hey all, I just downloaded and installed it from the install software section in opensuse, but its no where to be found, how to I enable it?
linuxsydney wrote:
> hey all, I just downloaded and installed it from the install software
> section in opensuse, but its no where to be found, how to I enable it?
it is a command line application useful for folks running a mail or
other server for MS users…not actually needed if you are just
running a desktop for your personal use…
if running a server then you need to set up Clam at the command line,
lots of documention on how to do that here:
http://www.clamav.net/doc/latest/
–
palladium
surprise! after posting the above i read in Linux Format (magazine)
December 2009 issue about “ClamTk”…apparently someone has built a GUI
frontend for ClamAV…should make happy all the Redmond Ship Jumpers
who can’t easily break the habit of worrying and protecting themselves
from malware targeted against that OS…
see: http:/clamtk.sf.net
caveat: i do not recommend the use of either ClamAV nor ClamTK
–
palladium
And you also have Klamav which, in my opinion, is a nicer gui. Klamav is still not ported to kde4 so one need the kde3libs and the integration in konqueror/dolphin is not there. But it is allright if you wish to scan e.g. samba share folders. And mails of course, though you don’t need the gui for that.
I notice in another thread, you removed your /windows, … leading me to believe you no longer have an MS-Windows partition/drive on this PC: Wheres ClamAV? - openSUSE Forums
… is that the case?
Is it your plan to use Linux as a network file server for MS-Windows files (and hence want to scan for virus on MS-Windows files)? or do you plan to use Linux as a platform to scan external USB devices for MS-Windows virus ?
If so, then I understand your request.
If not, then IMHO there is no reason to install clamav nor any other anti-viral software.
As noted by others in many different threads, relatively speaking there are no real virus threats to Linux.
The advice/suggestion I typically give is for new Linux users to to focus their efforts on where the REAL threats are to Linux security. Typically that is from hacking into a PC via an insecure ssh (or vnc/remote-desktop) entry from a worm, or capturing one’s Password and ip-address via a Phishing attack/seduction.
As noted, outside of the lab, there are next to NO virus against Linux. I think I read about a cross platform virus that could infect Open Office (called Bad Bunny) but thats about it, and it is not common, and possibly extinct.
Hence anti-virus software to defend Linux have next to NOTHING to test against. Without good testing, such Linux anti-virus software (to protect Linux) is debatably not worth much. And since the software has no Linux virus to be tested against, and since there is nothing to defend against, don’t waste your time with such software. Because IMHO it is a waste of time (at least here in end-2009 it is a waste of your time). Spend one’s precious time defending against REAL threats. And there are REAL threats against Linux but they are NOT virus.
Now you will read of anti-virus software that one can install on Linux PCs, but most of the time that virus software is installed to look for virus that might attack MS-Windows PCs (as often the Linux PC is a file server for Windows PCs).
Trojans are typically designed to go after MS-Windows PCs, and there are semi-automatic ways in which Trojans can be placed on MS-Windows PCs. Because of the tremendous diversification in Linux distributions and Linux applications, it is much harder for hackers to create a Trojan to infect a Linux PC. Vulnerability to trojan horses and viruses results from users willing to run code from sources that should not be trusted. In Linux, if one is prudent in the applications they install (which is relatively easy in Linux if one installs from repositories) then catching a Trojan is unlikely. So setup your repositories for only OSS, Non-OSS, Update and Packman, and thats a good start to being safe.
The biggest threat to a Linux desktop user IMHO comes from:
- poorly defended ssh port attacked by worms/bots …
- Phishing attack (via a tricky web site that looks like a legit web site) that fools one into entering their password, and hence capture’s one’s password (where one has the same password for everything). For example, an email notification from your Bank to urgently log in to a URL provided. You go to the URL, it looks like your bank page, and log in. But it is NOT your bank page (it only looks that way) and you have just given away your Bank password and likely your IP adderss. Plus if that is also your PC password, then your PC can then be attacked by an automated worm that knows your password and your ip address and can possibly guess your username.
So rather than waste time on questionably effective anti-virus software for Linux (which can not be tested), and where such questionable software will defend against next to NO real world Linux threats, instead spend time learning how to protect port#22 against ssh attacks, and put in place some quality usernames and passwords (not all the same) so as to thwart phishing attacks.