ClamAV is a mostly weak antivirus tool that is meant for scanning emails, but even then you can use it as an antivirus for your personal system. So I decided to make a post on ClamAV which is a free antivirus developed by Cisco, which you can read more about here:
https://en.wikipedia.org/wiki/Clam_AntiVirus
A quick note out there I am using Ubuntu 18.04 to install this, here's my version of an install guide for both via source and the package manager:
[Installing From Package Manager (Bionic Beaver Realease)]
First install the package:
To uninstall simply run:
[Installing From Source]
Navigate to https://www.clamav.net/downloads and then download/extract the contents. On your terminal navigate to the directory, and first make a new group and user for clamav:
[Scanning Files]
Always remember to update the virus definitions with:
clamscan OPTIONS File/Folder
If necessary start with root permissions: sudo clamscan
Examples:
To check all files on the computer, displaying the name of each file:
My contract just ended with Verizon, and I would like to still use my phone with another carrier. I don't have the money right now for a new phone, or I wouldn't even worry about this. Any help would be greatly appreciated. My phone is a:
Samsung
Model: SM-J320V
Update 18: I said "Darnell can't come."
https://unix.stackexchange.com/questions/84686/how-to-create-custom-comm...
Custom Bash Commands from Binaries (makes it easier to Firejail applications):
1) Create a folder, example here being "SigBin," in your home directory.
2) Put Binaries in it.
3) Edit your .bash_profile to use this folder.
4) Reload your profile.
5) Execute the command.
Instead of "crushing" the Pentagon with more leaks" or REACTING to their purposeful erasure of the contents of the two guides (I made the Congress section worse in response) for the sole purpose of GUAGING MY EMOTIONAL RESPONSE (a trademark indicator of Cluster B Personality Disorder: without an emotional reaction, a Cluster B can't operate)?
The best LONG-TERM strategy to ensuring that "the incident" gets "magically buried" with my signature and bloody thumbprint as a form of 3-factor (DNA and fingerprint)?
Stop catering to the Pentagon's desire to trap my penis live on Spy Satellite while their dysfunctional family (to include little children) observe for the purpose of "identity validation." My penis is tied to the IDENTITY of the Honey-Trapping program that I have REJECTED over 1000 times and the ensnarement of my penis has nothing to do with Nation-State operations.
This is one of those moments that make you want to use *BSD...
https://www.spinics.net/lists/kernel/msg2540934.html
Clearly Linus is a fuckface with a <1 inch dick...
UPDATE: spender's official response - http://seclists.org/oss-sec/2017/q2/583
https://www.vusec.net/projects/anc/ is the attack I'm referring to (code at https://github.com/vusec/revanc). I just wanted to start a discussion about how it's kind of weird that everybody is freaking out despite this being a known problem with ASLR. ASLR was just a bandaid in preparation for RAP, which is now available (see https://grsecurity.net/rap_announce_ret.php). Honestly, I think it's rather sad that there's not a single mention of RAP at any of the discussions I've seen. I guess it just really shows that people at places like https://news.ycombinator.com/item?id=13650611 don't really understand real security. At least there's still SOLDIERX, where you won't get any of that cargo cult security crap
If people keep wasting their time on this old shit, grsecurity is going to be in business for a long time.
Hello there community!
I have a question about using Snort. Are the community rules comprehensive enough to protect a small network? If not, which ruleset would be best?
Link to community rules: https://snort.org/downloads/#rule-downloads
Hello, this alexandra.
In this post, I want to share how to make Tor acts as a Gateway, which we can call Whonix-Gateway and how to run Kali Linux through it. (I want to be clear that you can run whatever OS as a Workstation).
Kali-Workstation will be completed isolated network. Only connections through Tor will be possible.
Before we start, take a look at:
https://en.wikipedia.org/wiki/Gateway_%28telecommunications%29
https://en.wikipedia.org/wiki/Whonix
#Step one
Download VirtualBox and install it.
Learn about it here:
https://en.wikipedia.org/wiki/VirtualBox
https://www.virtualbox.org/wiki/Documentation
#Step two
Download Whonix-Gateway.
Import it into VirtualBox.
(Start Virtualbox, click on File then choose import Appliance.
#Step three
Download the Worksttation that you want.
Learn how to install it into VirtualBox.
Read about internal networking in VirtualBox. (Whonix-Gateway > internal Networking> Workstaion)
#Step four
Start Whonix-Gateway and let it running. You will have to setup it at the first time you boot it up.
(It is pretty easy. Just follow the instructions).
#Step five
Start your Workstation. (Don't turn off Whonix-Gateway)
So, Let's setup it to run trough a Tor Gateway.
* IP Address
192.168.0.20/24
* Gateway
192.168.0.10
#Step six
Setup Networking
In Linux terminal type it
* vi /etc/network/interfaces
It looks like this:
This file describes the network
interfaces available on your system
# and how to to activate them. For more
information, see interfaces (5).
# The loopback network interface
auto lo
iface lo inet loopback
# The primary network interface
allow-hotplug eth0
iface eth0 inet static
address 10.152.152.50
netmask 255.255.255.0
network 10.152.152.0
broadcast 10.152.152.255
gateway 10.152.152.10
# dns-* options are implemented by the
resolvconf package, if installed
dns-nameservers 10.152.152.10
Hello there!
I wanted to discuss Linux Kernel security and the types of modules this community recommends. I've looked at gresecurity, selinux, and apparmor. I'm wanting to protect a LAMP stack vps system.
hello ,i am new here. and i want to be hack and make friends with hack ,but i dont know how to do.
I was wondering if anyone has used Veracrypt yet, or can verify that it's at least as secure as Truecrypt. It seems to be a fork, but with the controversy surrounding the end of Truecrypt I think consulting with better minds than mine would be beneficial.