Solved

Viruses on UNIX

Posted on 2000-04-26
2
261 Views
Last Modified: 2013-12-06
I was recently asked a question as to whether our UNIX servers required any anti-virus protection.  After instantly scorning this, I thought again and found a large amount of discussion on the the internet regarding this but still did not come to any conclusion.  Anybody have a realistic view on this subject?
0
Comment
Question by:ajmalpass
2 Comments
 
LVL 2

Accepted Solution

by:
mixerfix122699 earned 100 total points
ID: 2752772
Currently, Unix machines seem to NOT be threatened by virii (under the common definition of same). Or, rather, as long as an executable is not invoked by root (or an suid root program), common virii cannot 'infect' other executables.

That is not to say that Unix cannot be compromised by a worm, trojan, etc.

However, a normal user can rarely 'infect' a Unix machine with a virus - it would rather require a combination of trojan or other security violation.
0
 

Expert Comment

by:misguided
ID: 2768961
i agree, basically UNIX is a secure OS and that processes can't easily tamper with the kernel or other files unless it has the the same owner as those processes. Because processes can not easily access other parts of the memory and disk viruses can not jump from one file to another..unlike MS-dos and Windows..beside most of the binary provided in UNIX have their source codes..u can easily check the source code.  About the user, i dont' think they could spread viruses. I guess the root is not dumb enough to execute a questionable binary file! Viruses are improbable in UNIX although they are possible but their survival rate would be small..:) they will die easily..
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
llcommand 6 90
What tool do we need to install to execute ldapsearch command in unix as well as in windows boxes. 5 126
Sed question 2 83
Image not there 4 52
A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now