Antivirus for Ubuntu 18.04Do I need to have antivirus software installed?Is it ok to run more than one antivirus program?Does Ubuntu come with Anti-VirusHow to upgrade ubuntu from 14.04 to 18.04?Minimize animation in Ubuntu 18.04Ubuntu 18.04 LTS Disk Partition RecomendationsBrightness problem Ubuntu 18.04 LTSShould I install Ubuntu 18.04 LTS or 16.04 (64 bit) for Core i5 M540?Ubuntu 18.04 freezesUbuntu 18.04 Screen brightness fluctuatingAnti virus for Ubuntu 18.04
Usage of the relative pronoun "dont"
What color to choose as "danger" if the main color of my app is red
When the match time is called, does the current turn end immediately?
Write electromagnetic field tensor in terms of four-vector potential
What kind of environment would favor hermaphroditism in a sentient species over regular, old sexes?
Why is it correct to use ~た in this sentence, even though we're talking about next week?
How come Arya Stark didn't burn in Game of Thrones Season 8 Episode 5
Would it be fair to use 1d30 (instead of rolling 2d20 and taking the higher die) for advantage rolls?
How to know the path of a particular software?
Is there any deeper thematic meaning to the white horse that Arya finds in The Bells (S08E05)?
Cycling to work - 30mile return
Refer a string as a field API name
FIFO data structure in pure C
How long do Aarakocra live?
Have there been any examples of re-usable rockets in the past?
Physically unpleasant work environment
Is there an academic word that means "to split hairs over"?
Solenoid fastest possible release - for how long should reversed polarity be applied?
Was the dragon prowess intentionally downplayed in S08E04?
Could a space colony 1g from the sun work?
Why would company (decision makers) wait for someone to retire, rather than lay them off, when their role is no longer needed?
Why is vowel phonology represented in a trapezoid instead of a square?
How can I safely determine the output voltage and current of a transformer?
Why does string strummed with finger sound different from the one strummed with pick?
Antivirus for Ubuntu 18.04
Do I need to have antivirus software installed?Is it ok to run more than one antivirus program?Does Ubuntu come with Anti-VirusHow to upgrade ubuntu from 14.04 to 18.04?Minimize animation in Ubuntu 18.04Ubuntu 18.04 LTS Disk Partition RecomendationsBrightness problem Ubuntu 18.04 LTSShould I install Ubuntu 18.04 LTS or 16.04 (64 bit) for Core i5 M540?Ubuntu 18.04 freezesUbuntu 18.04 Screen brightness fluctuatingAnti virus for Ubuntu 18.04
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;
I have upgraded into Ubuntu 18.04.2 LTS. I have worked primarily with Windows and secondarily with Ubuntu (14.04 and 16.04). I will work with Ubuntu 18.04 as my main Operational System (distribution). I want to ask if it is necessary to install an anti-virus and if the answer is affirmative what is the better choice (free of course:-)!).
18.04 antivirus
add a comment |
I have upgraded into Ubuntu 18.04.2 LTS. I have worked primarily with Windows and secondarily with Ubuntu (14.04 and 16.04). I will work with Ubuntu 18.04 as my main Operational System (distribution). I want to ask if it is necessary to install an anti-virus and if the answer is affirmative what is the better choice (free of course:-)!).
18.04 antivirus
6
You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )
– Rinzwind
May 5 at 14:28
1
If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware
– mattia.b89
May 5 at 15:28
6
Possible duplicate of Do I need to have antivirus software installed?
– Fabby
May 6 at 9:30
add a comment |
I have upgraded into Ubuntu 18.04.2 LTS. I have worked primarily with Windows and secondarily with Ubuntu (14.04 and 16.04). I will work with Ubuntu 18.04 as my main Operational System (distribution). I want to ask if it is necessary to install an anti-virus and if the answer is affirmative what is the better choice (free of course:-)!).
18.04 antivirus
I have upgraded into Ubuntu 18.04.2 LTS. I have worked primarily with Windows and secondarily with Ubuntu (14.04 and 16.04). I will work with Ubuntu 18.04 as my main Operational System (distribution). I want to ask if it is necessary to install an anti-virus and if the answer is affirmative what is the better choice (free of course:-)!).
18.04 antivirus
18.04 antivirus
asked May 5 at 10:53
DimitrisDimitris
23139
23139
6
You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )
– Rinzwind
May 5 at 14:28
1
If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware
– mattia.b89
May 5 at 15:28
6
Possible duplicate of Do I need to have antivirus software installed?
– Fabby
May 6 at 9:30
add a comment |
6
You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )
– Rinzwind
May 5 at 14:28
1
If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware
– mattia.b89
May 5 at 15:28
6
Possible duplicate of Do I need to have antivirus software installed?
– Fabby
May 6 at 9:30
6
6
You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )
– Rinzwind
May 5 at 14:28
You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )
– Rinzwind
May 5 at 14:28
1
1
If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware
– mattia.b89
May 5 at 15:28
If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware
– mattia.b89
May 5 at 15:28
6
6
Possible duplicate of Do I need to have antivirus software installed?
– Fabby
May 6 at 9:30
Possible duplicate of Do I need to have antivirus software installed?
– Fabby
May 6 at 9:30
add a comment |
7 Answers
7
active
oldest
votes
This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.
Alternatively as described here you can open a terminal and type:
sudo apt-get install clamtk
or load it through Synaptic Package Manager.
16
The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.
– Rinzwind
May 5 at 14:32
@colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.
– Rinzwind
May 6 at 12:45
Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that
– Rinzwind
May 6 at 13:03
1
@Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.
– Underverse
May 6 at 14:05
add a comment |
Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....
EDIT: See this article for further information.
8
I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.
– Carolus
May 5 at 15:13
1
@Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.
– Ethunxxx
May 5 at 15:33
add a comment |
Anti-virus software does not just look for viruses.
You will also want to look at rkhunter which looks for root kits.
While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.
I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.
– Federico Poloni
May 6 at 22:30
add a comment |
No, you need no anti-virus program.
There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.
For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.
When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter
to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums
to check all system programs for integrity, too.
As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.
A stupid and harmful joke is that people suggest to run rm -rf /
, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).
Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb
. This will run fine when you have one hard disk (sda
) and the usb stick (sdb
). But when you have a second hard disk, the usb stick will be sdc
and your second hard disk is sdb
and you will overwrite your data.
So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.
In summary:
- Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)
- Do not use SSH unless you need to
- Use a good password, especially when allowing remote access
- Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.
add a comment |
My reply to answers like:
"From my personal experience you don't need an antivirus"
From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.
These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.
Also, remember that we all use Web browsers, and there are many browser centered attacks.
It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:
I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.
I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.
I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.
So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.
1
Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.
– James_pic
May 7 at 14:35
you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD
– xCovelus
May 8 at 8:47
add a comment |
As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command
$ sudo ufw enable
you can then enable logging if you want with the command
$ sudo ufw logging on
If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.
To install type
$ sudo snap install ufw
As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.
that is a very good advice
– xCovelus
May 8 at 8:46
add a comment |
You do need to install antivirus linux can not have virus
The system is so powerful its not like windows so no need
Dont trouble yourself my friend
New contributor
Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses
– xCovelus
yesterday
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "89"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1140679%2fantivirus-for-ubuntu-18-04%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
7 Answers
7
active
oldest
votes
7 Answers
7
active
oldest
votes
active
oldest
votes
active
oldest
votes
This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.
Alternatively as described here you can open a terminal and type:
sudo apt-get install clamtk
or load it through Synaptic Package Manager.
16
The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.
– Rinzwind
May 5 at 14:32
@colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.
– Rinzwind
May 6 at 12:45
Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that
– Rinzwind
May 6 at 13:03
1
@Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.
– Underverse
May 6 at 14:05
add a comment |
This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.
Alternatively as described here you can open a terminal and type:
sudo apt-get install clamtk
or load it through Synaptic Package Manager.
16
The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.
– Rinzwind
May 5 at 14:32
@colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.
– Rinzwind
May 6 at 12:45
Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that
– Rinzwind
May 6 at 13:03
1
@Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.
– Underverse
May 6 at 14:05
add a comment |
This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.
Alternatively as described here you can open a terminal and type:
sudo apt-get install clamtk
or load it through Synaptic Package Manager.
This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.
Alternatively as described here you can open a terminal and type:
sudo apt-get install clamtk
or load it through Synaptic Package Manager.
edited May 5 at 13:56
Community♦
1
1
answered May 5 at 11:21
GrahamGraham
2,71161931
2,71161931
16
The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.
– Rinzwind
May 5 at 14:32
@colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.
– Rinzwind
May 6 at 12:45
Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that
– Rinzwind
May 6 at 13:03
1
@Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.
– Underverse
May 6 at 14:05
add a comment |
16
The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.
– Rinzwind
May 5 at 14:32
@colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.
– Rinzwind
May 6 at 12:45
Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that
– Rinzwind
May 6 at 13:03
1
@Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.
– Underverse
May 6 at 14:05
16
16
The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.
– Rinzwind
May 5 at 14:32
The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.
– Rinzwind
May 5 at 14:32
@colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.
– Rinzwind
May 6 at 12:45
@colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.
– Rinzwind
May 6 at 12:45
Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that
– Rinzwind
May 6 at 13:03
Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that
– Rinzwind
May 6 at 13:03
1
1
@Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.
– Underverse
May 6 at 14:05
@Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.
– Underverse
May 6 at 14:05
add a comment |
Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....
EDIT: See this article for further information.
8
I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.
– Carolus
May 5 at 15:13
1
@Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.
– Ethunxxx
May 5 at 15:33
add a comment |
Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....
EDIT: See this article for further information.
8
I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.
– Carolus
May 5 at 15:13
1
@Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.
– Ethunxxx
May 5 at 15:33
add a comment |
Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....
EDIT: See this article for further information.
Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....
EDIT: See this article for further information.
edited May 7 at 6:54
answered May 5 at 12:21
EthunxxxEthunxxx
324212
324212
8
I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.
– Carolus
May 5 at 15:13
1
@Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.
– Ethunxxx
May 5 at 15:33
add a comment |
8
I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.
– Carolus
May 5 at 15:13
1
@Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.
– Ethunxxx
May 5 at 15:33
8
8
I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.
– Carolus
May 5 at 15:13
I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.
– Carolus
May 5 at 15:13
1
1
@Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.
– Ethunxxx
May 5 at 15:33
@Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.
– Ethunxxx
May 5 at 15:33
add a comment |
Anti-virus software does not just look for viruses.
You will also want to look at rkhunter which looks for root kits.
While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.
I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.
– Federico Poloni
May 6 at 22:30
add a comment |
Anti-virus software does not just look for viruses.
You will also want to look at rkhunter which looks for root kits.
While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.
I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.
– Federico Poloni
May 6 at 22:30
add a comment |
Anti-virus software does not just look for viruses.
You will also want to look at rkhunter which looks for root kits.
While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.
Anti-virus software does not just look for viruses.
You will also want to look at rkhunter which looks for root kits.
While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.
answered May 5 at 15:26
BibBib
911
911
I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.
– Federico Poloni
May 6 at 22:30
add a comment |
I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.
– Federico Poloni
May 6 at 22:30
I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.
– Federico Poloni
May 6 at 22:30
I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.
– Federico Poloni
May 6 at 22:30
add a comment |
No, you need no anti-virus program.
There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.
For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.
When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter
to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums
to check all system programs for integrity, too.
As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.
A stupid and harmful joke is that people suggest to run rm -rf /
, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).
Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb
. This will run fine when you have one hard disk (sda
) and the usb stick (sdb
). But when you have a second hard disk, the usb stick will be sdc
and your second hard disk is sdb
and you will overwrite your data.
So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.
In summary:
- Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)
- Do not use SSH unless you need to
- Use a good password, especially when allowing remote access
- Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.
add a comment |
No, you need no anti-virus program.
There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.
For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.
When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter
to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums
to check all system programs for integrity, too.
As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.
A stupid and harmful joke is that people suggest to run rm -rf /
, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).
Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb
. This will run fine when you have one hard disk (sda
) and the usb stick (sdb
). But when you have a second hard disk, the usb stick will be sdc
and your second hard disk is sdb
and you will overwrite your data.
So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.
In summary:
- Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)
- Do not use SSH unless you need to
- Use a good password, especially when allowing remote access
- Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.
add a comment |
No, you need no anti-virus program.
There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.
For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.
When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter
to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums
to check all system programs for integrity, too.
As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.
A stupid and harmful joke is that people suggest to run rm -rf /
, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).
Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb
. This will run fine when you have one hard disk (sda
) and the usb stick (sdb
). But when you have a second hard disk, the usb stick will be sdc
and your second hard disk is sdb
and you will overwrite your data.
So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.
In summary:
- Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)
- Do not use SSH unless you need to
- Use a good password, especially when allowing remote access
- Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.
No, you need no anti-virus program.
There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.
For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.
When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter
to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums
to check all system programs for integrity, too.
As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.
A stupid and harmful joke is that people suggest to run rm -rf /
, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).
Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb
. This will run fine when you have one hard disk (sda
) and the usb stick (sdb
). But when you have a second hard disk, the usb stick will be sdc
and your second hard disk is sdb
and you will overwrite your data.
So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.
In summary:
- Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)
- Do not use SSH unless you need to
- Use a good password, especially when allowing remote access
- Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.
answered May 6 at 9:11
alloallo
53517
53517
add a comment |
add a comment |
My reply to answers like:
"From my personal experience you don't need an antivirus"
From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.
These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.
Also, remember that we all use Web browsers, and there are many browser centered attacks.
It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:
I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.
I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.
I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.
So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.
1
Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.
– James_pic
May 7 at 14:35
you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD
– xCovelus
May 8 at 8:47
add a comment |
My reply to answers like:
"From my personal experience you don't need an antivirus"
From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.
These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.
Also, remember that we all use Web browsers, and there are many browser centered attacks.
It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:
I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.
I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.
I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.
So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.
1
Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.
– James_pic
May 7 at 14:35
you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD
– xCovelus
May 8 at 8:47
add a comment |
My reply to answers like:
"From my personal experience you don't need an antivirus"
From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.
These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.
Also, remember that we all use Web browsers, and there are many browser centered attacks.
It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:
I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.
I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.
I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.
So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.
My reply to answers like:
"From my personal experience you don't need an antivirus"
From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.
These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.
Also, remember that we all use Web browsers, and there are many browser centered attacks.
It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:
I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.
I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.
I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.
So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.
edited May 8 at 8:49
answered May 7 at 10:17
xCovelusxCovelus
635
635
1
Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.
– James_pic
May 7 at 14:35
you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD
– xCovelus
May 8 at 8:47
add a comment |
1
Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.
– James_pic
May 7 at 14:35
you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD
– xCovelus
May 8 at 8:47
1
1
Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.
– James_pic
May 7 at 14:35
Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.
– James_pic
May 7 at 14:35
you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD
– xCovelus
May 8 at 8:47
you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD
– xCovelus
May 8 at 8:47
add a comment |
As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command
$ sudo ufw enable
you can then enable logging if you want with the command
$ sudo ufw logging on
If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.
To install type
$ sudo snap install ufw
As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.
that is a very good advice
– xCovelus
May 8 at 8:46
add a comment |
As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command
$ sudo ufw enable
you can then enable logging if you want with the command
$ sudo ufw logging on
If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.
To install type
$ sudo snap install ufw
As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.
that is a very good advice
– xCovelus
May 8 at 8:46
add a comment |
As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command
$ sudo ufw enable
you can then enable logging if you want with the command
$ sudo ufw logging on
If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.
To install type
$ sudo snap install ufw
As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.
As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command
$ sudo ufw enable
you can then enable logging if you want with the command
$ sudo ufw logging on
If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.
To install type
$ sudo snap install ufw
As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.
answered May 7 at 15:25
XeonUnkownXeonUnkown
411
411
that is a very good advice
– xCovelus
May 8 at 8:46
add a comment |
that is a very good advice
– xCovelus
May 8 at 8:46
that is a very good advice
– xCovelus
May 8 at 8:46
that is a very good advice
– xCovelus
May 8 at 8:46
add a comment |
You do need to install antivirus linux can not have virus
The system is so powerful its not like windows so no need
Dont trouble yourself my friend
New contributor
Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses
– xCovelus
yesterday
add a comment |
You do need to install antivirus linux can not have virus
The system is so powerful its not like windows so no need
Dont trouble yourself my friend
New contributor
Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses
– xCovelus
yesterday
add a comment |
You do need to install antivirus linux can not have virus
The system is so powerful its not like windows so no need
Dont trouble yourself my friend
New contributor
You do need to install antivirus linux can not have virus
The system is so powerful its not like windows so no need
Dont trouble yourself my friend
New contributor
New contributor
answered May 9 at 9:38
Shamgar MusoberoShamgar Musobero
111
111
New contributor
New contributor
Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses
– xCovelus
yesterday
add a comment |
Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses
– xCovelus
yesterday
Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses
– xCovelus
yesterday
Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses
– xCovelus
yesterday
add a comment |
Thanks for contributing an answer to Ask Ubuntu!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1140679%2fantivirus-for-ubuntu-18-04%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
6
You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )
– Rinzwind
May 5 at 14:28
1
If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware
– mattia.b89
May 5 at 15:28
6
Possible duplicate of Do I need to have antivirus software installed?
– Fabby
May 6 at 9:30