TIP: Click on subject to list as thread! ANSI
echo: linux
to: ALL
from: David_Drummond@f305.n640.z3
date: 2005-10-26 21:16:27
subject: linux virus

Path: number1.nntp.dca.giganews.com!local01.nntp.dca.giganews.com!nntp.adelphia.com!news.adelphia.com.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 26 Oct 2005 21:16:27 -0500
Newsgroups: fidonet.linux
From: David_Drummond@f305.n640.z3
Date: Mon, 24 Oct 2005 02:58:58 -0400
Subject: linux virus
Message-ID: 
References: 
Organization: news://fido.jabberwocky.com.au
 456
 205/1
 267/200
Lines: 46
NNTP-Posting-Host: 24.48.121.215
 properly
Xref: number1.nntp.dca.giganews.com fidonet.linux:92

CHARLES ANGELICH -> ALL wrote:

 CA> ---------------------

 CA> Linux.RST.B is a linux-based virus that infects ELF files and
 CA> has backdoor capabilities.

 CA> Also Known As: Linux.RST.b [Kaspersky], Linux/RST.B [RAV]

 CA> Type: Virus

 CA> Systems Affected: Linux



But they don't explain how I might catch these things.

In Windows, when a virus arrives in an email, we only have to click on the
attachment to give it unlimited access to our systems (although this is being
fixed in the later versions).

This does not happen with Linux.




 CA> The worm targets servers using version 6.2 and 7.0 of Redhat
 CA> Linux. The program looks for well known loopholes in these
 CA> versions and exploits them to copy itself on to the vulnerable
 CA> machines.

Linux is much bigger than Red Hat 6.2/7.0

I repeat, I do not run any sort of virus checking software on my Linux machines
as I do not consider them susceptible to on of the minute few incidences of
malware out there.

Until someone can convincingly explain otherwise, I will stand by my decision.
Reposting the sales blurb from interested software houses just doesn't cut it.

-- 

regards

David

SOURCE: echoes via archive.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.