Alphalutra1 wrote:I am sorry, but something trying to give a virus (an executable that does harmful things to a computer) is not the same as someone trying to run an exploit on a piece of software and gain shell access through that exploit. You guys still haven't given me the virus or spyware example. I also find it hard to believe that there are linux botnets attacking ChrisRLG's computers, but of course there must be "lots" and so many, that he cannot reply and defend his incorrect statements.
Also, @ p;3, the machine doesn't need any protection. It needs the user to always log in as a user, have a good password for the root accout and their account. Also, don't' install stuff you don't need, and if you don't need SSH, turn it off. Also, stay current (or with the updated branch of your OS such as stable). Installing stuff only from repositories is also a good idea
THIS I find very difficult to beleive although I am hoping that someone from within the Uni will advise
and actually MY comment was for Person, whose thread this really IS
person; one assumes the machine in question does have protection on it? if so, what has been chosen? or is there an issue with it that it might BE infected?