I already know the answer to this question is a resounding NO!
I've conducted thorough research, and most responses I've come across on this topic typically suggest:
- It's extraordinarily unlikely.
- Unless a file specifically asks for your password when opened, you should be fine.
- Linux systems are generally safe.
- As long as you avoid visiting dangerous websites, you should be fine.
- Installing antivirus software on Linux machines is often deemed a waste of time since granting root permissions to such software can create convenient entry points for attacks.
I'm already aware of these points and take precautions by being selective about the websites I visit, verifying links before clicking on them, and confirming the legitimacy of files before opening them.
However, if I want to determine whether my system has been compromised, I currently use https://www.clamav.net/ Are there any other options available? (Since ClamAV only scans files) What steps should I take to further enhance the security of my system?
For example, I've already divided my hard drive into two partitions - one for / and another for /home. I'm considering setting all files within /home to have file permissions of 600, allowing only the owner to read and write the files. Is this considered a best practice?
Within /home, I have folders like "snap" and "VirtualBox". Would it be advisable to apply 770 permissions to these folders?
In addition to these practices, I'd like to implement a method for detecting files that may be spying on me. I often collaborate on open-source projects where I may receive files, such as C files, from other team members (usually, the team is just me and one other person). Even if I review the code, I'm concerned that the files (often consisting of multiple files) may still contain hidden malicious code. Therefore, I want to ensure that my computer is not currently infected.
Thank you in advance
Bookmarks