Kamis, 27 Maret 2014

How to Download and Burn Iso Files My PC Defender 2014?

  •  Right click on the link and download one file My PC Defender, select "Open link in new tab", then you will go to the file download link in Mediafire. Klik kanan pada link download salah satu file My PC Defender, pilih "Open link in new tab", selanjutnya anda akan menuju ke link download file di Mediafire.

  • Right click on the "Download" button on the Mediafire, select "Copy link address". Klik kanan pada tombol "Download" di Mediafire, pilih "Copy link address". 

  • Open Internet Download Manager software, click "Add URL", then right click on the url space open, select paste. Buka software Internet Download Manager, klik "Add url", selanjutnya klik kanan pada ruang url yang terbuka, pilih paste.

  • Then click the "Start" button to begin downloading. Selanjutnya klik tombol "Start" untuk mulai mendownload. 



  • After the download selasai, immediately right-click on the file you downloaded in Internet Download Manager, right-click, select "Open folder". In Windows Explorer , if you have finished downloading all the files section numbered 29 My PC Defender files. Setelah proses download selasai, segera klik kanan pada file  download anda dalam Internet Download Manager, klik kanan, pilih "Open folder". Pada Windows Explorer, jika anda telah selesai mendownload semua bagian file My PC Defender berjumlah 29 file.

  • Click the " Crtl + A " to select all the files , then right click and select " Extract here " to unite all the files into one file ISO My PC Defender . Klik tombol "Crtl + A" untuk memilih semua file, lalu klik kanan dan pilih " Extract here" untuk menyatukan semua file menjadi 1 file ISO My PC Defender.

  • After the extraction process is complete , you have to have one ISO file My PC Defender , with a total size of 1 , 33 Gb. Setelah proses ekstrak selesai, anda telah memiliki 1 file ISO My PC Defender, dengan ukuran total 1, 33 Gb. 
  • Immediately burn the ISO file to a DVD - R and after the burning process is complete , you are ready for action with Software My PC Defender 2014. Segera bakar file ISO tersebut dalam sebuah DVD-R dan setelah proses pembakaran selesai, anda siap beraksi dengan Software My PC Defender 2014.


  • Congratulations Fight ! Selamat Berjuang !

Senin, 24 Maret 2014

Download My PC Defender 2014 V - 6.9 Build March 23, 2014 DVD (Full Version).


My PC Defender 2014 V - 6.9 Build March 23, 2014   
Code Name : VENAM II
© 2007-2014, e-library mediasoft, All Rights Reserved.

Program Name               : My PC Defender 2014 V - 6.9 Build March 23, 2014   
Author                              : e-library mediasoft
Build Date                        : March 23, 2014
Release Date                  : March 24, 2014
Theme music : Crysis 2 Intro Video, Composer: Hans Zimmer
e-mail                              : e.library.mediasoft @ gmail.com
Blog                                 : http://mypcdefender.blogspot.com
                                           http://pustakadigitalindonesia.blogspot.com
Facebook                        :  e-library mediasoft, Yohanes  Gitoyo


Program My PC Defender 2014 V - 6.9 Build March 23, 2014, a collection of tool programs that are part of the Operating System Microsoft Windows XP, we have collected to be used for configuration control, setting or other functions in Microsoft Windows XP Operating System DVD-based. 
Program My PC Defender 2014 V - 6.9 Build March 23, 2014, sebuah kumpulan program alat yang merupakan bagian dari Sistem Operasi Microsoft Windows XP, yang kami kumpulkan akan digunakan untuk konfigurasi, pengaturan kontrol atau fungsi lain dalam Sistem Operasi Microsoft Windows XP berbasis DVD.

My PC Defender 2014, an "integrated suite for defend and destroy other malware", a powerful integrated tool to combat against various types of malware attacks, complete with tool setting and performance optimization of your computer. In other words My PC Defender 2014 is a war machine that is integrated to protect your computer.
My PC Defender 2014, merupakan “integrated suite for defend and destroy other malware”, sebuah alat tempur canggih terintegrasi untuk melawan serangan berbagai jenis malware, lengkap dengan tool setting dan optimasi kinerja komputer anda. Dengan kata lain  My PC Defender 2014 ini adalah sebuah mesin perang yang terintegrasi untuk melindungi komputer anda.


My PC Defender New Features :
  1. New engine and new update software (update : March 22, 2014). Di dukung dengan mesin penghancur terbaru (update :  22 Maret 2014).
  2. Supported Operating Systems Microsoft Windows 64-bit (available on My PC Defender 2014 Advanced Professional Version). Mendukung Sistem Operasi  Microsoft Windows 64 bit (khusus My PC Defender 2014 Versi Advanced Profesional)
  3. Destruction of malware from the computer boot process, with a Bootable Antivirus BitDefenderRescueCD_v2.0.0_5_10_2010 Live CD build Pebruary 27, 2014.. Penghancuran malware dari proses boot komputer, dengan Bootable Antivirus BitDefenderRescueCD_v2.0.0_5_10_2010 Live CD build Pebruary 27, 2014.
  4. 15 tool system optimization tool and the latest spyware and malware destroyer of new (update: update: March 22, 2014) 15 tool optimasi sistem dan penghancur spyware dan malware terbaru (update: March 22, 2014).
  5. Stealth system integration with SFX technology. Penerapan teknologi stealth terintegrasi dengan teknologi  SFX.
  6. Fixed Bug. Perbaikan beberapa bug.
  7. Fixed bad link. Perbaikan beberapa bad link. 
  8. Rebuild other object in the new pocked. Pembaharuan pemaketan beberapa obyek.
  9. Tool newest destroyer rootkit (which can not be destroyed by any anti-virus). Tool terbaru penghancur rootkit (yang tidak dapat dihancurkan oleh anti virus manapun).
  10. Flamer/ Skywiper and Stuknet Trojan Removal. Flamer/ Skywiper and Stuknet Trojan Removal. 
  11. Portable engine up to 90 % software include CD working in optimalize temporary file mode. Mesin Portabel hingga 90 % program di dalam  CD dan optimalisasi kinerja program dalam temporary file mode.
  12. Program-based CD / DVD without installation process, be read only, so it is not possible in the block / in any type of malware infection. Program berbasis CD / DVD tanpa proses instalasi, jadi baca saja (read only), jadi tidak mungkin di blok / di setiap jenis infeksi malware.
  13. Various alternatives best weapon destruction various types of viruses and malware: viruses, worms, trojans, exploits, rootkit, dialers, spyware, hijackers, adware, rogue, keylogger. Berbagai alternatif jenis penghancuran senjata terbaik berbagai virus dan malware : virus, worm, trojan, eksploitasi, rootkit, dialers, spyware, hijackers, adware, rogue, keylogger.
  14. Interface controls access to the Microsoft Windows operating system (without a wizard). Antarmuka mengontrol akses ke sistem operasi Microsoft Windows (tanpa wizard).
  15. Setting the computer as necessary to speed up computer performance. Mengatur komputer yang diperlukan untuk mempercepat kinerja komputer.
  16. Anti-virus with the ultimate portable crusher setting the highest. Anti-virus portabel dengan kemampuan penghancur utama setting tertinggi
  17. Program Microsoft Office 2007 substitute alternative (free) Libre Office 4.2.2. Program Microsoft Office 2007 pengganti alternatif (gratis) Libre Office 4.0.3
  18. Free for personal / home use / profit institution / business use. Gratis untuk penggunaan pribadi / rumah menggunakan / laba lembaga / bisnis.
  19. For My PC Defender 2014 V - 6.9 Build March 23, 2014 you are wearing is the Advanced version, the active period until  March 23, 2015. Pada My PC Defender 2014 V - 6.9 Build March 23, 2014 adalah versi Advanced dan dapat anda gunakan hingga tanggal  March 23, 2015.

Link Download.
Advisable to use program to download Internet Download Manager.
Untuk mendownload disarankan memakai program Internet Download Manager.

mypcdefender2014v69.part01.rar              

mypcdefender2014v69.part02.rar              
47.6 Mb

mypcdefender2014v69.part04.rar              

mypcdefender2014v69.part05.rar              

mypcdefender2014v69.part06.rar              

mypcdefender2014v69.part07.rar              

mypcdefender2014v69.part08.rar              

mypcdefender2014v69.part09.rar              

mypcdefender2014v69.part10.rar              

mypcdefender2014v69.part11.rar              

mypcdefender2014v69.part12.rar              

mypcdefender2014v69.part13.rar              

mypcdefender2014v69.part14.rar              

mypcdefender2014v69.part15.rar              

mypcdefender2014v69.part16.rar              

mypcdefender2014v69.part17.rar              

mypcdefender2014v69.part18.rar              

mypcdefender2014v69.part19.rar              

mypcdefender2014v69.part20.rar              

mypcdefender2014v69.part21.rar              

mypcdefender2014v69.part22.rar              
47.6 Mb
http://www.mediafire.com/download/xp7jwaaed9al5a7/mypcdefender2014v69.part22.rar

mypcdefender2014v69.part23.rar              
47.6 Mb
http://www.mediafire.com/download/ascc7am3q9cyebk/mypcdefender2014v69.part23.rar

mypcdefender2014v69.part24.rar              
47.6 Mb
http://www.mediafire.com/download/xroa2s55qdotrco/mypcdefender2014v69.part24.rar

mypcdefender2014v69.part25.rar              
mypcdefender2014v69.part29.rar              
25.3 Mb
http://www.mediafire.com/download/d41h036om383bpm/mypcdefender2014v69.part29.rar

The total file size DVD My PC Defender V-6.9 Build 2014 March 23, 2014 are 1, 33 Gb, what are the contents of the DVD ISO file to its size? 
Total ukuran file DVD My PC Defender 2014 V-6.9 Build 23 Maret 2014 adalah 1, 33 Gb, apa saja isi file ISO DVD tersebut sehingga berukuran sedemikian besar ? 

Please read the Readme file below for the entire contents of the software, release date and other details on the download link below:
Silahkan baca file Readme berikut untuk mengetahui isi keseluruhan software, tanggal release dan keterangan lain di link download berikut : 

Introducing My PC Defender 2014 V-6.9 Build March 23, 2014.


On this occasion I would like to introduce our newest project, a computer security program that you know for a long time: "My PC Defender 2014 V-6.9 Build March 23, 2014". Although currently still under development, there are some implementation of new technologies that I want to share with you through our program.

Pada kesempatan ini saya ingin memperkenalkan proyek terbaru kami, sebuah program keamanan komputer yang telah anda kenal sejak lama :  "My PC Defender 2014 V-6.9 Build March 23, 2014". Meski saat ini masih dalam taraf pengembangan, ada beberapa penerapan teknologi baru yang ingin saya bagikan kepada anda melalui program kami ini.


My PC Defender 2014 V-6.9 Build March 23, 2014, a computer security program our 6th generation release 9th. If you happen to listen to some of the previous versions there are some new things in this version:
My PC Defender 2014 V-6.9 Build March 23, 2014, merupakan program keamanan komputer kami generasi ke-6 release ke-9.  Jika kebetulan anda menyimak pada beberapa versi sebelumnya ada beberapa hal baru dalam versi ini :
  • Supports 32 bytes and 64 bytes system (My PC Defender 2014 V-6.9 Pro)Mendukung system operasi 32 byte dan 64 byte.
  • Work in 2 operating system are completely different: Operating System Microsoft Windows and Linux Operating Systems. Bekerja dalam 2 sistem operasi yang sama sekali berbeda : Sistem Operasi Microsoft Windows dan Sistem Operasi Linux, 
  • New work systems are more focused on the temporary file, through a system of portable software work. Sistem kerja baru yang lebih menitik beratkan pada temporary file, melalui sistem kerja software portable.
  • Maximize the employment system features the latest stealth. Memaksimalkan fitur sistem kerja stealth terbaru
  • Equipped with a new computer security software that has not been available in previous versions. Dilengkapi dengan beberapa software keamanan komputer baru yang belum tersedia pada versi sebelumnya.
  • My PC Defender 2014 V-6.9 Build March 23, 2014 applications to implement a variety of advanced technology, articles about this subject can be found in the link: Application of Advanced Technology in the Program My PC Defender 2013. 
  • My PC Defender 2014 V-6.9 Build March 23, 2014 menerapkan aneka aplikasi teknologi canggih, artikel tentang bahasan ini dapat anda baca di link: Application of Advanced Technology in the Program My PC Defender 2013.

I plan soon to share the latest program next week, of course, after some problems were encountered we overcome, once again the program is still in development.
Saya merencanakan segera membagikan program terbaru tersebut minggu depan, tentunya setelah beberapa kendala yang muncul kami atasi, sekali lagi program tersebut masih dalam status pengembangan. 

Digital Fighter Alliace, Defender of Your Computer.

I hope my program is hopefully useful to you.
Harapan saya semoga program saya ini bermanfaat bagi anda.

Minggu, 16 Maret 2014

Introduction SmadAV 2014 Rev. 9.8 : Combat Weapons to Fight Against Malware from Indonesia !



SmadAV is a local Antivirus unpaid devoted to overcome viruses are widespread local and foreign tourists in Indonesia. Antivirus has a free and paid version after it was a donationware.

To date Antivirus SMADAV can run the operating system: Windows 2000, Windows XP, Windows XP x64, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64.

SmadAV works in conjunction with almost all international antivirus. When combined, SmadAV will protect your computer from the local and international anti-virus that will protect your computer from virus locally (Indonesia) and the whole international virus.


Development History SmadAV

SmadAV name is taken from the name of the school stands Nafarin Zainuddin, SMADA (SMA 2) in Palangkaraya in Central Kalimantan, while AV stands for antivirus.

http://3.bp.blogspot.com/-IVR6X9lRwz4/UQ1DWYVrGtI/AAAAAAAAArI/thOMT4yfYTk/s1600/smadav.jpg

STC Nafarin alias Zainuddin aka Zai, is the inventor of the local anti SmadAV Medium Public School students 2 Pahandut Palangkaraya, Central Kalimantan class XI IA 1 SmadAV created in 2006, not because he created Smadav love alma mater, but since the beginning (incidentally ) he knows Visual Basic in computer labs SMAN-2 Palangkaraya in about mid-2006. Then Zainuddin Nafarin start trying to learn, and a few months after it was born SmadAV v1.0. But because of his work in the following math Olympics, eventually developing SmadAV postponed until completed in 2008. Smadav first created in Palangkaraya, but the location is a lot more development takes place in the Jogjakarta area due to busy studying at the Faculty of Computer Science Universitas Gadjah Mada.

Zainuddin himself did not come from Java, Zainuddin own original of Amuntai, South Kalimantan, and he speaks fluent row. Zainuddin living in a suburb of Palangkaraya, precisely in the area of ​​swamp forest. But now the forest has been destroyed in large part by fires that might accidental fires by humans, shady forests that used to now look no further.

SmadAV started Zainuddin developed since October 2006 (when it was still in class XI Zainuddin Nafarin or 2 SMA). Since there are some friends who asked Zainuddin to clean computer from local viruses are annoying, but Zainuddin itself is still quite common on local virus that time. There are 2 that was irritating here, the first local virus itself. Second, Zainuddin Nafarin should come to their homes Nafarin Zainuddin friends to "help" clean up local viruses on their computers manually. Because of this would have to be willing to be friends Zainuddin fixed Nafarin helped and Zainuddin Nafarin do not bother anymore, since SmadAV Zainuddin start developing applications.

smadav antivirus indonesia

Zainuddin Nafarin named Zainuddin Nafarin SmadAV because SMA is SMAN-2 Palangkaraya, commonly called SMADA. So, SmadAV = SMADA + AV (Antivirus SMADA). Why should SMADA? Because Zainuddin Nafarin just starting to learn programming since the beginning of class XI (since Zainuddin Nafarin find Visual Basic in the lab SMADA) and even got a new Nafarin Zainuddin computer while mid-grade X.

Zainuddin Nafarin develop SmadAV since October 2006, and finally stopped in the month of May 2007 and just started again now. Zainuddin due in May 2007 will follow the Provincial Mathematics Olympiad time. And he thought for a while he had to concentrate first Olympics. But because Zainuddin (accidental) escape again to the national level, would not want Zainuddin fixed concentration at the Olympics until the end of October 2007.

After the Olympics ended, again Zainuddin still think has not been possible to re-develop SmadAV, because at that time Zainuddin return must be prepared to face the national exam (because he was sitting in class XII). Zainuddin think early on, he must be prepared to learn the bitter end, because it not only to face the UN (the number 6 subjects) but also the University Entrance Test. After it was all over, and (thankfully) Zainuddin acceptable at GMU in the Department of Mathematics, Zainuddin Nafarin think when it is time to develop more SmadAV. Although now Zainuddin Nafarin is a student and only child boarding, Zainuddin Nafarin will try to develop the maximum possible SmadAV.


License of Use.

SmadAV Antivirus is a free software licensed to SmadAV Free, and to a limited circle belisensi paid for SmadAV Pro.


What are the advantages compared SmadAV Pro Smadav Free?

SmadAV Pro has many additional features that do not exist in SmadAV Free, the following are additional features that you would get at SmadAV Pro: Automatic Update Online, Faster Scanning, Exception List, Maximize / Resize, Change Color Theme, Admin Password, and License Use of Profit. You must be a donor to get SmadAV Pro. Note: SmadAV Free & Pro has the same detection capabilities. The difference is only on the auto-update feature and other additional features.


SmadAV indeed require operational costs, research, hosting, and many other costs. So it is not possible to rely only Smadav Smadav Free to grow. SmadAV Pro is also the difference is not too much to ask Smadav Free Zainuddin Nafarin Benediction and a little donation (If you find it so SmadAV move forward.


SmadAV created with Visual Basic

SmadAV created using Visual Basic, not using Delphi, C / C + + or even assemby. Why? From the beginning Zainuddin Nafarin already focused on Visual Basic and will also take a long time if you have to convert Source Code SmadAV (more than 10000 lines) of the Visual Basic programming language to another. In addition to its re Zainuddin Nafarin must learn new programming languages, Zainuddin Nafarin also here just alone and do not have much time to develop SmadAV, because Zainuddin Nafarin must also fulfill Zainuddin Nafarin to college and get a high IP.

Excess use Visual Basic, SmadAV becomes easier and faster to develop than other programming language that is more complicated and much less Assembly SmadAV Exe File size smaller than Delphi.

The drawback using Visual Basic, SmadAV MSVBVM60.DLL actual need is always there in the Windows Platform system. "If the file is deleted by virus", automatic SmadAV and all the other Visual Basic applications can not be run on that computer. But this can be overcome by downloading MSVBVM60.DLL and put a folder with SmadAV. So no problem. SmadAV never used a database for VBS Virus detection, all total with heuristics alone.


Logo SmadAV


Zainuddin Nafarin time just looking for the most amazing objects ever found, especially in the field of mathematics. Zainuddin Nafarin impossible and decided this object as an icon because the icon is awesome SmadAV although very simple. While the green color symbolizes peace, which is why Smadav use green for all the components including this icon. SmadAV always use green because we are Indonesia, the world's lungs.


Release SmadAV


SmadAV use the thousands of API functions, little VB functions, making it much faster scanning. The average speed of scanning is 100 files per second. SmadAV only open-source for version 1.7 and 2.3.

Release SmadAV division, namely:
  •     Small Revision: rev.X.0.0 so rev 8.0.1 (revised periodically in a matter of days)
  •     Ordinary Revision: rev. X.0 so rev. 8.1 (typically 2 weeks)
  •     Major Revision: rev.X.5 so rev. 9.0 (usually 2 months)


Overall the release is as follows SMADAV extent that I know of:
  1.  SmadAV v1.0
  2. SmadAV v1.7
  3. SmadAV v2.3
  4. Smadav 2008 Rev 3.2
  5. Smadav 2008 Rev 3.4
  6. Smadav 2008 Rev 3.5
  7. Smadav 2008 Rev 3.6
  8. Smadav 2008 Rev 3.8
  9. SmadAV 2009 Rev 1.0
  10. Smadav 2009 Rev 3.8
  11. Smadav 2009 Rev 4.1
  12. Smadav 2009 Rev 4.3
  13. Smadav 2009 Rev 5.1
  14. Smadav 2009 Rev 5.2
  15. Smadav 2009 Rev 6.0
  16. Smadav 2009 Rev 6.2
  17. Smadav 2009 Rev 6.4
  18. Smadav 2009 Rev 7.0
  19. Smadav 2009 Rev 7.1
  20. Smadav 2009 Rev 7.2
  21. Smadav 2009 Rev 7.3
  22. Smadav 2009 Rev 7.4
  23. Smadav 2009 Rev 7.5
  24. Smadav 2010 Rev 8.0
  25. Smadav 2010 Rev 8.1
  26. Smadav 2010 Rev 8.2
  27. Smadav 2010 Rev 8.3
  28. Smadav 2011 Rev 8.4
  29. Smadav 2011 Rev 8.5
  30. Smadav 2011 Rev 8.6
  31. Smadav 2011 Rev 8.7
  32. Smadav 2011 Rev 8.8
  33. Smadav 2012 Rev 8.9
  34. Smadav 2012 Rev 9.0
  35. Smadav 2012 Rev 9.1
  36. SmadAV 2013 Rev 9.2
  37. SmadAV 2013 Rev 9.3
  38. SmadAV 2013 Rev 9.4
  39. SmadAV 2013 Rev 9.5
  40. SmadAV 2014 Rev 9.6
  41. SmadAV 2014 Rev 9.7
  42. SmadAV 2014 Rev 9.8, release August 23, 2014.

We usually test the beta version of the first in the Forum SmadAV, so if there are user forums that find bugs or disagree with a particular feature, of course SmadAV be repaired again. So it does not really end-user that we made in place SmadAV test. Sure we may not find all the bugs currently in beta testing Smadav forum, so do not rule out that there are still bugs in the release version SmadAV.

We do not prevent anyone who wants to criticize Smadav, because Smadav very open and still needs a lot of improvement. Also note that the program is not Smadav commercial / profit, SmadAV made for research and application of science Computer Science. So there is no reason to put the interests of our more self / group rather than the application of the science of Computer Science itself. We are more dedicated to the application Smadav Computer Science and scientific research in Indonesia.



Office SmadAV


SmadAV has no official office. SmadAV fruit is the result of the work of the hands of Gajah Mada University students residing in Yogyakarta. While all team members are volunteers who gathered online.


Forum SmadAV

Forum SmadAV made by mas kambeeng dated March 23, 2009. So, on March 23, 2012 forum Smadav even 3 years old. The initial purpose of the establishment of this forum is to provide users and asked questions through the forum. Forum SmadAV also available for users who want to report bugs, suggestions / criticism for SmadAV. In August 2011, the forum smadaver.com SmadAV recorded 69,923 registered users. Data source: Statistics Center SmadAV Forum.


External server (International) tend to be cheaper than a local server (IIX). Especially for a very cheap Shared Hosting abroad. Smadaver.com not wear Shared Hosting, but using VPS (Virtual Private Server) which is much more expensive and more stable for a sufficiently large forum. Currently there Daxa Server Smadav.net 2,500,000, -/bulan and Server Smadaver.com and viruslokal.com using Virtual Private Server at DreamHost, pay him between $ 50 - $ 100 per month or 500,000, - / month ( Rp6.000.000 - Rp12.000.000 per year). So can serve Smadaver the maximum possible speed.


Focus Development SmadAV.

SmadAV currently focused on the following four main functions:

1) additional protection for your computer, 100% compatible with other antivirus!

Most of the antivirus can not be installed together with other antivirus, it is because the antivirus is designed for primary protection on your computer. Unlike SmadAV, Smadav antivirus is a type that are designed as an additional protection, so 100% compatible and can work well although there has been another antivirus on your computer, in this case serves as a layer of defense SmadAV second. SmadAV has its own way (behavior, heuristic, and whitelisting) in detecting and cleaning viruses that will further enhance the security of the computer. Because the resource usage is very small SmadAV, SmadAV will not increase your computer's performance under heavy use. So, with a mix between SmadAV and antivirus protection that is installed on your computer will further strengthen the defense of your computer from virus infection.

2) Best USB Antivirus (Total Protection USB stick)

USB flash drive is one of the largest medium for spreading viruses in Indonesia. SmadAV have special technology for total prevention of virus that spreads via USB stick. Mission SmadAV is 100% no longer infectious virus from the flash. SmadAV have enough signatures of viruses that infect the flash, and has a special ability to detect new viruses in the flash though not in the database SmadAV. Not only is prevention, Smadav also able to clean up a virus that infects and restore virus hidden files in USB Flashdisk

3) Best for offline use (no need to update very often)

SmadAV very well be used for computers that rarely or even not connected to the internet. SmadAV do not need to update as often as any other antivirus that usually do updates per week and even per day. SmadAV usually only update once a month (monthly). SmadAV not overly dependent on the signature / virus database, but rather depends on the behavior detection techniques, heuristic, and whitelisting.

4) Cleaner and tools to clean the virus

SmadAV also able to clean the virus that has infected your computer and fix registry is modified by a virus. Other antivirals are usually not done cleaning the registry so that the computer has not returned to normal after cleaning the antivirus. Many supporting tools that are included in SmadAV as a weapon for cleaning viruses.

Note: Not all types of viruses can be cleaned Smadav, Smadav is still not able to clear the virus type penginfeksi programs or rootkit type (eg: virus Ramnit, Sality, Alman, Virut, etc..) Because this strain has blown most of your program files .

Our focus now is to thoroughly cleaning the virus types other than these two types (eg: virus WormShortcut, Cervical, MSO, Brontok, etc..)



Computer Security Key Features:

1. Process SmadAV

At Smadav clicked surreptitiously checking first (that is not to kill the virus) the state of your computer, if there is a virus going direct-kill SmadAV before the GUI (view) Smadav it appears. And this should be less than 3 seconds

2. File Cleaning

If it fails to do the cleaning Smadav, actual documents will not be deleted but quarantined, so they can restore (undelete) on the Quarantine tab.

There are several possible causes for cleaning files document fails (so it must be quarantined):
  •     File documents possessed (join) the body of the virus
  •     File documents hidden in a place that can not be reached smadav
If you are sure all data is secure, just delete all the virus in quarantine

3. Autorun.inf

Folder autorun.inf SmadAV serves to fend off the virus that makes autorun.inf file. Autorun.inf is only detected if any stick / Removable disk, not on the CD / DVD Drive. Zainuddin Nafarin computer itself is very often infected with Conficker because Zainuddin Nafarin often lax in researching in Lab SmadAV, Conficker infected computers often loose and Zainuddin Nafarin own, but still failed Conficker infects the flash by creating an autorun.inf file, because it is already locked by Smad -Lock.

autorun.inf virus is likely to be only duplicate themselves so similar to all the folders on the drive, including autorun.inf folder, so the virus will exe extension named autorun.inf.exe Recycler Folder in flash is 100% Virus Conficker. It should be noted that autorun.inf folder that has the attribute system + hidden so it will not confuse a novice user because most ordinary computer users do not display the file system + hidden. Only advanced computer users only from mostly hidden + file system, and they are mostly already know uses autorun.inf folder.

Keep in mind, Windows 7 was not using and ignoring the autorun.inf file on a removable disk. Actually autorun.inf on removable disk feature has been widely criticized by users of Windows XP because it is very dangerous and a very nice gap for the virus, Smadav just want to break the chain of virus, mostly in Indonesia spread via autorun.inf. So it is not recommended to remove autorun.inf folder SmadAV made.

Until now, almost all the virus (99%) are not able to remove autorun.inf folder SmadAV.

Zainuddin Nafarin realized there was a counter with Smad-Lock though only a small fraction. But please understand that the mission is actually just Smadav to significantly reduce the spread of the virus in Indonesia, and eventually we will get a high security on computers in Indonesia, both for users online and offline, mostly in Indonesia. Folder Autorun.inf automatic stay but no confirmation before will be added shortly after the flash is not installed there will be users who are confused, you should note that when it is removed the autorun.inf folder there will be a notification from windows: "This autorun.inf is LOCKED by SMADAV to protect your Flash-Disk from virus infection. "

So, the mission is really just SmadAV to significantly reduce the spread of the virus in Indonesia, and eventually we will get a high security on computers in Indonesia, both for users online and offline, mostly in Indonesia.

4. Smad-Lock


Folder Smad-Lock Δ Δ can not be d-scan by SmadAV Rev. 4 and previous versions. This is because the path has Unicode character that is Δ. Similarly, the virus can not scan and infect files in it, because to make a program may enter this folder programmer must create code that supports Unicode characters so it must overhaul reset all the codes that do not support Unicode. SmadAV 2009 Rev. 5 has been re Rombak Nafarin Zainuddin and supports Unicode. Smad-Lock virtually impossible to be modified by a virus. Virus penginfeksi folder is duplicating themselves like all the folders it finds including autorun.inf folder owned by Smad-Lock. But the virus can not be penginfeksi folder into the folder "Smad-Lock Δ Δ" Smad-Lock Folder is reserved only for files opened with microsoft made programs, such as office, explorer, notepad, etc.. Only a few non-Microsoft program that can open the file in a folder Smad-Lock. SmadAV already provide adequate notification and records in the folder Smad-Lock in the Read Me file. Indeed, there are approximately 5% local virus can enter the folder Smad-Lock, but almost no one could infect documents in it


Very strong reasons to make Smad-Lock feature:

90% of the virus (the virus either locally or outside the virus) in Indonesia are now spreading through autorun.inf, so please say you use the features in the autorun.inf file but get ready because your autorun.inf file will be replace by the viral and Removable Disk will be infected. If you are more concerned with security, switch Smad-Lock (Autorun.inf), until now most viruses (99%) are not able to remove autorun.inf folder SmadAV.

As you know, Windows 7 is not using and ignoring the autorun.inf file on a removable disk. Actually autorun.inf on removable disk feature has been widely criticized by users of Windows XP because it is very dangerous and a very nice gap for the virus, Smadav just want to break the chain of virus, mostly in Indonesia spread via autorun.inf. So it is not recommended to remove autorun.inf folder SmadAV made.
SmadAV already provide adequate notification and records in the folder Smad-Lock in the Read Me file. More detailed technical notes may be added in the next revision in the Read Me file

The trick to ensure safe flash-disk (almost 100%) of the virus
  • First Activate Smad-Lock in flash disk and insert all the files / folders into the folder "Smad-Lock Δ Δ"
  • Folder Smad-Lock (Safe Smadav) it will have to be made manually via Tools-> Smad-Lock.
  • Remember, do not ever change the name "Smad-Lock Δ Δ".


Is it possible that Smad-Lock penetrated virus?

Smad-Lock is still possible penetrated by a small virus. Viruses that (1) as a whole or (2) only some functions that support UNICODE path.
  • For the first type, the virus which overall supports UNICODE, can even infect documents / files in a folder Smad-Lock, but until now I have not been there found a virus like this, especially in Indonesia which could infect documents (not executable), there is only alien virus that can infect the exe.
  • For the second type of virus, only a partial function that supports UNICODE path, just be able to copy the file to the folder Smad-Lock, and most do not modify the other files that already exist in the folder Smad-Lock. Viruses of this type may be estimated less than 5% of the entire local virus spread in Indonesia.
Thus, Smad-Lock folders clear gap still exists and it is not possible 100% safe.


5.    Smad-RTP


Smad-RTP only prevent the execution of virus Explorer and flash. So there will be no registry if execution viral infections have been prevented. SmadAV not automatic scanning of all file activity on your computer, because this is a very light Smadav protection. So SmadAV will prevent you execute the virus file a moment when you open the folder through Explorer.


6. Registry


Smadav can always clean the registry it detects, if the difference is Forbidden String and string can not automatically correct and detected again despite being cleared, there may be a viral infection that constantly change to their original values.


7. Flashdisk

For example SmadAV in flash and infected and the user opens Smadav of the media, it Smadav warned that the file has been corrupted. There is no 100% security, but we have to try the best security possible.


SmadAV Link Download Antivirus Free Edition:

Download SmadAV Rev 2014. 9.8
Download Smadav 2014 Rev. 9.8

SmadAV Link Download Antivirus Pro Edition:

Key Smadav Pro


Source link for those of you who want to know more about Antivirus SmadAV:
  1.     http://www.smadav.net/
  2.     http://www.viruslokal.com/
  3.     http://smadaver.com/
  4.     http://www.facebook.com/smadav
  5.     http://id.wikipedia.org/wiki/Smadav
  6.     http://smadaver.com/bug-kritik-saran/smadav-colection/
  7.     http://www.nafarin.com/

For those of you who want to participate to contribute the development of Antivirus SmadAV visit this link:

Also NSA Tapping Component "Hardware" Computer?


New information about spying the National Security Agency (NSA) again revealed. According to Der Spiegel reports, in addition to tapping the telephone network and the Internet, U.S. intelligence is reportedly planting espionage program (backdoor) in hardware devices (hardware) computer.

In internal documents NSA explained that the hardware in question include some kind of router and network equipment from the hard disk manufacturers, such as Cisco, Juniper, Dell, Western Digital, Seagate, Maxtor, Samsung, to Huawei.


Backdoor program planted by the NSA special division called Advanced / Access Network Technology (ANT). "No matter whatever the security wall built by the device manufacturer, specialized NSA can break through," the report said.

Division ANT often target the BIOS or firmware contains a chip in which there is an instruction to turn on the device. Because of this, planted a backdoor program that can not be detected by antivirus software and will remain entrenched despite the operating system of a computer is deleted.

ANT is under an elite unit of hackers called Tailored Access Operations (TAO). While the NSA said that TAO is one of the key elements for "national defense" U.S.. "Their work (TAO) centered about the exploitation of the network to support data gathering intelligence from abroad," the NSA said in a statement.

As quoted from CNet, a computer company Dell said he did not know the NSA spying on homemade products.

Cisco spokesperson also spoke about this news. "At this time, we do not know whether there are vulnerabilities in the new product, and we will continue to pursue all of them to determine whether we need to tackle new problems. If we learn of a weakness in one product, we will immediately resolve it. As we stated before, and we communicate to Der Spiegel, we do not work with the government to weaken the product to be exploited, or to implement the so-called backdoor security in our products. "

TAO unit is said to look for security holes in the Windows operating system crash reports. In addition, TAO also able to intercept computer hardware components and accessories to be paired spy program in it.

Author: Oik Yusuf
Editor: Aditya Panji
Sources: CNET, quoted from: http://tekno.kompas.com/, Monday, December 30, 2013, 12:10 pm.

Revealed, intense "machine" The Eyes of the NSA.


The mysterious boxes highlighted on top of the US embassies in Stockholm, Moscow, Berlin and Beijing.

A recent leaked documents from the whistle-blower reveals the greatness of Edward Snowden "engine" of the National Security Agency (NSA) in the course of a spy. Surveillance and tapping machine is a digital application evil or so-called malware.

U.S. intelligence agencies have a system called "TURBINE" that can spread malware millions at a time. TURBINE is under NSA hackers unit called Tailored Access Operations (TAO).

Documents cited by The Register of The Intercept revealed that the TURBINE able to handle malware that infects the computer in "large scale (millions of units)" through an automated system that controls implanted malware in groups.


TURBINE have "expert system" that will automatically choose the type of malware that is matched with the target and the particular situation, and then install it on the target computer. Thus, this system requires little human intervention to be run.

Types of malware such as those coded name of "grok" that can record keyboard keystrokes, "CAPTIVATEDAUDIENCE" which can record sound through a microphone, or SALVAGERABBIT that can copy data from computer storage media.

NSA system design is similar to other sophisticated cyber weapon ever makes a scene in the virtual world, such as Stuxnet and Flame. Both programs also allegedly deliberately made by certain countries.

NSA has enabled TURBINE least since July 2010 and has infected up to 100,000 computers.


TURBINE sensor system is also connected to the NSA called "TURMOIL" which tapped into a worldwide computer network to monitor data traffic and identifying potential targets. TURMOIL can track targets via e-mail address, or IP, or cookies from sites such as Google, Microsoft, Twitter, and Yahoo!.

Author: Oik  Yusuf
Editor: Reza Wahyudi
Source: The Register, quoted from: http://tekno.kompas.com/, Thursday, March 13, 2014, 18:31 pm.

Kamis, 13 Maret 2014

The 4 Best Free Linux Anti Virus Programs ( in 2010 ).



Does a Linux user need antivirus software? 
Not really: infecting a Linux machine is pretty hard to do. That doesn’t mean there aren’t good reasons to have scanning software around, though.

If you insert your thumb drive regularly into Windows computers, for example, it might be infected, meaning you’re spreading malware with it and not even knowing it.  Antivirus software for Linux gives you a quick way to check your drives without any risk of infecting yet another Windows machine.

It’s also a great tool to have around if you regularly help your Windows-bound friends and family recover from viruses. Remove their hard drive and plug it into your computer, or just use your Linux machine to clean their external drives.

Most Linux antivirus software focuses on removing Windows viruses, and function as one-time-scan tools rather than the Windows-style, sit-in-your-tray-and-protect-you products that’s common in Windowsland. Such software is not essential for Linux users, but is pretty handy.

Oh, by the way: if you’re looking for Windows anti-virus software, you will want to read the ten best free antivirus programs that we previously published.

  • Avast


avast scan   The 4 Best Free Linux Anti Virus Programs

Avast, the anti-virus program I previously decided has the coolest name for an anti-virus program, also sports a pretty great Linux GUI. As you can see it looks right at home on my Ubuntu desktop. This makes it easy to update defintions and scan the folders of your choice.

It’s also really easy to install Avast for Linux. Just download your package of choice (rpm, deb and tar.gz), then register for a free year of Avast usage. If you don’t register, you won’t be able to use the program:

avast registration   The 4 Best Free Linux Anti Virus Programs

Happily, registering gives you one year of free non-commercial usage, so you won’t need to do this frequently. And you’ll have access to a sleak GUI and all of the definitions Avast has to offer.

  • BitDefender

bitdefender scan   The 4 Best Free Linux Anti Virus Programs

This is one of my favorites. BitDefender frequently finds, for me, viruses that other scanners miss. Being able to use it from Linux is a big plus.

Finding it for Linux isn’t straightforward, though. You need to head over to the BitDefender for Unices page, then click the “evaluation version” button. You’ll be given a form to fill in, and when you’re done you’ll get a license valid for one month and a link to downloads.

The downloads look like this:
bitdefender download   The 4 Best Free Linux Anti Virus Programs

Find your platform and package of choice (ignoring, for now, the “.run” file extension) and download it (right-click and click “save as“, or your browser might try to open the entire file as a text document.) Change the permissions of the file to allow it to be executed. If you don’t know how to do this, the simplest way is to right-click it, click “Properties,” open the permissions tab, then click “allow executing.”

Finally, open your command line. Browse to the folder with the file, then type “sudo ./[filename]“, where [filename] is the name of the BitDefender version you downloaded. You’ll need to read an EULA before BitDefender will finally install (mercifully, using the package manager of your choice).

Why you need to go through all of that I don’t know, but it’s worth it. You now have access to a complete version of BitDefender. You can scan any file, update with the click of a button and much more. The graphical interface is identical to that of the BitDefender Live CD.

The free license lasts for only 30 days, but you can apply for another one if you need to.

  • ClamAV


Completely open source, ClamAV is probably the most famous Linux anti-virus. Using it requires some command line knowledge, but there is a basic GUI for running scans:

clamav   The 4 Best Free Linux Anti Virus Programs

Installing ClamAV is simple; it’s in the repositories of most Linux distributions. Install the “clamtk” package and you’ll get the above GUI and you’ll have everything you need; or, if you’re an Ubuntu user, simply click here to download ClamAV.

Once you’ve installed ClamAV, fire up your terminal and run “sudo freshclam“.  This will update ClamAV’s virus definitions for you.

Now you simply need to run clamtk. Fire it up from the command line, or find the program called “Virus Scanner” in the “Accessories” section of the menu. Use the GUI to scan any folder, or your entire system. Or, if you prefer, use “clamscan” from the command line. Either way you’ve got some quality, free anti-virus protection.


  • AVG


avg scan   The 4 Best Free Linux Anti Virus Programs

Those familiar with AVG’s Windows interface will be disappointed: AVG for Linux has no GUI. This command line scanner does offer the same virus definitions of AVG’s famous Windows program, though.
You can easily download AVG for Linux. You’ll find packages for every major distro, including .deb and .rpm files.

Using the program is straightforward. First you need to start the AVG daemon: run “sudo avgctl –start“. Then you can use “sudo avgupdate” to update the software, and “avgscan” to scan a given file.

avgupdate   The 4 Best Free Linux Anti Virus Programs

There’s not a whole lot else to say about this one, although I hope AVG releases a Linux GUI again soon (previous versions offered one).


Conclusion

These four programs all offer Linux users a way to scan for Windows viruses, and the occasional Linux one as well. If you regularly help your friends and family out with IT stuff I recommend you install at least one such program, to keep it on hand.
Can you think of any other Linux anti-virus programs? What do you think of the ones outlined? Let me know in the comments below, along with any questions you might have about the above products.

Author : Justin Pot 
Source :  http://www.makeuseof.com/, 31st October, 2010.

DOWNLOAD : Anti-virus For Linux.


Linux is no longer immune to security threats, All computer systems can suffer from malware and viruses, including Linux.

Linux operating systems have been considered less vulnerable than Windows systems for many years but the myth that they are immune to virus attack is completely false.

File:ClamTK3.08.jpg
The ClamTk GUI for ClamAV running a scan on Ubuntu 8.04 Hardy Heron

It is still recommended that Linux users have antivirus software installed on Linux systems that are on a network or that have files being transfered to the device. Some users may argue that antivirus software uses up too much resources. To better understand antivirus programs, it may be beneficial to understand malware itself.

The Linux platforms early low instance of attacks was primarily due to the lack of root access required for malware to infiltrate the system, the Linux communitys ability to quickly patch vulnerabilities, and the low adoption rate of Linux in the corporate network. This made Linux a lower priority target for the writers of malware.

There are a number of anti-virus applications available which will run under the Linux operating system. Most of these applications are looking for exploits which could affect users of Microsoft Windows.Virus scanners are security applications that search the system for malware. The scanners look for certain patterns of code or specific characteristics of malware. Depending on the threat potential, virus scanner, and settings, the malware may be deleted instantly or the user will be asked what to do with the malicious software.

  • ClamAV(FREEWARE).
ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats. It is the de facto standard for mail gateway scanning. It provides a high performance mutli-threaded scanning daemon, command line utilities for on demand file scanning, and an intelligent tool for automatic signature updates. The core ClamAV library provides numerous file format detection mechanisms, file unpacking support, archive support, and multiple signature languages for detecting threats.

Latest ClamAV® stable release is: 0.98.1 , download from :

ClamAV Virus Databases:
  1. main.cvd ver. 55 released on 17 Sep 2013 10:57 :0400 (sig count: 2424225), DOWNLOAD
  2. daily.cvd ver. 18579 released on 11 Mar 2014 19:39 :0400 (sig count: 816864), DOWNLOAD
  3. bytecode.cvd ver. 236 released on 05 Feb 2014 12:36 :0500 (sig count: 43), DOWNLOAD
  4. safebrowsing.cvd ver. 41665 released on 11 Mar 2014 16:00 :0400 (sig count: 1176793), DOWNLOAD


Users can go to the site for downloads to install the software or they can type the following command:

Code:
sudo apt-get install clamav clamav-daemon clamav-freshclam

ClamAV's definitions are updated via freshclam. Type "sudo freshclam" to update the virus scanner's definitions.

ClamTK - ClamTK is a free frontend for ClamAV. ClamTK is licensed under the GPL license. ClamTK passes parameters to ClamAV, but ClamTK does not perform the scan or any other task itself. To install ClamTK, go to clamtk.sourceforge.net and download the software or type the command below:

Code:
sudo apt-get install clamtk

  • Avast. 
Avast is a freemium antivirus software. Avast is not open-source and uses up resources like RAM. Many users feel that Avast offers more protection than ClamAV. The paid version of Avast offers numerous features that ClamAV lacks. For instance, Avast can sandbox applications.

  1. avast-1.0.6-1.x86_64.rpm 
  2. avast_1.0.6-1_amd64.deb
  3. avast-1.0.6-1.i386.rpm 
  4. avast_1.0.6-1_i386.deb

  • AVG - Anti-Virus (FREEWARE).
AVG - Anti-Virus Guard is a proprietary virus scanner that can be downloaded from here :
  1. AVG Free Edition for Linux (avg2013flx-r3118-a6926.i386.deb), last update December 17, 2013 ; size : 126 MB DOWNLOAD
  2. AVG Free Edition for Linux (avg2013flx-r3118-a6926.i386.rpm), last update : December 17, 2013 ; size :  126 MB DOWNLOAD
  3. AVG Free Edition for Linux (avg2013flx-r3118-a6926.i386.sh), last update : December 17, 2013  ; size : 126 MB DOWNLOAD
  4. AVG Free Edition for Linux (avg2013flx-r3118-a6926.i386.tar.gz), last update : December 17, 2013 ; size :  126 MB DOWNLOAD
  5. AVG Server Edition for FreeBSD (avg2013ffb-r3115-a6155.i386.tar.gz) , last update : March 13, 2013 ; size :  101 MB DOWNLOAD

  • Comodo Anti-Virus (FREEWARE).
Comodo is a proprietary scanner that can be downloaded from :

  • Kaspersky Anti-Virus.
Kaspersky is a proprietary scanner that can be found on this link
  1. Version 8.0 (8.0.2.172) for Linux (rpm) [.rpm] (Distributive), DOWNLOAD
  2. Version 8.0 (8.0.2.172) for Linux (deb) [.deb] (Distributive), DOWNLOAD
  3. Version 8.0 (8.0.2.172) for Linux (deb) [] (Quarantine upgrade utility), DOWNLOAD
  4. Version 8.0 (8.0.2.172) for Linux (rpm) [] (Quarantine upgrade utility), DOWNLOAD
  5. Version 8.0 (8.0.2.172) for CentOS 4.x [.rpm] (Distributive), DOWNLOAD
  6. Version 8.0 (8.0.2.172) for CentOS 4.x [] (Quarantine upgrade utility), DOWNLOAD
  7. Version 8.0 (8.0.2.160) for Linux (rpm) [.rpm] (Distributive), DOWNLOAD
  8. Version 8.0 (8.0.2.160) for Linux (deb) [.deb] (Distributive), DOWNLOAD
  9. Version 8.0 (8.0.2.160) for Linux (deb) [] (Quarantine upgrade utility), DOWNLOAD
  10. Version 8.0 (8.0.2.160) for Linux (rpm) [] (Quarantine upgrade utility), DOWNLOAD
  11. Version 8.0 (8.0.2.160) for FreeBSD 7.x [.tgz] (Distributive), DOWNLOAD
  12. Version 8.0 (8.0.2.160) for FreeBSD 8.x [.tgz] (Distributive), DOWNLOAD
  13. Version 8.0 (8.0.2.160) for FreeBSD 9.x [.tgz] (Distributive), DOWNLOAD
  14. Version 8.0 (8.0.2.160) for FreeBSD 7.x [] (Quarantine upgrade utility), DOWNLOAD
  15. Version 8.0 (8.0.2.160) for FreeBSD 8.x [] (Quarantine upgrade utility), DOWNLOAD
  16. Version 8.0 (8.0.2.160) for FreeBSD 9.x [] (Quarantine upgrade utility), DOWNLOAD
  17. Version 8.0 (8.0.1.145) [.deb], DOWNLOAD
  18. Version 8.0 (8.0.1.145) [.rpm], DOWNLOAD
  19. Version 8.0 (8.0.1.145) [.tgz], DOWNLOAD


  • Bitdefender Anti-Virus (SHAREWARE).
bitdefender  is a proprietary scanner that can be downloaded from : 

EScan for Linux (proprietary)


Author : Yohanes Gitoyo.
Reference :




  1. http://en.wikipedia.org/wiki/Linux_malware
  2. http://www.linux.org/threads/malware-and-antivirus-systems-for-linux.4455/
  3. http://www.bitdefender.com/
  4. http://www.comodo.com/
  5. http://forum.avast.com/
  6. http://www.clamav.net/
  7. http://www.kaspersky.com/
  8. http://free.avg.com/

Know All About Linux Malware !!!


Linux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses.

There has not yet been a widespread Linux malware infection of the type that Microsoft Windows software has; this is attributable generally to the malware's lack of root access and fast updates to most Linux vulnerabilities.


Linux vulnerability.

Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented. To gain control over a Linux system or to cause any serious consequences to the system itself, the malware would have to gain root access to the system.

In the past, it has been suggested that Linux had so little malware because its low market share made it a less profitable target. Rick Moen, an experienced Linux system administrator, counters that:
[That argument] ignores Unix's dominance in a number of non-desktop specialties, including Web servers and scientific workstations. A virus/trojan/worm author who successfully targeted specifically Apache httpd Linux/x86 Web servers would both have an extremely target-rich environment and instantly earn lasting fame, and yet it doesn't happen."

The amount of malware targeting Linux has seen an increase in recent years, however. Shane Coursen, a senior technical consultant with Kaspersky Lab, claims, "The growth in Linux malware is simply due to its increasing popularity, particularly as a desktop operating system ... The use of an operating system is directly correlated to the interest by the malware writers to develop malware for that OS."

Tom Ferris, a researcher with Security Protocols, commented on one of Kaspersky's reports, stating, "In people's minds, if it's non-Windows, it's secure, and that's not the case. They think nobody writes malware for Linux or Mac OS X. But that's not necessarily true,"

Some Linux users do run Linux-based anti-virus software to scan insecure documents and email which comes from or is going to Windows users. SecurityFocus's Scott Granneman stated:
...some Linux machines definitely need anti-virus software. Samba or NFS servers, for instance, may store documents in undocumented, vulnerable Microsoft formats, such as Word and Excel, that contain and propagate viruses. Linux mail servers should run AV software in order to neutralize viruses before they show up in the mailboxes of Outlook and Outlook Express users.

Because they are predominantly used on mail servers which may send mail to computers running other operating systems, Linux virus scanners generally use definitions for, and scan for, all known viruses for all computer platforms. For example the open source ClamAV "Detects ... viruses, worms and trojans, including Microsoft Office macro viruses, mobile malware, and other threats."

  • Viruses and trojan horses

The viruses listed below pose a potential, although minimal, threat to Linux systems. If an infected binary containing one of the viruses were run, the system would be infected. The infection level would depend on which user with what privileges ran the binary. A binary run under the root account would be able to infect the entire system. Privilege escalation vulnerabilities may permit malware running under a limited account to infect the entire system.

It is worth noting that this is true for any malicious program that is run without special steps taken to limit its privileges. It is trivial to add a code snippet to any program that a user may download and let this additional code download a modified login server, an open mail relay, or similar program, and make this additional component run any time the user logs in. No special malware writing skills are needed for this. Special skill may be needed for tricking the user to run the (trojan) program in the first place.

The use of software repositories significantly reduces any threat of installation of malware, as the software repositories are checked by maintainers, who try to ensure that their repository is malware-free. Subsequently, to ensure safe distribution of the software, checksums are made available. These make it possible to reveal modified versions that may have been introduced by e.g. hijacking of communications using a man-in-the-middle attack or via a redirection attack such as ARP or DNS poisoning. Careful use of these digital signatures provides an additional line of defense, which limits the scope of attacks to include only the original authors, package and release maintainers and possibly others with suitable administrative access, depending on how the keys and checksums are handled.

  • Worms and targeted attacks.

The classical threat to Unix-like systems is vulnerabilities in network daemons, such as SSH and web servers. These can be used by worms or for attacks against specific targets. As servers are patched quite quickly when a vulnerability is found, there have been only a few widespread worms of this kind. As specific targets can be attacked through a vulnerability that is not publicly known there is no guarantee that a certain installation is secure. Also servers without such vulnerabilities can be successfully attacked through weak passwords.

  • Spyware.

This malware gathers a user's private data (financial info, passwords, usernames, etc.) and sends it to the spyware maker or other entity that will use the information. Spyware can be trojans and some trojans can be spyware.

  • Adware.

Software that displays ads is considered adware. Not all adware is bad. For instance, Flashget is a freeware Windows application that is adware. The program is safe to use. The ads just fund the development of Flashget. Because most Linux developers make applications open-source, not very many Linux adware programs can be found.

  • Riskware.
Software with unintended malicious potential. These applications can be used by malware to cause a lot of damage. Because this software is not malware, but can be dangerous is called riskware.

  • Scareware.
Malware that scares users into downloading malicious software or paying money for the fix is scareware. For illustration, scareware may pop up a message that says something like "Your data will be deleted unless you pay $100.". Scareware may also come in the form of a free virus scan over the Internet. This virus scan does not scan the system, but pretends to do so. The scanner will say it found a virus. The scanner then asks the user to pay money to have the virus removed. In summary, scareware scares computer users into paying money or installing malware to protect themselves against a nonexistent threat.

  • Ransomware.
Ransomware is similar to scareware. Ransomware locks the computer and files and will not lift the restrictions until the user pays a ransom. Ransomware really locks the system while scareware bluffs.

  • Web scripts.

Linux servers may also be used by malware without any attack against the system itself, where e.g. web content and scripts are insufficiently restricted or checked and used by malware to attack visitors. Typically a CGI script (meant for leaving comments) by mistake allows inclusion of code exploiting vulnerabilities in the web browser.

  • Buffer overruns

Older Linux distributions were relatively sensitive to buffer overrun attacks: if the program did not care about the size of the buffer itself, the kernel provided only limited protection, allowing an attacker to execute arbitrary code under the rights of the vulnerable application under attack. Programs that gain root access even when launched by a non-root user (via the setuid bit) were particularly attractive to attack. However as of 2009 most of the kernels include address space layout randomization (ASLR), enhanced memory protection and other extensions making such attacks much more difficult to arrange.

  • Cross-platform viruses.

An area of concern identified in 2007 is that of cross-platform viruses, driven by the popularity of cross-platform applications. This was brought to the forefront of malware awareness by the distribution of an OpenOffice.org virus called Badbunny.

Stuart Smith of Symantec wrote the following:
"What makes this virus worth mentioning is that it illustrates how easily scripting platforms, extensibility, plug-ins, ActiveX, etc, can be abused. All too often, this is forgotten in the pursuit to match features with another vendor... The ability for malware to survive in a cross-platform, cross-application environment has particular relevance as more and more malware is pushed out via Web sites. How long until someone uses something like this to drop a JavaScript infecter on a Web server, regardless of platform?"
  • Social engineering.

As is the case with any operating system, Linux is vulnerable to malware that tricks the user into installing it through social engineering. In December 2009 a malicious waterfall screensaver was discovered that contained a script that used the infected Linux PC in denial-of-service attacks.

Protecting and Repairing:

The best way to protect a system against viruses is to only download and install software from trusted sites and developers. For example, get programs from your distro's official repository before using a program obtained from some third party site.

There are two ways to remove malware. The first method includes using a virus scanner to find and remove the malware. The second way is to delete the executables manually that are known to be the culprits.

To repair damaged executables, reinstall the infected or damaged software. For example, if a virus infected a Firefox executable, then re-download and install Firefox.

Also, when protecting yourself against malware, it is important to know that malware can only be in an executable or be the executable itself. For instance, a PNG, MP3, and FLV files cannot be viruses. An application simply opens the files for the user to see or listen. In addition, remember that most screensavers are executables, so malware may hide in screensavers.


Even though Linux has very few viruses, all computers and servers should have some form of protection against malware. Knowing how malware works and how to protect computers will aid in protecting many systems.

Author : Yohanes Gitoyo.
Reference :

  1. http://en.wikipedia.org/wiki/Linux_malware
  2. http://www.linux.org/threads/malware-and-antivirus-systems-for-linux.4455/
  3. http://www.bitdefender.com/
  4. http://www.comodo.com/
  5. http://forum.avast.com/
  6. http://www.clamav.net/