Oh sure... Rootkits almost *ALWAYS* take stupid user interaction to fulfill their destiny. In other words, they MUST BE purposely installed by a user. that is on the system. Unlike being able to do it without breaking a sweat in Windows.
Sort of like Sony's CDROM Rootkit to make sure DRM was safe, if you put one of their CDs in... poof autorun automagically put it on. All without user intervention. Or better yet, let us take a look, most of the problems with Rootkits require access to the machine, either from the console or from a remote login to the machine. Desktop machines running an Apache webserver out on the internet... just asking for trouble. But most of the time it is minimized to the user account if properly chroot'd. Among other things... Usually if the USER gets exploited with a piece of malware, the machine itself is fine, as long as the user didn;t automatically say "SURE" go ahead and install this unknown and out of nowhere piece of software. Yeah. What is the threshold for Human ignorance and trojans/virus/etc... we can never get around that. But the Unix separation of Privileges model can mitigate much or most of the issue. On Sat, Jul 20, 2013 at 5:51 AM, Henri Salo <he...@nerv.fi> wrote: > On Sat, Jul 20, 2013 at 03:07:41PM +0530, Kaushal Shriyan wrote: > > Thanks Al Varnell. Is Linux Desktop or Server prone to Virus Attack, > > trojan,worm,malware/spyware or rootkit.? > > > > Regards > > Kaushal > > Yes. Lots of discussion about the subject in the internet. Try searching > for > example "Linux rootkit". > > --- > Henri Salo > > _______________________________________________ > Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net > http://www.clamav.net/support/ml > -- greg folkert - systems administration and support web: donor.com email: g...@donor.com phone: 877-751-3300 x416 local: 616-328-6449 _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml