zlacker

[parent] [thread] 2 comments
1. j16sdi+(OP)[view] [source] 2024-06-01 11:44:09
In my experience, an weekly-patched, default installation debian Linux cira 2015 get a malware in a week or two on the open internet.
replies(2): >>arnaud+kj1 >>hosteu+io1
2. arnaud+kj1[view] [source] 2024-06-01 23:17:07
>>j16sdi+(OP)
Which tool do you use to detect malwares on Debian?
3. hosteu+io1[view] [source] 2024-06-02 00:10:02
>>j16sdi+(OP)
I am not sure exactly what you're saying: Are you saying that you had experience in 2015 that your "default installation" Debian Linux server got malware on the open internet despite it being fully updated weekly?

If I read that right, I would like two things clarified:

1: what "default installation" means. Do you have any open network ports?

2: What does "get a malware" mean? Do you mean it was possible to get malware because a user downloaded som random binary off of the internet? Or do you mean that entirely passively, some malware remotely exploited some network service?

I would like to contribute my experience: I have been responsive for running many Debian servers on the internet for that last 25 years. During those years I have not once encountered one of my systems being compromised. Of course, you might say that I have just been unknowingly compromised. While this is indeed possible, it is possible for all systems to be compromised without owners knowing it.

[go to top]