> > > <mailto:[EMAIL PROTECTED]> > If you're sharing a C:\ drive, you've got to be stark starting > mad... > That's soooo bad XP even warns you NOT to do it... > > I totally agree... But when you can control the way people can access > it, its not too bad, eg, having a password on it. > > I do this in a local network with only my machines, and I don't > recommend you do it otherwise (like in a public environment / office). > <Edit: Sorry for the long post :)>
Personally, I use samba shares at home - and don't bother with AV. My dual boot there has access to its windows drives, but doesn't scan - i have AVG in windows... At work, i have a samba server too - but that one does run Clam, of course!!! I have read http://en.wikipedia.org/wiki/List_of_Linux_computer_viruses and though i know that could have easily been written by Mr Gates & Co. I'm sure there is some accuracy in it. If this is a growing problem - then when do we need to start caring? Installing from the Repositories /should/ be 100% safe, and we like to think that installing stuff of source forge is too (because the source is open), but as more new/inexperienced Linux users emerge, the gateway is opening. Take for example, I write a cool program, "xyz", but i happen to put shell c99 (or worse) in the binary installer. Does anyone else think maybe it's a good idea to, say, have an option in Ubuntu install or something to have a memory resident AV enabled? (which most of us will probably so no to :) P.S. if anyone is wondering where this is all coming from, the topic of Fast Flux Hosting http://en.wikipedia.org/wiki/Fast_flux has come up at work and I'm doing some research into how they are compromising web servers. -- ubuntu-uk@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk https://wiki.kubuntu.org/UKTeam/