Solved

Viruses on UNIX

Posted on 2000-04-26
2
266 Views
Last Modified: 2013-12-06
I was recently asked a question as to whether our UNIX servers required any anti-virus protection.  After instantly scorning this, I thought again and found a large amount of discussion on the the internet regarding this but still did not come to any conclusion.  Anybody have a realistic view on this subject?
0
Comment
Question by:ajmalpass
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Accepted Solution

by:
mixerfix122699 earned 100 total points
ID: 2752772
Currently, Unix machines seem to NOT be threatened by virii (under the common definition of same). Or, rather, as long as an executable is not invoked by root (or an suid root program), common virii cannot 'infect' other executables.

That is not to say that Unix cannot be compromised by a worm, trojan, etc.

However, a normal user can rarely 'infect' a Unix machine with a virus - it would rather require a combination of trojan or other security violation.
0
 

Expert Comment

by:misguided
ID: 2768961
i agree, basically UNIX is a secure OS and that processes can't easily tamper with the kernel or other files unless it has the the same owner as those processes. Because processes can not easily access other parts of the memory and disk viruses can not jump from one file to another..unlike MS-dos and Windows..beside most of the binary provided in UNIX have their source codes..u can easily check the source code.  About the user, i dont' think they could spread viruses. I guess the root is not dumb enough to execute a questionable binary file! Viruses are improbable in UNIX although they are possible but their survival rate would be small..:) they will die easily..
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Attention: This article will no longer be maintained. If you have any questions, please feel free to mail me. jgh@FreeBSD.org Please see http://www.freebsd.org/doc/en_US.ISO8859-1/articles/freebsd-update-server/ for the updated article. It is avail…
FreeBSD on EC2 FreeBSD (https://www.freebsd.org) is a robust Unix-like operating system that has been around for many years. FreeBSD is available on Amazon EC2 through Amazon Machine Images (AMIs) provided by FreeBSD developer and security office…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question