Peter Sergeant sent in a link on some Linux security basics. "If you count Trojan horses and rootkits, Linux (as a Unix derivative) crossed this line a long time ago. So it is high time that we designed and implemented some anti-virus schemes for Linux hosts. While there are hundreds of papers describing the process of securing or strengthening Linux (and, yes, this is another indication that Linux is popular), very few of them consider security from the perspective of an institution's anti-virus policy. The aim of this article is to shed some light on this subject.. . .
Peter Sergeant sent in a link on some Linux security basics. "If you count Trojan horses and rootkits, Linux (as a Unix derivative) crossed this line a long time ago. So it is high time that we designed and implemented some anti-virus schemes for Linux hosts. While there are hundreds of papers describing the process of securing or strengthening Linux (and, yes, this is another indication that Linux is popular), very few of them consider security from the perspective of an institution's anti-virus policy. The aim of this article is to shed some light on this subject.

The next problem is the fact that you should install any application by compiling its source (but only after MD5 checksum has been verified positively). However, in the real world this is not very common, especially when RPM and Debian packages are widely available. While the use of packages aids the installation of applications in a system, for security reasons it is not a recommended option. This is especially true for server applications.

The link for this article located at Virus Bulletin is no longer available.