• floofloof@lemmy.ca
      link
      fedilink
      English
      arrow-up
      16
      ·
      edit-2
      1 year ago

      There’s a surprising lack of them, and rather too many people who say “if you get a virus in Linux you’re doing Linux wrong.” ClamAV is readily available but pretty basic, slow at scanning, not real-time, and erring on the side of false positives. The commercial options are all sold to businesses under those “contact us and we’ll tell you what it costs once we’ve figured out how much money you have” pages. And if you search for answers you find a lot of recommendations for AV products that don’t seem to exist any more.

      • piexil@lemmy.world
        link
        fedilink
        arrow-up
        9
        ·
        edit-2
        1 year ago

        A lot of those enterprise solutions like crowdstrike are a pain in the ass because they use a binary kernel module that supports like 5 kernels at most too

      • Shaolin Shrimp@lemmy.ml
        link
        fedilink
        arrow-up
        15
        ·
        1 year ago

        Thanks, my government (UK) has banned Kaspersky for use in their infrastructure, so I’ll follow their advice for my own. Not mentioned in the replies is BitDefender, I see they have a solution as well, I’ll evaluate.

      • BaumGeist@lemmy.ml
        link
        fedilink
        arrow-up
        6
        ·
        edit-2
        1 year ago

        This isn’t helpful, nor true. As technology grows, so do attack vectors, so do malware devs, so do vulnerable softwares, so do cloud servers and SaaS and android and steamos and IoT making linux a juicier target.

        Two truths of “common sense” is that it’s rarely actually common nor does it make sense to anyone not already In The Know. The “Sense” that is actually common is often wrong.

        If by “Common sense antivirus” you mean “don’t download and run the Hot Singles Finder ELF from a xxxNerdsDickedDown.com ad,” that kind of common sense simply isn’t enough to ensure avoiding infection anymore; if you mean “use a firewall, and don’t install/run anything without checking signatures/checksums, and prefer sandboxing, and also check for exploits of application management programs like Steam or Google Play that are theoretically supposed to be checking signatures/checksums for you, and use a password manager, and don’t click on the links in email, and check the headers to ensure it’s actually fron who it says it’s from, and…” then you’re far outside the realm of “common.”

        If your kneejerk response is “that’s just being overly paranoid,” congrats, you have become a User: you are the type of person who needs something to automate checking for malware/exploits so you don’t get yourself botnet’d.