Solved

virus cross platform

Posted on 2014-10-28
10
210 Views
Last Modified: 2014-10-29
is it correct to say that a virus written for Windows, won't work on a Linux box because the code couldn't excecute in Linux because the file structure and OS code is different?
I thought a virus written in something like Java could run on both Windows and Linux because Java isn't platform specific. So say you want a computer that has a smaller chance of getting infected. If you run Linux without Flash Player, Java, or any other cross platform app. ( by the way, aside from java and flash player, what over cross platform apps are there? )
Since most viruses are written to target Windows, your chance or getting infected are pretty low. I am keeping in mind that there are Linux viruses, I get that just because I'm running Linux I am NOT immune to viruses. I'm just going on the likelyhood.
Also, wouldn't a virus written for Windows not work on Linux because, wouldn't most viruses look for things like C:\windows\system32, or something like that? Or maybe try to put entries into the registry.
0
Comment
Question by:JeffBeall
  • 4
  • 3
  • 3
10 Comments
 
LVL 7

Accepted Solution

by:
Stampel earned 250 total points
ID: 40409202
It is true for standalone virus running in a pure .exe format written in a common language like C / C++ ...
A java program is not standalone as it would need the Java.exe of your computer to run.
But your assumption is true, a virus written in java could possibly be run under windows / linux the same.
It is also very true that a computer without java/flash ... has less chance to get infected.
And also very true that running Linux you get less chance to get infected because most target windows.
You would only be targeted a lot if you host website with Linux since they try to hack you to get in (often by SQL injection) and they trry to steal Credit Cards #
0
 
LVL 53

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 40409286
Let me turn around your approach: why would it matter - would the answer, whatever it may look like, change your behavior?

It's that simple: we use computers because we need some functionality that some programs offer. As soon as those programs interact with untrusted code, you might get infected. No matter what OS, no matter what program.

So to be less likely infected, abused, whatever, use as little untrusted code and documents as possible. Is that possible? Let's see: any website is untrusted code. Any mail attachment someone sends you is, any MP3 you downloaded from somewhere is... it is anything you didn't code yourself.
Now does that mean we are in constant immediate danger? Would it help to use Linux here? "of course not" - answers both questions. Immediate danger is only given for those who act foolish, install anything, open any attachment, never patch their programs, run as root/administrator all the time. And while Linux surely has less attacks to fear simply because the attackers know much, much more users are on windows, you will gain no certainty that now you can act careless - I think that is agreeable.

A very interesting approach that is still neglected is code approval by whitelisting. Windows in enterprise edition  (7 ultimate edition) has applocker which offers to whitelist applications that you trust. Those will run, the rest won't, no matter where it comes from or how its start is triggered, it won't run.
A "light" version of that approach is featured in the pro editions of xp/vista/7/8.x, too. It's called "software restriction policies". Google both, they are very, very helpful in securing windows. You have to invest time, though.
0
 
LVL 1

Author Comment

by:JeffBeall
ID: 40409506
McKnife - my computer behavior is...
For banking I have a Fedora linux box, no flash, java, firewall enabled. I use it exclusively to bank and pay bills. I do nothing else on it.
for emails, and just goofing off on the internet, I use my windows machine ( now running win10 beta ).
I have a laptop running Bodhi linux, and sometimes use Thunderbird for emails - Bodhi is a beautiful GUI, so I wanted to mess around with it.
So I posed this question to see if my reasoning was sound. I thought with how I have my setup, the target I present would be minimized.
0
 
LVL 53

Expert Comment

by:McKnife
ID: 40409558
"The target you present" - hmm. You are not seen as target. There's a constant flow of malicious code coming through all "openings" and no one can avoid visiting some sooner or later.
So like you practice it, isolating high risk things like online banking into an exclusive environment is the best you could do.
"Goofing around" again can quickly evolute to anything from a harmless adware to a "free" botnet membership. So if you are interested in that applocker approach: of course your win10 evaluation has it - if you picked the enterprise version.
0
 
LVL 7

Expert Comment

by:Stampel
ID: 40409579
As soon as you arre using internet you are a bloody target of tons of malware/viruses you dont even suspect.
Im not paranoïd but i see the log of thousands of penetration test on each server or each IP placed on the net.
So everyone should feel concerned as Jeff is and yes Jeff on its fedora used only for payment purpose is more than 99% safer than people using their own computer to surf and pay on the same computer for sure.
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 53

Expert Comment

by:McKnife
ID: 40409595
Target means, someone aims at especially you - and that's not the case.
"Possible target" (amongst billion others) is some wording that comes a lot closer.
0
 
LVL 7

Expert Comment

by:Stampel
ID: 40409617
Dont play on words :) possible target, potential target well ... a target still :)
The thing is answering his question .. he is safer than many will never be.
0
 
LVL 1

Author Comment

by:JeffBeall
ID: 40409759
true goofing around could be a problem, but that's why I'm using beta. I fully expect to wipe and reload later. Besides I goof off, but within reason. I still use caution when it seems suspicious.
Well, I didn't expect a war of words, I'm more interested in if the concept I'm using seems solid.
I bet it's interesting to see those penetration test! I've also been experimenting with IPcop for my home network firewall. I'm kind of disappointed that by default it allows anything out bound. The inbound is pretty good. I just can't figure out how to change the out bound though. However, that is a question for a different post.
0
 
LVL 53

Expert Comment

by:McKnife
ID: 40410044
We have both told you, that your concept is about the best you can do.
0
 
LVL 1

Author Closing Comment

by:JeffBeall
ID: 40410869
thank you for your thoughts.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now