Path: number1.nntp.dca.giganews.com!local01.nntp.dca.giganews.com!nntp.adelphia.com!news.adelphia.com.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 26 Oct 2005 21:16:27 -0500
Newsgroups: fidonet.linux
From: David_Drummond@f305.n640.z3
Date: Mon, 24 Oct 2005 02:58:58 -0400
Subject: linux virus
Message-ID:
References:
Organization: news://fido.jabberwocky.com.au
456
205/1
267/200
Lines: 46
NNTP-Posting-Host: 24.48.121.215
properly
Xref: number1.nntp.dca.giganews.com fidonet.linux:92
CHARLES ANGELICH -> ALL wrote:
CA> ---------------------
CA> Linux.RST.B is a linux-based virus that infects ELF files and
CA> has backdoor capabilities.
CA> Also Known As: Linux.RST.b [Kaspersky], Linux/RST.B [RAV]
CA> Type: Virus
CA> Systems Affected: Linux
But they don't explain how I might catch these things.
In Windows, when a virus arrives in an email, we only have to click on the
attachment to give it unlimited access to our systems (although this is being
fixed in the later versions).
This does not happen with Linux.
CA> The worm targets servers using version 6.2 and 7.0 of Redhat
CA> Linux. The program looks for well known loopholes in these
CA> versions and exploits them to copy itself on to the vulnerable
CA> machines.
Linux is much bigger than Red Hat 6.2/7.0
I repeat, I do not run any sort of virus checking software on my Linux machines
as I do not consider them susceptible to on of the minute few incidences of
malware out there.
Until someone can convincingly explain otherwise, I will stand by my decision.
Reposting the sales blurb from interested software houses just doesn't cut it.
--
regards
David
|