• 0 Posts
  • 40 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle

















  • Zeth0s@lemmy.worldtoSelfhosted@lemmy.worldAlternative to ClamAV?
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    10 months ago

    I use python professionaly. Never seen a real successful supply chain attack on libraries used by “normal” people. There was recently a supply chain attack to pytorch, that I remember, but it was solved within few hours.

    It is not a real risk for non developers. It is a risk, but veeery low, miles lower than pdf.exe.

    Just check this stat for ransomwares taken as an example of viruses: https://www.statista.com/statistics/701020/major-operating-systems-targeted-by-ransomware/

    Windows server is ~20% of server market. Still it is there second, with in practice no GNU/linux (80% of server market). This is why people do not really worry much, the risk exists, but it is minimal for well configured system compared to competition, even where competitors are a niche and Linux machines are the main target.

    On windows, an antivirus is not a bad idea… On Linux, a firewall and basic care are usually sufficient



  • Zeth0s@lemmy.worldtoSelfhosted@lemmy.worldAlternative to ClamAV?
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    10 months ago

    Ok, than the experiment you are doing is just to check how many attacks you can get over a certain time… It is not really representative of a common use case. And again, this is not a virus. It is a successful attack from a bot on a purposely misconfigured service exposed to the internet. An antivirus is not needed. What is needed is basic configuration. An antivirus cannot help there