Dollars BBS | Technology

feed-icon

Main

News

Animation

Art

Comics

Films

Food

Games

Literature

Music

Personal

Sports

Technology

Random

Linux problems (9)

1 Name: Dissonant9!HOi5X8RW3E : 2013-05-20 20:33 ID:ptMvvEid [Del]

I just downloaded linux and free avg for it today.
I still can't find the gui for avg and am still a complete noob, so I am terrible with the terminal window. Miraculously I managed to get the avg to appear to have installed correctly, but I just don't know how to actually run it.

2 Name: sleepology !CHs4eVJ3O2 : 2013-05-21 09:59 ID:M2z8czJ9 [Del]

There isnt even an actual question in this post, just you complaining.

3 Name: Shadey !Afro5JEIgo : 2013-05-21 10:00 ID:Tmun1ZYq [Del]

Stolen from some random website

Using the program is straightforward. First you need to start the AVG daemon: run “sudo avgctl –start“. Then you can use “sudo avgupdate” to update the software, and “avgscan” to scan a given file.

4 Name: Dissonant9!HOi5X8RW3E : 2013-05-21 17:08 ID:ptMvvEid [Del]

>>3 Ok, I got parts 1 and 2 to work, but the scan basically locked up at 100% on /cdrom/ so, it terminated it. the final results included a disturbing number of errors though. 30870 errors. The vast majority of which were: /location Object scan failed; Specified file was not found. How should I make it find the stuff. Oh, it also ran into a permission denied somewhere early on.

5 Name: Dissonant9!HOi5X8RW3E : 2013-05-21 22:23 ID:ptMvvEid [Del]

Ok, I think I've successfully configured real-time protection, though I have no idea how to test if it's actually working. I also found that the normal scan finds but does not remove the test file that some website said how to make. (Virus identified EICAR_Test) I still haven't resolved the tons of files not found though.

6 Name: Dissonant9!HOi5X8RW3E : 2013-05-22 09:06 ID:ptMvvEid [Del]

Ok, it was -t to delete viruses found. I also figured out the permission denied. No to just solve why it can's find 30000+ files.

7 Name: Lance DeBard : 2013-11-21 04:16 ID:nN6Q84uZ [Del]

Umm. Virus protection. For Linux. Riight. Please read some literature. Been using Linux for 10+ years and never even caught a wiff of a virus. I am pretty sure AVG is a waster of space.

8 Name: red !YY8ebcAR4s : 2013-11-22 20:07 ID:EBlVHSW9 [Del]

>>3
Before you do any command that starts with sudo, be aware of what you are doing. A good thing to do is to NEVER type a sudo command by itself, one wrong move could get you in trouble.

On most shells, you can use "!!" to add your previous command to the current one. A common pattern I always use is the following:

$ touch /bin/ls
touch: /bin/ls: Permission denied
$ sudo !!
$ sudo touch /bin/ls

I first type my full command, make sure it is what I need. Then I type "sudo !!" to get the previous command with "sudo" prepended.

>>7
I've got some bad news for you... Viruses exist on Linux too and we got tools for them: http://en.wikipedia.org/wiki/Rkhunter

The "you can't get a virus" argument ONLY means that the OS is unlikely to be penetrated remotely and that the softwares you downloads from package managers (apt-get, yum, etc...) are safe from misbehaving code.

But you can still have a virus if you act without thinking. I don't know, why not modify your own sshd_config "just because" and leave the door open for every script kiddie out there?

You can even download a cool shell script that will make coffee for you (actually, I'm thinking about RVM because their only install process is a fucking curl piped to a shell). Too bad in its two thousands lines was a TINY command: "echo 'ns -kl 3000 | sh' >> /etc/profile".

Next thing you know, I have a FULL SHELL ACCESS to your machine. Good job, I hope your iptables got a DENY ALL somewhere, right? Because I got a "virus" on your machine in TWENTY-TWO characters.


You are only as safe as you are not being stupid. Running unstrusted software is not stupid, it's a risk you have to calculate. However, saying "Linux can't have viruses" is stupid.

The first real lesson of computer security is that YOU ARE NEVER TRULY SECURE. Cool, you sshd only allows one user to log, with a private key, in a jail, with no privileges or possible escalation. Good job!

But I have seen hackers with a setup even more secure get rooted when someone (not from my team but from my school) took root access straight in the memory from a restricted Python Shell (his write-up only involves him solving the challenge where the sandbox was, not taking over the sandbox).

Oh, and for context: https://ctftime.org/team/3804

9 Name: Sleepology !4a6Vun8zuw : 2013-11-22 21:45 ID:UaFI9qWX [Del]

>>7 why did you bump this?!