Looking for the best anti-virus?

  • Thread starter Thread starter Bill
  • Start date Start date
David W. Hodgins said:
Since all updates for the linux system are signed using public key
encryption, the damage will be limited to data capture.

That can easily be avoided by manually entering the dns addresses
in the linux system, rather then using the dhcp supplied addresses.

In addition, all routers should have the default admin user name,
password, and gateway ip address changed to values other then the
defaults. Also, upnp should be turned off, and forwarding for
p2p software, etc., manually setup.

Network security has to be applied, regardless of the operating
systems used in the computers.

Good points.

My point, rephrased, is that Linux is affected by Windows malware in the
sense that Linux swims in the same pool that Windows has been peeing in
all these years. :o\

Environments that host malware are not limited to OSs, and not all OS
dependent malware needs to "install" to work. Linux is not immune, as
the OP seems to suggest it is.
 
Shadow said:
Our local lan boots from a CD every day, and when he switches
off at night, the virus/malware disappears ..... need a lot of ram
though.

I good recovery plan, but what of prevention? What prevents malware from
running during a session?
 
Shadow said:
Our local lan boots from a CD every day, and when he switches
off at night, the virus/malware disappears ..... need a lot of ram
though.

A good recovery plan, but what of prevention? What prevents malware from
running during a session?
 
So true. 7 years with windows 98 and not a single virus. XP,
and on my third, in two years. That's because I installed Kerio 215
before hooking up the internet. Kept the blaster types out.

Working with computers since the late 70's, never had a virus or trojan
on any computer I own or manage for clients in all those years. Almost
all of them have been Windows based computers and Servers.
 
Working with computers since the late 70's, never had a virus or
trojan on any computer I own or manage for clients in all those years.
Almost all of them have been Windows based computers and Servers.

It's all about education. Not the OS. Either you are educated about
safer computing practices, or you aren't. Those who are quick to blame
the OS for their own ignorance fall in the latter category.
 
Bullshit liar.

You are, and you've shown that you are a dishonest crook too:

You've exposed yourself as the PIRATE/THIEF we all have said you are.

The file you claim to have known about, claim to have submitted to anti-
virus sites, the file named "obatssrsghde.exe" was a marker inserted
into Stuarts batch file you stole from him, it was is a KEY that proves
you're a thief:

For those that don't know, Stuart inserted the obatssrsghde.exe marker
into his batch file to prove, to the community, that PCBUTTS1 / The Real
Truth MVP is actually a lying thief, and PCBUTTS admitted in his own
post that he created the marker and claimed to know what it was - even
claimed to have submitted the malware to anti-virus vendors, but the
joke was on him, Stuart told everyone in the community about it BEFORE
it appeared in PCBUTTS1 download.... There is no actual file named
obatssrsghde.exe in the malware community, it was a ruse.

The key is in the spelling:

obatssrsghde.exe
pcbuttsthief

If you change (add) 1 character to each letter you will see that
"obatssrsghde" is actually the marker "pcbuttsthief" - proving that
PCBUTTS1 is a thief.

Are there other markers - YES, does PCBUTTS1 know about them - know,
they've been there for a long time, but this is the most obvious one.

Face it Chris/PCBUTTS1/TRT, you've exposed yourself in public.
 
It's all about education. Not the OS. Either you are educated about
safer computing practices, or you aren't. Those who are quick to blame
the OS for their own ignorance fall in the latter category.

It's more than just education - it's about having the right mindset and
having the managers/owners thinking the right way.

I've turned down jobs where the company was infected and they would not
allow me to setup proper filtering and blocking on their networks.

Once a company has unlimited access and everyone running as local
admin's, it's hard to get them to switch to a secure mode, but, if you
can get them as a startup or after they've been compromised several
times, you can usually get them converted and remain believers.
 
How is a trojan in Wine going to find my email addresses? The only thing
I run in Wine is this newsreader (and no email is configured).
If your user/group in wine ONLY has access to the newsreader,
no way. Unless you put your real email in the newsreader. Remember,
the trojan will use wine permissions to access data. No data, no leak.
[]'s
 
I good recovery plan, but what of prevention? What prevents malware from
running during a session?
Nothing. The bl^%$^dy place teems with malware. How I got one
of my infections. Had a photo done at the lan, it came on my pendrive.
Avast did not (and still does not) detect it.
[]'s
 
What Butts said.

It's a shame you limit yourself to believing that one can no operate a
secure system/network. Many people do, many of them operate large
networks that are secure.

It's not hard, it just means you have to understand the threats.
 
It's a shame you limit yourself to believing that one can no operate a
secure system/network. Many people do, many of them operate large
networks that are secure.

It's not hard, it just means you have to understand the threats.

Yep. No malware hits here either using various versions of Windows
since 1998.

Art
 
Back
Top