Yellow Fang
Legendary Member
- Location
- Reading
Why is Linux less vulnerable to virus attack? Is it more than it not being the dominant operating system?
chris667 said:There's a couple of other, important points.
The big advantage Linux has over windows is its repositories which are monitored, along with the use of md5 checksums to make sure software isn't modified by external sources. And, of course, you can look at the source code of anything written under the GPL, so you can see exactly what it does.
Still, it's not fair to say Linux is more secure than Windows. There is a lot of malicious code written to exploit Linux, and both systems have strengths and weaknesses.
Ben Lovejoy said:Here's a Linux virus:
evilmalware 0.6 (beta)
Copyright 2000, 2001, 2003, 2005 E/17 |-|4><0|2z Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY, COMPLETE DESTRUCTION OF IMPORTANT DATA or FITNESS FOR A PARTICULAR PURPOSE (eg. sending thousands of Viagra spams to people accross the world).
Basic Installation
Before attempting to compile this virus make sure you have the correct version of glibc installed, and that your firewall rules are set to ‘allow everything’.
- Put the attachment into the appropriate directory eg. /usr/src.
- Type ‘tar xvzf evilmalware.tar.gz’ to extract the source files for this virus.
- ‘cd’ to the directory containing the virus' source code and type ‘./configure’ to configure the virus for your system. If you're using ‘csh’ on an old version of System V, you might need to type ‘sh ./configure’ instead to prevent ‘csh’ from trying to execute ‘configure’ itself.
- Type ‘make’ to compile the package. You may need to be logged in as root to do this.
- Optionally, type ‘make check_payable’ to run any self-tests that come with the virus, and send a large donation to an unnumbered Swiss bank account.
- Type ‘make install’ to install the virus and any spyware, trojans pornography, penis enlargement adverts and DDoS attacks that come with it.
- You may now configure your preferred malware behaviour in /etc/evilmalware.conf.
![]()
What?2Loose said:There are virii