheapness and ease of configuration. And malware (particularly and most recently coinminers) have been a plague on Apache for at least the last few years.

        “Nobody’s come after my bespoke Linux kernel” is just preaching security-through-obscurity. Which - hey - if you’re running a Mint box to host videos on Jellyfin, sure. The absolute worst case scenario is being forced to re-download 1000 hours of tv/movies/music you forgot you even had. But if you’re doing any kind of business application or - god forbid - enterprise level application development, you might as well post a “Kick Me” sign on your admin’s back as tell your team that Linux is virus-proof.

        • Forester@pawb.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          4 months ago

          If you are a Halo fan or have ever played Halo reach. The only thing I can imagine is the slip space rupture detected scene except for every time instead of slip space. It’s Yara heuristic detected. https://youtu.be/Q_4i-yOUmXY