Antivirus for Ubuntu 18.04Do I need to have antivirus software installed?Is it ok to run more than one antivirus program?Does Ubuntu come with Anti-VirusHow to upgrade ubuntu from 14.04 to 18.04?Minimize animation in Ubuntu 18.04Ubuntu 18.04 LTS Disk Partition RecomendationsBrightness problem Ubuntu 18.04 LTSShould I install Ubuntu 18.04 LTS or 16.04 (64 bit) for Core i5 M540?Ubuntu 18.04 freezesUbuntu 18.04 Screen brightness fluctuatingAnti virus for Ubuntu 18.04

Usage of the relative pronoun "dont"

What color to choose as "danger" if the main color of my app is red

When the match time is called, does the current turn end immediately?

Write electromagnetic field tensor in terms of four-vector potential

What kind of environment would favor hermaphroditism in a sentient species over regular, old sexes?

Why is it correct to use ~た in this sentence, even though we're talking about next week?

How come Arya Stark didn't burn in Game of Thrones Season 8 Episode 5

Would it be fair to use 1d30 (instead of rolling 2d20 and taking the higher die) for advantage rolls?

How to know the path of a particular software?

Is there any deeper thematic meaning to the white horse that Arya finds in The Bells (S08E05)?

Cycling to work - 30mile return

Refer a string as a field API name

FIFO data structure in pure C

How long do Aarakocra live?

Have there been any examples of re-usable rockets in the past?

Physically unpleasant work environment

Is there an academic word that means "to split hairs over"?

Solenoid fastest possible release - for how long should reversed polarity be applied?

Was the dragon prowess intentionally downplayed in S08E04?

Could a space colony 1g from the sun work?

Why would company (decision makers) wait for someone to retire, rather than lay them off, when their role is no longer needed?

Why is vowel phonology represented in a trapezoid instead of a square?

How can I safely determine the output voltage and current of a transformer?

Why does string strummed with finger sound different from the one strummed with pick?



Antivirus for Ubuntu 18.04


Do I need to have antivirus software installed?Is it ok to run more than one antivirus program?Does Ubuntu come with Anti-VirusHow to upgrade ubuntu from 14.04 to 18.04?Minimize animation in Ubuntu 18.04Ubuntu 18.04 LTS Disk Partition RecomendationsBrightness problem Ubuntu 18.04 LTSShould I install Ubuntu 18.04 LTS or 16.04 (64 bit) for Core i5 M540?Ubuntu 18.04 freezesUbuntu 18.04 Screen brightness fluctuatingAnti virus for Ubuntu 18.04






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








21















I have upgraded into Ubuntu 18.04.2 LTS. I have worked primarily with Windows and secondarily with Ubuntu (14.04 and 16.04). I will work with Ubuntu 18.04 as my main Operational System (distribution). I want to ask if it is necessary to install an anti-virus and if the answer is affirmative what is the better choice (free of course:-)!).










share|improve this question

















  • 6





    You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )

    – Rinzwind
    May 5 at 14:28







  • 1





    If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware

    – mattia.b89
    May 5 at 15:28






  • 6





    Possible duplicate of Do I need to have antivirus software installed?

    – Fabby
    May 6 at 9:30

















21















I have upgraded into Ubuntu 18.04.2 LTS. I have worked primarily with Windows and secondarily with Ubuntu (14.04 and 16.04). I will work with Ubuntu 18.04 as my main Operational System (distribution). I want to ask if it is necessary to install an anti-virus and if the answer is affirmative what is the better choice (free of course:-)!).










share|improve this question

















  • 6





    You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )

    – Rinzwind
    May 5 at 14:28







  • 1





    If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware

    – mattia.b89
    May 5 at 15:28






  • 6





    Possible duplicate of Do I need to have antivirus software installed?

    – Fabby
    May 6 at 9:30













21












21








21


2






I have upgraded into Ubuntu 18.04.2 LTS. I have worked primarily with Windows and secondarily with Ubuntu (14.04 and 16.04). I will work with Ubuntu 18.04 as my main Operational System (distribution). I want to ask if it is necessary to install an anti-virus and if the answer is affirmative what is the better choice (free of course:-)!).










share|improve this question














I have upgraded into Ubuntu 18.04.2 LTS. I have worked primarily with Windows and secondarily with Ubuntu (14.04 and 16.04). I will work with Ubuntu 18.04 as my main Operational System (distribution). I want to ask if it is necessary to install an anti-virus and if the answer is affirmative what is the better choice (free of course:-)!).







18.04 antivirus






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked May 5 at 10:53









DimitrisDimitris

23139




23139







  • 6





    You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )

    – Rinzwind
    May 5 at 14:28







  • 1





    If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware

    – mattia.b89
    May 5 at 15:28






  • 6





    Possible duplicate of Do I need to have antivirus software installed?

    – Fabby
    May 6 at 9:30












  • 6





    You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )

    – Rinzwind
    May 5 at 14:28







  • 1





    If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware

    – mattia.b89
    May 5 at 15:28






  • 6





    Possible duplicate of Do I need to have antivirus software installed?

    – Fabby
    May 6 at 9:30







6




6





You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )

– Rinzwind
May 5 at 14:28






You don't need it -unless- you use Linux as a gateway and have Windows machines behind your gateway. Then you can scan your files before sending them to those machines. There are zero known virusses; any virus known is either a proof of concept that did not leave a laboratory setting or where you need to download and install it yourself. Stick to installing from official sources and there is near zero risk (not totally zero as Mint once got their website hacked, That kind of thing could happen to Canonical too ;) )

– Rinzwind
May 5 at 14:28





1




1





If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware

– mattia.b89
May 5 at 15:28





If you are worried about security (and not only virus) you may want to have tools like rkhunter against rootkits and other malware

– mattia.b89
May 5 at 15:28




6




6





Possible duplicate of Do I need to have antivirus software installed?

– Fabby
May 6 at 9:30





Possible duplicate of Do I need to have antivirus software installed?

– Fabby
May 6 at 9:30










7 Answers
7






active

oldest

votes


















26














This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.



Alternatively as described here you can open a terminal and type:



sudo apt-get install clamtk


or load it through Synaptic Package Manager.






share|improve this answer




















  • 16





    The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.

    – Rinzwind
    May 5 at 14:32











  • @colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.

    – Rinzwind
    May 6 at 12:45











  • Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that

    – Rinzwind
    May 6 at 13:03







  • 1





    @Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.

    – Underverse
    May 6 at 14:05


















18














Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....



EDIT: See this article for further information.






share|improve this answer




















  • 8





    I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.

    – Carolus
    May 5 at 15:13






  • 1





    @Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.

    – Ethunxxx
    May 5 at 15:33


















9














Anti-virus software does not just look for viruses.



You will also want to look at rkhunter which looks for root kits.



While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.






share|improve this answer























  • I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.

    – Federico Poloni
    May 6 at 22:30


















7














No, you need no anti-virus program.



There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.



For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.



When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums to check all system programs for integrity, too.



As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.



A stupid and harmful joke is that people suggest to run rm -rf /, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).



Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb. This will run fine when you have one hard disk (sda) and the usb stick (sdb). But when you have a second hard disk, the usb stick will be sdc and your second hard disk is sdb and you will overwrite your data.

So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.



In summary:



  • Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)

  • Do not use SSH unless you need to

  • Use a good password, especially when allowing remote access

  • Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.





share|improve this answer






























    6














    My reply to answers like:




    "From my personal experience you don't need an antivirus"




    From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.



    These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.



    Also, remember that we all use Web browsers, and there are many browser centered attacks.



    It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:



    1. I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.


    2. I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.


    3. I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.


    So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.






    share|improve this answer




















    • 1





      Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.

      – James_pic
      May 7 at 14:35











    • you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD

      – xCovelus
      May 8 at 8:47


















    4














    As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command



    $ sudo ufw enable


    you can then enable logging if you want with the command



    $ sudo ufw logging on


    If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.



    To install type



    $ sudo snap install ufw


    As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.






    share|improve this answer























    • that is a very good advice

      – xCovelus
      May 8 at 8:46


















    1














    You do need to install antivirus linux can not have virus
    The system is so powerful its not like windows so no need
    Dont trouble yourself my friend






    share|improve this answer








    New contributor



    Shamgar Musobero is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.



















    • Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses

      – xCovelus
      yesterday












    Your Answer








    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "89"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader:
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    ,
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













    draft saved

    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1140679%2fantivirus-for-ubuntu-18-04%23new-answer', 'question_page');

    );

    Post as a guest















    Required, but never shown

























    7 Answers
    7






    active

    oldest

    votes








    7 Answers
    7






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    26














    This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.



    Alternatively as described here you can open a terminal and type:



    sudo apt-get install clamtk


    or load it through Synaptic Package Manager.






    share|improve this answer




















    • 16





      The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.

      – Rinzwind
      May 5 at 14:32











    • @colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.

      – Rinzwind
      May 6 at 12:45











    • Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that

      – Rinzwind
      May 6 at 13:03







    • 1





      @Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.

      – Underverse
      May 6 at 14:05















    26














    This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.



    Alternatively as described here you can open a terminal and type:



    sudo apt-get install clamtk


    or load it through Synaptic Package Manager.






    share|improve this answer




















    • 16





      The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.

      – Rinzwind
      May 5 at 14:32











    • @colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.

      – Rinzwind
      May 6 at 12:45











    • Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that

      – Rinzwind
      May 6 at 13:03







    • 1





      @Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.

      – Underverse
      May 6 at 14:05













    26












    26








    26







    This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.



    Alternatively as described here you can open a terminal and type:



    sudo apt-get install clamtk


    or load it through Synaptic Package Manager.






    share|improve this answer















    This article suggests not to, but if nonetheless you wish to install AV software, ClamTK downloadable from the Ubuntu Software Centre will provide some peace of mind.



    Alternatively as described here you can open a terminal and type:



    sudo apt-get install clamtk


    or load it through Synaptic Package Manager.







    share|improve this answer














    share|improve this answer



    share|improve this answer








    edited May 5 at 13:56









    Community

    1




    1










    answered May 5 at 11:21









    GrahamGraham

    2,71161931




    2,71161931







    • 16





      The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.

      – Rinzwind
      May 5 at 14:32











    • @colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.

      – Rinzwind
      May 6 at 12:45











    • Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that

      – Rinzwind
      May 6 at 13:03







    • 1





      @Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.

      – Underverse
      May 6 at 14:05












    • 16





      The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.

      – Rinzwind
      May 5 at 14:32











    • @colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.

      – Rinzwind
      May 6 at 12:45











    • Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that

      – Rinzwind
      May 6 at 13:03







    • 1





      @Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.

      – Underverse
      May 6 at 14:05







    16




    16





    The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.

    – Rinzwind
    May 5 at 14:32





    The hit on performance, the time wasted scanning, wasted on negative results never ever will make up for the amount of linux virusses it will find. All these scanners are good for is scanning windows files.

    – Rinzwind
    May 5 at 14:32













    @colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.

    – Rinzwind
    May 6 at 12:45





    @colbycdev That's a windows attitude you have there. Please do not apply that to Linux. We install software from --trusted-- sources. Period. That is all anyone must adhere to. Trusted sources are per definition free of malware (so not just virusses; also rootkits). Download random crap from the web and installing it where you provide your sudo password is on THAT user but not applicable to the whole Linux user base. Yes, rootkits are a thing but we are talking virusses here. Not rootkits. As there are ZERO virusses active for Linuix a scanner is only useful for scanning windows files.

    – Rinzwind
    May 6 at 12:45













    Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that

    – Rinzwind
    May 6 at 13:03






    Yes. I do security audits. " "Zero viruses" indicates you have not." Yes I have. There are zero active virusses for Linux . All of the 42 that might be a problem you need to install yourself. We are talking -virusses- not rootkits. virusses have 2 points of entry: mail and downloads. The 1st you do online and the 2nd you do from trusted sources. An admin provides for ONLINE mail and blocks ANY untrusted sources plus the execution of software by the user. Nowhere does a linux admin need a virusscanner for that

    – Rinzwind
    May 6 at 13:03





    1




    1





    @Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.

    – Underverse
    May 6 at 14:05





    @Rinzwind Bad things can still happen from "trusted" sources. Look at the ME in Intel chips as a good start - yes, I know, hidden code in a hidden system but you still expect to be able to trust your own CPU. A bit of paranoia can't hurt. Also, not everyone installs from trusted sources. How do I know that the game files from GoG or HumbleBundle are not contaminated - beyond trusting those sources. It's not a bad idea to think like Windows users are forced to act in preparation to for the day when Linux becomes the next target.

    – Underverse
    May 6 at 14:05













    18














    Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....



    EDIT: See this article for further information.






    share|improve this answer




















    • 8





      I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.

      – Carolus
      May 5 at 15:13






    • 1





      @Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.

      – Ethunxxx
      May 5 at 15:33















    18














    Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....



    EDIT: See this article for further information.






    share|improve this answer




















    • 8





      I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.

      – Carolus
      May 5 at 15:13






    • 1





      @Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.

      – Ethunxxx
      May 5 at 15:33













    18












    18








    18







    Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....



    EDIT: See this article for further information.






    share|improve this answer















    Based on my experience from using Ubuntu as my main operating system for more than 5 years and 18.04 for more than one year, you do not need anti-virus software at all. I don't use it and never had any problems so far. That said, you should always adhere to the usual safety rules: Do not open/download unknown files, install software from trusted sources, keep your system updated, etc....



    EDIT: See this article for further information.







    share|improve this answer














    share|improve this answer



    share|improve this answer








    edited May 7 at 6:54

























    answered May 5 at 12:21









    EthunxxxEthunxxx

    324212




    324212







    • 8





      I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.

      – Carolus
      May 5 at 15:13






    • 1





      @Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.

      – Ethunxxx
      May 5 at 15:33












    • 8





      I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.

      – Carolus
      May 5 at 15:13






    • 1





      @Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.

      – Ethunxxx
      May 5 at 15:33







    8




    8





    I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.

    – Carolus
    May 5 at 15:13





    I think personal experience is invalid argument here. Firstly personal habits can vary a lot and someone might be completely safe even on Windows 2000. Secondly not noticing any problems does not mean an uninfected system.

    – Carolus
    May 5 at 15:13




    1




    1





    @Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.

    – Ethunxxx
    May 5 at 15:33





    @Carolus you are right. It's just my experience, feel free to post your own as well. In this case there is no clear right or wrong, as it depends on many factors, but if most people (standard users) get along without AV, then it might be an indication for OP.

    – Ethunxxx
    May 5 at 15:33











    9














    Anti-virus software does not just look for viruses.



    You will also want to look at rkhunter which looks for root kits.



    While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.






    share|improve this answer























    • I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.

      – Federico Poloni
      May 6 at 22:30















    9














    Anti-virus software does not just look for viruses.



    You will also want to look at rkhunter which looks for root kits.



    While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.






    share|improve this answer























    • I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.

      – Federico Poloni
      May 6 at 22:30













    9












    9








    9







    Anti-virus software does not just look for viruses.



    You will also want to look at rkhunter which looks for root kits.



    While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.






    share|improve this answer













    Anti-virus software does not just look for viruses.



    You will also want to look at rkhunter which looks for root kits.



    While Linux/Unix has little notion of viruses, that does not mean to say that software cannot be loaded on to these systems through known vulnerabilities and be executed. Anti-virus software can also look for these.







    share|improve this answer












    share|improve this answer



    share|improve this answer










    answered May 5 at 15:26









    BibBib

    911




    911












    • I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.

      – Federico Poloni
      May 6 at 22:30

















    • I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.

      – Federico Poloni
      May 6 at 22:30
















    I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.

    – Federico Poloni
    May 6 at 22:30





    I'm not sure the difference between a virus and a rootkit is a meaningful one at this level.

    – Federico Poloni
    May 6 at 22:30











    7














    No, you need no anti-virus program.



    There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.



    For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.



    When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums to check all system programs for integrity, too.



    As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.



    A stupid and harmful joke is that people suggest to run rm -rf /, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).



    Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb. This will run fine when you have one hard disk (sda) and the usb stick (sdb). But when you have a second hard disk, the usb stick will be sdc and your second hard disk is sdb and you will overwrite your data.

    So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.



    In summary:



    • Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)

    • Do not use SSH unless you need to

    • Use a good password, especially when allowing remote access

    • Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.





    share|improve this answer



























      7














      No, you need no anti-virus program.



      There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.



      For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.



      When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums to check all system programs for integrity, too.



      As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.



      A stupid and harmful joke is that people suggest to run rm -rf /, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).



      Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb. This will run fine when you have one hard disk (sda) and the usb stick (sdb). But when you have a second hard disk, the usb stick will be sdc and your second hard disk is sdb and you will overwrite your data.

      So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.



      In summary:



      • Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)

      • Do not use SSH unless you need to

      • Use a good password, especially when allowing remote access

      • Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.





      share|improve this answer

























        7












        7








        7







        No, you need no anti-virus program.



        There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.



        For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.



        When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums to check all system programs for integrity, too.



        As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.



        A stupid and harmful joke is that people suggest to run rm -rf /, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).



        Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb. This will run fine when you have one hard disk (sda) and the usb stick (sdb). But when you have a second hard disk, the usb stick will be sdc and your second hard disk is sdb and you will overwrite your data.

        So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.



        In summary:



        • Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)

        • Do not use SSH unless you need to

        • Use a good password, especially when allowing remote access

        • Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.





        share|improve this answer













        No, you need no anti-virus program.



        There are a few, but they look for Windows viruses. For example clamav is useful when you run a e-mail server and want to filter e-mails with virus attachments. But it is not very useful for Linux malware.



        For Linux there is little malware at all and most of it is not targeting your desktop computer. The most common problem is malware installed via remote access tools (usually due to weak passwords) like SSH. It tends to send spam mails and scan for other vulnerable systems trying not to be found.



        When a malware gets root access, it may try to hide using a rootkit. You can use rkhunter to find common rootkits. The program runs fast, as the list is rather short. There are tools like debsums to check all system programs for integrity, too.



        As an Ubuntu user, you will get most software from the trusted repository of your distribution and that will keep you safe. Be aware that there are some harmful things you can do when following different advise to "just copy this into your terminal" or add PPA repositories from people you do not know.



        A stupid and harmful joke is that people suggest to run rm -rf /, what deletes all files on your computer. (This one may be prevented by now, but a slightly different variant will still do the same).



        Other things include running things without really understanding them, when your system is slightly different than the author's system. For example some howto for copying an ubuntu image to a usb stick may include dd if=ubuntu.img of=/dev/sdb. This will run fine when you have one hard disk (sda) and the usb stick (sdb). But when you have a second hard disk, the usb stick will be sdc and your second hard disk is sdb and you will overwrite your data.

        So do not run scripts, you do not understand how they work, if you are not sure that the author thought about things like this.



        In summary:



        • Use software from Ubuntu only (this is the default, if you do not add PPAs or download .deb packages or scripts)

        • Do not use SSH unless you need to

        • Use a good password, especially when allowing remote access

        • Do not run random commands, that some stranger one the internet recommended, if you do not understand what they do.






        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered May 6 at 9:11









        alloallo

        53517




        53517





















            6














            My reply to answers like:




            "From my personal experience you don't need an antivirus"




            From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.



            These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.



            Also, remember that we all use Web browsers, and there are many browser centered attacks.



            It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:



            1. I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.


            2. I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.


            3. I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.


            So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.






            share|improve this answer




















            • 1





              Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.

              – James_pic
              May 7 at 14:35











            • you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD

              – xCovelus
              May 8 at 8:47















            6














            My reply to answers like:




            "From my personal experience you don't need an antivirus"




            From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.



            These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.



            Also, remember that we all use Web browsers, and there are many browser centered attacks.



            It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:



            1. I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.


            2. I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.


            3. I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.


            So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.






            share|improve this answer




















            • 1





              Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.

              – James_pic
              May 7 at 14:35











            • you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD

              – xCovelus
              May 8 at 8:47













            6












            6








            6







            My reply to answers like:




            "From my personal experience you don't need an antivirus"




            From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.



            These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.



            Also, remember that we all use Web browsers, and there are many browser centered attacks.



            It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:



            1. I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.


            2. I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.


            3. I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.


            So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.






            share|improve this answer















            My reply to answers like:




            "From my personal experience you don't need an antivirus"




            From a cyber-security defense focused company, our cyber-security experts do recommend to use antivirus for Linux or MacOS. Indeed, it is an internal requirement to have antivirus installed in our workstations.



            These systems have less market (if we don't take into account Android) then, also a smaller target from the bad guys and, therefore, viruses (and malware) are less common, and by Unix stronger design, it is more difficult to develop virus/malware for GNU/Linux, but sometimes safe options are disabled (as memory randomization in Linux), and, there is no safe software.



            Also, remember that we all use Web browsers, and there are many browser centered attacks.



            It is easy to think that you are protected because you use a Unix, like GNU/Linux, BSD or MacOS. But this is very wrong. Indeed:



            1. I had heard a similar answer from the MacOS community, and I have found myself bitcoin miners in MacOS laptops.


            2. I have also seen also in other companies old unprotected GNU/Linux servers (no updates, not proper firewall rules on the server SW FW, no anti-virus/anti-malware) being victims of ransomware attacks, under bitcoins demands to be decrypted.


            3. I have seen several cyber-security products packed into virtual appliances (used to distribute deployable VMs), and all come with ClamTk, a firewall, etc. If these guys include them, I tend to think there's a reason behind it.


            So, my free advice: change your mindset, install ClamAV, ClamTk, check that your distro good firewall is enabled, and be careful on the Internet.







            share|improve this answer














            share|improve this answer



            share|improve this answer








            edited May 8 at 8:49

























            answered May 7 at 10:17









            xCovelusxCovelus

            635




            635







            • 1





              Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.

              – James_pic
              May 7 at 14:35











            • you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD

              – xCovelus
              May 8 at 8:47












            • 1





              Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.

              – James_pic
              May 7 at 14:35











            • you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD

              – xCovelus
              May 8 at 8:47







            1




            1





            Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.

            – James_pic
            May 7 at 14:35





            Typically, when servers are running bitcoin miners, it's not because they have viruses, but because software they are running has security vulnerabilities that have enabled attackers to gain access to them (which rarely involves installing viruses). Ransomware is slightly more likely to be caught by AV software, but odds still aren't great, partly because attackers may disable AV before proceeding. And this all overlooks the fact that AV software can, itself, have security vulnerabilities, so can leave you more vulnerable than you would be without it.

            – James_pic
            May 7 at 14:35













            you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD

            – xCovelus
            May 8 at 8:47





            you are right, but malware I meant, trojans are also not viruses, but we abuse of language everyday, also, anti-virus prevent more than virus, the right name should be anti-malware (there are also products with that name), but, well, c'est la vie xD

            – xCovelus
            May 8 at 8:47











            4














            As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command



            $ sudo ufw enable


            you can then enable logging if you want with the command



            $ sudo ufw logging on


            If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.



            To install type



            $ sudo snap install ufw


            As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.






            share|improve this answer























            • that is a very good advice

              – xCovelus
              May 8 at 8:46















            4














            As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command



            $ sudo ufw enable


            you can then enable logging if you want with the command



            $ sudo ufw logging on


            If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.



            To install type



            $ sudo snap install ufw


            As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.






            share|improve this answer























            • that is a very good advice

              – xCovelus
              May 8 at 8:46













            4












            4








            4







            As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command



            $ sudo ufw enable


            you can then enable logging if you want with the command



            $ sudo ufw logging on


            If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.



            To install type



            $ sudo snap install ufw


            As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.






            share|improve this answer













            As already mentioned above you might not need one but you should get yourself a firewall, Ubuntu has one but it's not enabled by default. UFW or UncomplicatedFireWall is ubuntu's solution. Enable it with the command



            $ sudo ufw enable


            you can then enable logging if you want with the command



            $ sudo ufw logging on


            If for whatever reason 'ufw' is not installed you can install it using both snap and apt package managers.



            To install type



            $ sudo snap install ufw


            As already mentioned not many viruses are built or targeted for Linux. You would not have to worry about a MITM attack. Your only real risk is if someone is targeting you.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered May 7 at 15:25









            XeonUnkownXeonUnkown

            411




            411












            • that is a very good advice

              – xCovelus
              May 8 at 8:46

















            • that is a very good advice

              – xCovelus
              May 8 at 8:46
















            that is a very good advice

            – xCovelus
            May 8 at 8:46





            that is a very good advice

            – xCovelus
            May 8 at 8:46











            1














            You do need to install antivirus linux can not have virus
            The system is so powerful its not like windows so no need
            Dont trouble yourself my friend






            share|improve this answer








            New contributor



            Shamgar Musobero is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.



















            • Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses

              – xCovelus
              yesterday
















            1














            You do need to install antivirus linux can not have virus
            The system is so powerful its not like windows so no need
            Dont trouble yourself my friend






            share|improve this answer








            New contributor



            Shamgar Musobero is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.



















            • Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses

              – xCovelus
              yesterday














            1












            1








            1







            You do need to install antivirus linux can not have virus
            The system is so powerful its not like windows so no need
            Dont trouble yourself my friend






            share|improve this answer








            New contributor



            Shamgar Musobero is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.









            You do need to install antivirus linux can not have virus
            The system is so powerful its not like windows so no need
            Dont trouble yourself my friend







            share|improve this answer








            New contributor



            Shamgar Musobero is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.








            share|improve this answer



            share|improve this answer






            New contributor



            Shamgar Musobero is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.








            answered May 9 at 9:38









            Shamgar MusoberoShamgar Musobero

            111




            111




            New contributor



            Shamgar Musobero is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.




            New contributor




            Shamgar Musobero is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.














            • Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses

              – xCovelus
              yesterday


















            • Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses

              – xCovelus
              yesterday

















            Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses

            – xCovelus
            yesterday






            Way better than Windows, but your answer is still wrong: en.wikipedia.org/wiki/Linux_malware#Viruses

            – xCovelus
            yesterday


















            draft saved

            draft discarded
















































            Thanks for contributing an answer to Ask Ubuntu!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid


            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.

            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1140679%2fantivirus-for-ubuntu-18-04%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Wikipedia:Vital articles Мазмуну Biography - Өмүр баян Philosophy and psychology - Философия жана психология Religion - Дин Social sciences - Коомдук илимдер Language and literature - Тил жана адабият Science - Илим Technology - Технология Arts and recreation - Искусство жана эс алуу History and geography - Тарых жана география Навигация менюсу

            Bruxelas-Capital Índice Historia | Composición | Situación lingüística | Clima | Cidades irmandadas | Notas | Véxase tamén | Menú de navegacióneO uso das linguas en Bruxelas e a situación do neerlandés"Rexión de Bruxelas Capital"o orixinalSitio da rexiónPáxina de Bruselas no sitio da Oficina de Promoción Turística de Valonia e BruxelasMapa Interactivo da Rexión de Bruxelas-CapitaleeWorldCat332144929079854441105155190212ID28008674080552-90000 0001 0666 3698n94104302ID540940339365017018237

            What should I write in an apology letter, since I have decided not to join a company after accepting an offer letterShould I keep looking after accepting a job offer?What should I do when I've been verbally told I would get an offer letter, but still haven't gotten one after 4 weeks?Do I accept an offer from a company that I am not likely to join?New job hasn't confirmed starting date and I want to give current employer as much notice as possibleHow should I address my manager in my resignation letter?HR delayed background verification, now jobless as resignedNo email communication after accepting a formal written offer. How should I phrase the call?What should I do if after receiving a verbal offer letter I am informed that my written job offer is put on hold due to some internal issues?Should I inform the current employer that I am about to resign within 1-2 weeks since I have signed the offer letter and waiting for visa?What company will do, if I send their offer letter to another company