(Reino Unido)
Variante 1.351 (Sudáfrica)
Variante P.1 (Brasil)
PRUEBA DE HISOPADO NASOFARINFEO QUE DETECTA NUEVAS VARIANTES DEL VIRUS
SARS-CoV-2.
(99.40% de especificidad y 99.30% de sensibilidad clínica)
Autorizadas por la SECRETARIA DE SALUD en apoyo a la emergencia sanitaria
causada por el
On Tue 12 Mar 2019 at 19:20:34 -0400, deb wrote:
> Fortunately Brian has blocked me,
Eh? You'll have to explain.
--
Brian.
On 3/11/19 5:08 PM, Mart van de Wege wrote:
And yeah, Debian is an upstream distribution, so you will have a lot of
people who are being overly purist about Linux solutions, because they
have the luxury of working in homogenous environments. Unfortunately a
lot of them are lousy communicators.
did not perceive the OP's request to be about the case where you
administer lots of machines and you want to use a Debian machine as
a virus-filter for all those other machines running Windows or whatnot.
So I assumed he meant "I do want to run A/V" to mean that he wants to
run an A/
Curt wrote:
> I don't follow how this follows from your erroneous attribution.
try harder ;-)
e.
> >
> > I did not perceive the OP's request to be about the case where you
> > administer lots of machines and you want to use a Debian machine as
> > a virus-filter for all those other machines running Windows or whatnot.
> >
> > So I assumed he meant &q
administer lots of machines and you want to use a Debian machine as
> a virus-filter for all those other machines running Windows or whatnot.
>
> So I assumed he meant "I do want to run A/V" to mean that he wants to
> run an A/V just like all random Windows users feel the ne
On Tue 12/Mar/2019 09:39:53 +0100 didier gaumet wrote:
> Wikipedia makes a comparison of Linux antivirus:
> https://en.wikipedia.org/wiki/Comparison_of_antivirus_software#Linux
It's astonishing that there is an "Email Security" column, with random yes/no
contents. I wrote a note on that:
http
nion that windows itself is a virus but just live with it
and don't keep anything on it I don't mind losing.
mick
--
Key ID4BFEBB31
On 2019-03-11, deloptes wrote:
> Curt wrote:
>
>> I don't believe he did, actually. I believe that's what Reco wrote.
>
> but there is no secure OS, as soon as you get connected to the network, and
> if you have a server with multiple users ... well. We used to put sensitive
> servers in DMZ aside
Wikipedia makes a comparison of Linux antivirus:
https://en.wikipedia.org/wiki/Comparison_of_antivirus_software#Linux
On 3/10/19 3:53 PM, Brian wrote:
On Sun 10 Mar 2019 at 13:18:54 -0400, deb wrote:
Crumogeon tip: It is no longer 1972. If you have nothing nice or at least
helpful to say on a USER list, say nothing at all.
All the responses were helpful. You just have to fit them into your
World View and
Debian machine as
a virus-filter for all those other machines running Windows or whatnot.
So I assumed he meant "I do want to run A/V" to mean that he wants to
run an A/V just like all random Windows users feel the need to run some
A/V software on their machine to feel safer.
Stefan
Curt wrote:
> I don't believe he did, actually. I believe that's what Reco wrote.
but there is no secure OS, as soon as you get connected to the network, and
if you have a server with multiple users ... well. We used to put sensitive
servers in DMZ aside of the user network - for a good reason.
ect). Just that instead of keeping your A/V
> up-to-date, the GNU/Linux approach to protecting oneself from attacks is
> to keep your OS up-to-date.
>
>
> Stefan
>
>
> PS: I guess that means I should have pointed to `unattended-upgrades`
> rather than to `apt` as the
> There is a spectrum of Windows software than runs between evil malware
> and legitimate programs, it isn't just black and white, and many
Agreed, but I doubt A/V software will know where to draw the line.
Stefan
On Mon, 11 Mar 2019 13:53:39 -0400
Stefan Monnier wrote:
> > re: apt solving all? I understand it recently had a long-time
> > vulnerability itself...
> > Linux will get hit more as it gets more popular.
>
> My point is not that APT and/or Debian is bullet-proof (I live under
> no delusion in
On Mon, 11 Mar 2019 11:45:28 -0400
Stefan Monnier wrote:
> > I think the premises of your syllogism might lead some to another
> > conclusion---that the livelihood of the AV software houses depends
> > upon the innate insecurity of the Windows OS.
>
> Hmm... they don't actually need that: they
date, the GNU/Linux approach to protecting oneself from attacks is
to keep your OS up-to-date.
Stefan
PS: I guess that means I should have pointed to `unattended-upgrades`
rather than to `apt` as the solution that corresponds to an anti-virus.
On 3/10/19 1:33 PM, Mart van de Wege wrote:
deb writes:
Starting assumption: I do want to run A/V.
* I get that it may actually INCREASE attack surface.
* But I have Windows & Mac stuff going back and forth to Debian 9.8
and just want to check.
When you say going back and forth, do you
> I think the premises of your syllogism might lead some to another
> conclusion---that the livelihood of the AV software houses depends upon
> the innate insecurity of the Windows OS.
Hmm... they don't actually need that: they only need people to
think that they're vulnerable (regardless if their
On 2019-03-11, Stefan Monnier wrote:
>> Not that I'm aware of. The thing is - instead of taking an insecure OS
>> and building assorted kludges (in the form of anti-virus) around it,
>> it's considered wise here to use a secure OS from the beginning.
>
> This is
I use clamav along with clamav-unofficial-sigs, Sanesecurity and Securiteinfo
(which I pay for)
Secondly, I use “Bitdefender Security for Mail Servers – Linux”, again which I
pay for.
I use clamav-milter and the bdmilterd to scan mail using clamav and Bit
Defender.
I must say that it was pret
> Not that I'm aware of. The thing is - instead of taking an insecure OS
> and building assorted kludges (in the form of anti-virus) around it,
> it's considered wise here to use a secure OS from the beginning.
This is misleading: all OSes are somewhat insecure, in practice.
T
On 2019-03-11, Paul Sutton wrote:
>
> On 10/03/2019 15:04, Sven Hartge wrote:
>> deb wrote:
>>
>>> a. What does the group suggest running on debian beyond
>>> - chkrootkit
>> Useless.
>>
>>> - rkhunter
>> Crap, unmaintained.
>>
>> Both tools produce more false positives than finding anyth
On 10/03/2019 15:04, Sven Hartge wrote:
> deb wrote:
>
>> a. What does the group suggest running on debian beyond
>> - chkrootkit
> Useless.
>
>> - rkhunter
> Crap, unmaintained.
>
> Both tools produce more false positives than finding anything, just
> creating a false sense of security
On 2019-03-11, deloptes wrote:
> deb wrote:
I don't believe he did, actually. I believe that's what Reco wrote.
>> Not that I'm aware of. The thing is - instead of taking an insecure OS
>> and building assorted kludges (in the form of anti-virus) around it,
>>
deb wrote:
> Not that I'm aware of. The thing is - instead of taking an insecure OS
> and building assorted kludges (in the form of anti-virus) around it,
> it's considered wise here to use a secure OS from the beginning.
If you have windows users in your network, the best is
deb wrote:
> ClamAV
I recall 15y ago we integrated kasperky into ClamAV. Easy to integrate and
easy to use. Worked great. I left this company couple of years later, but
it will not surprise me if they are still using the same setup.
On Sun 10 Mar 2019 at 13:18:54 -0400, deb wrote:
> I posted a question A/Vs and got negative waves like the below.
It only looks "negative" because you have an agenda. I myself thought
the responses were reasonable and balanced.
> Several people ASS-UMED I was trying to kludge Windows into Linux
On Sun, 10 Mar 2019 19:46:42 +
mick crane wrote:
> On 2019-03-10 17:13, Joe wrote:
> > On Sun, 10 Mar 2019 19:35:18 +0300
> > Reco wrote:
> >
> >>Hi.
> >>
> >> On Sun, Mar 10, 2019 at 04:32:42PM -, Curt wrote:
> >>
> >> >
> >> > I thought he was saying the surest approach is n
t;assorted help"
Not that I'm aware of. The thing is - instead of taking an insecure OS
and building assorted kludges (in the form of anti-virus) around it,
it's considered wise here to use a secure OS from the beginning.
I thought he was saying the surest approach is not touchi
Hi.
On Sun, Mar 10, 2019 at 05:13:35PM +, Joe wrote:
> On Sun, 10 Mar 2019 19:35:18 +0300
> Reco wrote:
> > On Sun, Mar 10, 2019 at 04:32:42PM -, Curt wrote:
> >
> > >
> > > I thought he was saying the surest approach is not touching Windows
> > > with a ten foot pole,
> >
> >
On 2019-03-10 17:13, Joe wrote:
On Sun, 10 Mar 2019 19:35:18 +0300
Reco wrote:
Hi.
On Sun, Mar 10, 2019 at 04:32:42PM -, Curt wrote:
>
> I thought he was saying the surest approach is not touching Windows
> with a ten foot pole,
You're aiming too low. Not touching any non-free O
> While bearing in mind that 'free' doesn't mean 'problem-free'.
> Remember how many people audited the Heartbleed code before it was
> released?
Indeed. But it doesn't take more time to update openssl than to update
a virus scanner.
Stefan
> Starting assumption: I do want to run A/V.
You have it: it's called `apt` (i.e. in the world of Debian, the
response to "viruses" is to plug the hole they try to exploit, instead
of leaving those holes gaping while wasting resources trying to look for
known attacks).
> * (Clamscan already caug
deb writes:
> Starting assumption: I do want to run A/V.
>
> * I get that it may actually INCREASE attack surface.
>
> * But I have Windows & Mac stuff going back and forth to Debian 9.8
> and just want to check.
When you say going back and forth, do you mean over the network?
On Linux the be
at
least helpful to say on a USER list, say nothing at all.
But you will anyways...
"assorted help"
Not that I'm aware of. The thing is - instead of taking an insecure OS
and building assorted kludges (in the form of anti-virus) around it,
it's considered wise here to
On Sun, 10 Mar 2019 19:35:18 +0300
Reco wrote:
> Hi.
>
> On Sun, Mar 10, 2019 at 04:32:42PM -, Curt wrote:
>
> >
> > I thought he was saying the surest approach is not touching Windows
> > with a ten foot pole,
>
> You're aiming too low. Not touching any non-free OS with a ten foot
assumption: I do want to run A/V.
> >>> [*SNIP*]
> >>
> >>> b. Does the list keep a ~ "pinned" answer for these kinds of questions?
> >>
> >> Not that I'm aware of. The thing is - instead of taking an insecure OS
> >> and building a
keep a ~ "pinned" answer for these kinds of questions?
>>
>> Not that I'm aware of. The thing is - instead of taking an insecure OS
>> and building assorted kludges (in the form of anti-virus) around it,
>> it's considered wise here to use a secure OS from th
On Sunday 10 March 2019 10:58:12 deb wrote:
> Starting assumption: I do want to run A/V.
>
> * I get that it may actually INCREASE attack surface.
>
> * But I have Windows & Mac stuff going back and forth to Debian 9.8
> and just want to check.
>
> * (Clamscan already caught 4 things)
>
>
>
ad of taking an insecure OS
and building assorted kludges (in the form of anti-virus) around it,
it's considered wise here to use a secure OS from the beginning.
Recommended reading list applicable to Debian?
cycles and do not install the thing.
> - rkhunter
It's primary purpose - i.e. rootkit detection is severely lacking.
The thing has its uses as IDS and 'best practices auditor toolkit', but
that's it.
But if it's the IDS you need - there are tripwire and debsums.
deb wrote:
> a. What does the group suggest running on debian beyond
> - chkrootkit
Useless.
> - rkhunter
Crap, unmaintained.
Both tools produce more false positives than finding anything, just
creating a false sense of security while providing no security benefit
whatsoever.
Grüße,
Starting assumption: I do want to run A/V.
* I get that it may actually INCREASE attack surface.
* But I have Windows & Mac stuff going back and forth to Debian 9.8
and just want to check.
* (Clamscan already caught 4 things)
a. What does the group suggest running on debian beyond
On Wed, December 13, 2017 2:41 pm, Stefan Monnier wrote:
>> The weakest link in most chains of Data protection is the person that
>> has access to it.
>
> And rather than breaking knuckles, sometimes it's more ...elegant.. to
> just fool/seduce the target,
>
>
> Stefan
We know. Poor Assan
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, Dec 13, 2017 at 11:41:08AM -0500, Stefan Monnier wrote:
> > The weakest link in most chains of Data protection is the person that
> > has access to it.
>
> And rather than breaking knuckles, sometimes it's more ...elegant.. to
> just fool/sedu
> The weakest link in most chains of Data protection is the person that
> has access to it.
And rather than breaking knuckles, sometimes it's more ...elegant.. to
just fool/seduce the target,
Stefan
tomas writes:
> Or, as Schneier put it "the NSA is better at breaking knuckles
> than at breaking codes".
Not NSA. That would be trespassing on another agency's territory.
--
John Hasler
jhas...@newsguy.com
Elmwood, WI USA
The weakest link in most chains of Data protection is the person that
has access to it.
Always keep that in mind.
On 12/13/2017 12:34 PM, x9p wrote:
> On Wed, December 13, 2017 6:17 am, to...@tuxteam.de wrote:
> ...
>> If they target *you* individually, yes, they have cheaper means at
>> their d
On Wed, December 13, 2017 6:17 am, to...@tuxteam.de wrote:
...
> If they target *you* individually, yes, they have cheaper means at
> their disposal. That's called "rubber hose cryptanalysis"[1] -- not
> pretty. Or, as Schneier put it "the NSA is better at breaking knuckles
> than at breaking code
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Dec 12, 2017 at 10:25:18PM -0200, x9p wrote:
>
> On Tue, December 12, 2017 8:00 am, to...@tuxteam.de wrote:
> ...
> > That said, this kinds of attacks are so complex that [...] it
> > possibly takes the resources of a nation-state [...]
> If
On Tue, December 12, 2017 8:00 am, to...@tuxteam.de wrote:
...
> That said, this kinds of attacks are so complex that (as in the
> case of Stuxnet) it possibly takes the resources of a nation-state
> (or, in this case, probably two) to set something up like that.
> OTOH things are pretty fluid the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Dec 12, 2017 at 05:09:59AM -0500, Anil Duggirala wrote:
> Think for yourself a bit: technically it is perfectly possible. The
> > Linux partition is accessible from windows and, given some sort of
> > library for "understanding" the file syste
Think for yourself a bit: technically it is perfectly possible. The
> Linux partition is accessible from windows and, given some sort of
> library for "understanding" the file system (probably ext4), files
> can be modified this way. Vice-versa, the windows partition will be
> accessible from Linu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Dec 12, 2017 at 04:40:07AM -0500, Anil Duggirala wrote:
> Ill ask another question here. Is having dual boot Windows 10 (or 7 or
> 8) and Linux a security risk? Will malicious Windows programs gain
> access to Linux files (files in the Linux pa
PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Long Wind wrote:
> > i have Windows XP and Linux on one diskis there any XP virus that can
> > spread to linux?
> > Thanks!
>
>
> Generally no, given that Windows and Linux use different executable
> formats. That being
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Long Wind wrote:
> i have Windows XP and Linux on one diskis there any XP virus that can
> spread to linux?
> Thanks!
Generally no, given that Windows and Linux use different executable
formats. That being said, you can still spread infec
Hi,
I was Transferring some files on another location on the LAN over SSH with
the BitVise Client I5 Win10 x64.
I am running my Jessie 8.6 x32 with Xfce Desktop on a P4 1 Gb. The Transfer
of ~20 GB went fine.
When I returned home with my PC I tried to download some of the files and it
was really
Hi Richard
On 03/13/2013 03:59 AM, Richard Hector wrote:
This was the problem! Thank you very much. I installed prelink looong
time ago (> 3 years). Why do I got this problem suddenly right now,
after so many years? - no idea. Probably some configuration file got
overwritten during update.
So
On 13/03/13 01:20, Sergey Spiridonov wrote:
> Hi Sven
>
> On 03/12/2013 11:34 AM, Sven Joachim wrote:
>
>> FWIW, it is possible that the files had been subject to being treated
>> with prelink(8); debsums will not report those files unless called with
>> the "--no-prelink" option.
>
> This was t
Verde Denim grabbed a keyboard and wrote:
> On 03/11/2013 09:19 PM, David Guntner wrote:
>> That's actually a fairly well-known false positive.
>>
>> If you want to silence that message, search your /etc/rkhunter.conf file
>> for the part which has RTKT_FILE_WHITELIST= in it, and then whitelist
>>
On 03/11/2013 09:19 PM, David Guntner wrote:
> sp113438 grabbed a keyboard and wrote:
>> After running on my amd64 squeeze:
>> # rkhunter --update
>> rkhunter -c
>>
>> rkhunter showed one warning:
>>
>> Warning: Checking for possible rootkit strings [ Warning ]
>> [01:25:23] Found string 'hdparm' i
Hi Sven
On 03/12/2013 11:34 AM, Sven Joachim wrote:
FWIW, it is possible that the files had been subject to being treated
with prelink(8); debsums will not report those files unless called with
the "--no-prelink" option.
This was the problem! Thank you very much. I installed prelink looong
t
On 2013-03-12 10:36 +0100, Sergey Spiridonov wrote:
> On 03/12/2013 01:23 AM, sp113438 wrote:
>
>> No solution, but how did you find out about the changed size?
>
> This is all happening on the remote machine of my friend. I do not
> have direct access to hardware.
>
> First skype refused to start
Hi sp113438
On 03/12/2013 01:23 AM, sp113438 wrote:
No solution, but how did you find out about the changed size?
This is all happening on the remote machine of my friend. I do not have
direct access to hardware.
First skype refused to start complaining about modified binary. I
reinstalle
sp113438 grabbed a keyboard and wrote:
> After running on my amd64 squeeze:
> # rkhunter --update
> rkhunter -c
>
> rkhunter showed one warning:
>
> Warning: Checking for possible rootkit strings[ Warning ]
> [01:25:23] Found string 'hdparm' in file
> '/etc/init.d/.depend.boot'. Pos
* On 2013 11 Mar 19:43 -0500, sp113438 wrote:
> After running on my amd64 squeeze:
> # rkhunter --update
> rkhunter -c
>
> rkhunter showed one warning:
>
> Warning: Checking for possible rootkit strings[ Warning ]
> [01:25:23] Found string 'hdparm' in file
> '/etc/init.d/.depend.boo
possibility to boot from safe media
> > yet).
> >
> > You can find some good and binaries here [1]. This virus/rootkit
> > seems to be clever enough to deceive debsums, so it is
> > Debian-related.
> >
> > 1. http://hurd.homeunix.org/~sena/bad-sk
omplain
> about them. I tried clamscan and avast on this binaries on another
> host, they did not find anything. I also tried chkrootkit and
> rkhunter (but I did not get possibility to boot from safe media yet).
>
> You can find some good and binaries here [1]. This virus/rootkit
, they
did not find anything. I also tried chkrootkit and rkhunter (but I did
not get possibility to boot from safe media yet).
You can find some good and binaries here [1]. This virus/rootkit seems
to be clever enough to deceive debsums, so it is Debian-related.
1. http://hurd.homeunix.org/~sena
Hello,
>
> On Sat, 23 Feb 2013 17:09:53 -0600
> "Mark Allums" wrote:
> > FYI, a few USB storage things were known to irrevocably
> > become Windows devices once used on Windows. This is rare
> > now. However, if you reformatted and it seems to work now,
> > forget about it.
>
> Please can you
Hello,
On Sat, 23 Feb 2013 17:09:53 -0600
"Mark Allums" wrote:
> FYI, a few USB storage things were known to irrevocably
> become Windows devices once used on Windows. This is rare
> now. However, if you reformatted and it seems to work now,
> forget about it.
Please can you explain what do yo
> > FYI, a few USB storage things were known to irrevocably become Windows
> > devices once used on Windows.
>
> Are you kidding? I really experienced that a brand new USB stick once
> completely gets broken. The dealer sent me a new one, regarding to the
> warranty claim. I can't remember if I us
> > > I'm selling tin foil hats on special this week only! :)
> > >
> > I think I have already have one (invisible though).
:D
> FYI, a few USB storage things were known to irrevocably become Windows
> devices once used on Windows.
Are you kidding? I really experienced that a brand new USB stic
> -Original Message-
> From: lina [mailto:lina.lastn...@gmail.com]
> Sent: Saturday, February 23, 2013 9:00 AM
> To: debian-user@lists.debian.org
> Subject: Re: [OT] possible USB virus?
>
> On Saturday 23,February,2013 10:35 PM, Chris Bannister wrote:
> > On
On Saturday 23,February,2013 10:35 PM, Chris Bannister wrote:
> On Sat, Feb 23, 2013 at 02:36:13PM +, Lisi Reisz wrote:
>> On Saturday 23 February 2013 13:38:16 lina wrote:
>>> Few days ago, a guy borrowed my USB.
>>
>> Why?? Surely lending one's USB is asking for trouble! Personally I would
On Sat, Feb 23, 2013 at 02:36:13PM +, Lisi Reisz wrote:
> On Saturday 23 February 2013 13:38:16 lina wrote:
> > Few days ago, a guy borrowed my USB.
>
> Why?? Surely lending one's USB is asking for trouble! Personally I would
> reformat, but then I am paranoid.
Any .exe is probably a Windo
I have reformat it. Now it looks good.
Thanks.
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/5128d73a.2070...@gmail.com
On Saturday 23 February 2013 13:38:16 lina wrote:
> Few days ago, a guy borrowed my USB.
Why?? Surely lending one's USB is asking for trouble! Personally I would
reformat, but then I am paranoid.
Lisi
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsub
Hi,
Few days ago, a guy borrowed my USB.
The day before yesterday when I tried to use it, I found it can't be
written, there is autorun.exe and even one README.txt.
When I tried the
$ more README.txt
it's said click to read, so I just plug the usb out from my laptop.
Hope it's not my psycholog
The following viruses were repaired or dropped from the message (MID 6392270)
'W32/MyDoom-O'
And, Attachments dropped during repair.
Actions taken:
Message delivered
Original Envelope Sender:
From debian-user@lists.debian.org Wed Jan 16 10:14:05 2013
Message Headers:
From: debia
teddi...@tmo.blackberry.net wrote:
Boblitz John Said;
Setup.exe? Is that really a Debian file?
I thought, but wasn't sure, so didn't want to say, that no Debian boot CD would contain an .exe file. As these are a Microsoft Windows Format and by and by Linux as an Operating System only
On Thu, Mar 17, 2011 at 01:19:20PM +, teddi...@tmo.blackberry.net wrote:
> Boblitz John Said;
>
>
> Setup.exe? Is that really a Debian file?
>
>
>
> I thought, but wasn't sure, so didn't want to say, that no Debian boot CD
> would contain an .exe file. As these are a Microsoft Wind
Hello Robert Schaitberger,
Also auf meinen CDs/DVDs sind keine setup.exe Dateien vorhanden
Thanks, Greetings and nice Day/Evening
Michelle Konzack
--
# Debian GNU/Linux Consultant ##
Development of Intranet and Embedded Systems with Debian GNU/Linu
On Thu, Mar 17, 2011 at 02:22:41PM +, Camaleón wrote:
> On Thu, 17 Mar 2011 13:19:20 +, teddieeb wrote:
>
> > Boblitz John Said;
> >
> >
> > Setup.exe? Is that really a Debian file?
> >
> >
> >
> > I thought, but wasn't sure, so didn't want to say, that no Debian boot
> > CD woul
On Thu, 17 Mar 2011 13:19:20 +, teddieeb wrote:
> Boblitz John Said;
>
>
> Setup.exe? Is that really a Debian file?
>
>
>
> I thought, but wasn't sure, so didn't want to say, that no Debian boot
> CD would contain an .exe file. As these are a Microsoft Windows Format
> and by and by
Boblitz John Said;
Setup.exe? Is that really a Debian file?
I thought, but wasn't sure, so didn't want to say, that no Debian boot CD would
contain an .exe file. As these are a Microsoft Windows Format and by and by
Linux as an Operating System only acknowledges their existence by def
General Failure, and why is he reading my hard disk?
Von: Robert Schaitberger [mailto:rsch...@gmx.de]
Gesendet: Donnerstag, 17. März 2011 09:03
An: debian-user@lists.debian.org
Betreff: Virus
Hello,
i want to install Debian testing
Load down the iso Image
On Thu, 17 Mar 2011 09:03:28 +0100, Robert Schaitberger wrote:
(please, avoid using html)
> i want to install Debian testing
>
> Load down the iso Image (testing and live CD)
>From what source?
> and burn a CD,
Did you check the md5 hash before and after burning?
> put it in my Windows PC.
Hello,
i want to install Debian testing
Load down the iso Image (testing and live CD) and burn a CD, put it in my
Windows PC
then AVIRA found the Trojan
TR/Crypt.XPACK.Gen
in all of your
setup.exe
Sorry for my bad english...
Greetings
Robs
ing for any suggestions regarding Anti virus and firewall software
> that is suitable with your Debian 5 64bit operating system. Wanting to add
> as much security as possible to our server to reduce any problems we may
> encounter. I would like any suggestions as to the best software that ca
On 8/4/2010 12:43 PM, Brian wrote:
On Wed 04 Aug 2010 at 10:09:17 -0500, Jordon Bedwell wrote:
Correct. It wouldn't be there in the first place and I don't plan on
having my root acoount compromised. Besides, I know my system.
Naive but cute you think that though. You obviously don't to the lat
On Wed, Aug 4, 2010 at 18:43, Brian wrote:
> Besides, I know my system.
Famous last words... ;)
--
() ascii-rubanda kampajno - kontraŭ html-a retpoŝto
/\ ascii ribbon campaign - against html e-mail
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscri
On Wed 04 Aug 2010 at 10:09:17 -0500, Jordon Bedwell wrote:
> Because a rootkit can't remain hidden and inject itself back into the
> binary after a "security update" right?
Correct. It wouldn't be there in the first place and I don't plan on
having my root acoount compromised. Besides, I know
On 8/4/2010 9:24 AM, Brian wrote:
On Wed 04 Aug 2010 at 10:53:42 +0200, Wolodja Wentland wrote:
chkrootkit - rootkit detector
rkhunter - rootkit, backdoor, sniffer and exploit scanner
If ckkrootkit really did detect worms like Lupper, Lion
and Adore (as opposed to the false positive
On Wed 04 Aug 2010 at 10:53:42 +0200, Wolodja Wentland wrote:
> chkrootkit - rootkit detector
> rkhunter - rootkit, backdoor, sniffer and exploit scanner
If ckkrootkit really did detect worms like Lupper, Lion
and Adore (as opposed to the false positives both programs
appear fond of gener
regarding Anti virus and firewall
software that is suitable with your Debian 5 64bit operating system.
Wanting to add as much security as possible to our server to reduce
any problems we may encounter. I would like any suggestions as to the
best software that can be used either paid for or freeware if
On Tue, Aug 03, 2010 at 22:43 +0100, Tingez Unknown wrote:
> Firstly i am very new to Debian so please excuse me for my lack of
> understanding.
Welcome to Debian :)
> I am looking for any suggestions regarding Anti virus and firewall software
> that is suitable with your De
1 - 100 of 1423 matches
Mail list logo