People,

I have been using Linux since the 0.9 kernel days and had to deal with the first worm to an infect a Linux system many years ago. I haven't allowed remote ssh access to any of my LANs for a long time now but of course crap still comes in via email - mostly spam but also from infected computers of friends, family and colleagues.

Periodically I have installed CAV and then quarantined nasties etc but I have always wondered: Is it possible to (incrementally?) install anti-malware to an infected machine and gradually clean up all the file systems? - or does it require booting from a live, clean USB system and scanning the mounted HD file systems to be more confident that the system will be cleaned properly? I always imagined that really smart malware would not just have mechanisms for avoiding detection but would also be able to actively thwart / disable any anti-malware setup that was installed on an already-infected system?

Thanks for any feedback or links to info on this sort of stuff! It is major PITA that we have to deal with this crap at all - but that is the state of affairs I guess . .

Phil.

--
Philip Rhoades

PO Box 896
Cowra  NSW  2794
Australia
E-mail:  p...@pricom.com.au
_______________________________________________

Manage your clamav-users mailing list subscription / unsubscribe:
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat

Reply via email to