view the rest of the comments
No Stupid Questions
No such thing. Ask away!
!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.
The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:
Rules (interactive)
Rule 1- All posts must be legitimate questions. All post titles must include a question.
All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.
Rule 2- Your question subject cannot be illegal or NSFW material.
Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.
Rule 3- Do not seek mental, medical and professional help here.
Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.
Rule 4- No self promotion or upvote-farming of any kind.
That's it.
Rule 5- No baiting or sealioning or promoting an agenda.
Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.
Rule 6- Regarding META posts and joke questions.
Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.
On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.
If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.
Rule 7- You can't intentionally annoy, mock, or harass other members.
If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.
Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.
Rule 8- All comments should try to stay relevant to their parent content.
Rule 9- Reposts from other platforms are not allowed.
Let everyone have their own content.
Rule 10- Majority of bots aren't allowed to participate here.
Credits
Our breathtaking icon was bestowed upon us by @Cevilia!
The greatest banner of all time: by @TheOneWithTheHair!
I don't think dedicated antivirus software is really required anymore. I haven't run third-party AV software on any of my systems in the last decade.
On Windows, the built-in Windows Defender is good enough for most use cases. When it first launched Defender had a pretty bad track record at stopping viruses, but now it routinely ranks at the top.
On Linux, antivirus software has never really been required. One major exception I can think of would be if you're running a file server or mail server that talks to OSX or Windows systems. Even then the AV software isn't really there to protect the server, it's there to make sure you don't pass malware or viruses to those non-Linux clients.
Can you please help me understand why antivirus is not needed on linux? Are there no viruses for linuxor what?
Generally speaking, in reverse order of strength of argument:
Mostly it just doesn't make sense for attackers looking for low hanging fruit to attack Linux machines.
The last point is probably biggest point today. A hacker wants your money, and you as an individual do not have that much money. A company on the other hand, they can pay up big.
Since a lot of companies use Windows, they target that, because that is where the money is.
Except servers. They are very much an attack vector there.
Nonsense. Hackers get money these days by holding data to ransom.
Not much data on personal computers.
That's what I said.
Companies don't store ransomable data on employee's personal computers.
Windows Server also exists.
So... viruses target Windows server rather than Windows?
I think it is more about market share than anything. Viruses targeting the end user are, I think, fairly uncommon. But I don't think remote and local exploits are particularly rare since Linux has massive server market share. I don't have stats handy so maybe I'm full of it, idk.
I don't think Windows has much in the way of default exploitable services anymore. Neither does Linux. I mean back around 2000 it was kind of a nightmare on both platforms. But default configs have gotten pretty good in 20+ years.
I'm not aware of a whole lot preventing various local privilege escalation attacks on Linux but maybe there have been developments in the last several years that I'm not aware of?
I know Windows 10 implements some additional memory protections for the LSA subsystem process to address Pass-The-Hash attacks.
Linux still has setuid/setgid executables as one vector. But I would imagine various forms of kernel exploits are more or less similar to both.
There are some viruses that have targeted Linux, but they're rare compared to other platforms and their ability to spread is relatively low. One of the main reasons is just down to how software tends to be installed on each platform. Viruses have an easier time spreading on Windows or OSX where users are more accustomed to downloading an executable and running it. Once there's a malicious running process, it has a comparatively high chance to spread because it can attempt to escalate its privileges either by exploiting a bug or socially engineering the user to click through a privilege escalation prompt. That entire workflow is practically nonexistent on Linux, users just don't tend to download and execute random binaries. Instead most Linux software gets delivered in one of these ways, each of which has impediments that reduce the chance a virus could spread:
There are some exceptions, for example some companies like Hashicorp will distribute their stuff as precompiled binaries. Even in that case you're probably fine as long as you don't run the downloaded binary as root. Users in the habit of downloading strange binaries from sketchy places and running them as root just aren't very common among the Linux userbase. I'm sure there are some (and they should really stop doing that), but there aren't enough of them to allow a virus to spread unchecked.
FWIW Linux has malware too.
See the Threats section of this article:
https://en.wikipedia.org/wiki/Linux_malware#Threats
That's a cute little list