Is Linux Operating System Virus Free?

Linux System is considered to be free from Viruses and Malware. What is the truth behind this notion and how far it is correct ? We will be discussing all these stuffs in this article.

Linux Virus Free

Linux OS is Virus Free?

Is Linux Operating System Immune to Malware

To be true, No! No OS on this earth can be ever be 100% immune to Viruses and Malware. But still Linux never had a widespread malware-infection as compared to Windows. Why? Let us find the reason behind this.

Some people believes that Linux still has a minimal usages share, and a Malware is aimed for mass destruction. No programmer will give his valuable time, to code day and night for such group and hence Linux is known to have little or no viruses. Had it been true, Linux should be the primary target of Malware infection because more than 90% of high end server runs on Linux today.

Destroying or Infecting one server means collapse of thousands of computer and then Linux would have been the soft target of hackers. So certainly usages share ratio is not in consideration for the above said fact.

Linux is architecturally strong and hence very much immune (not totally) to security threats. Linux is Kernel and GNU/Linux is the OS. There are hundreds of distributions of Linux. At Kernel Level they all are more or less the same but not at the OS Level.

Now suppose a malicious script is written for a RPM based system i.e., RedHat, Fedora, CentOs, it can’t infect a Debian based system and a destructive script written for Debian based OS can’t infect a RPM based System. Moreover a script that is going to perform a system-wide change needs root password.

If root password is confidential and strong enough, the OS is literally secure. Now a windows virus can not contaminate a Linux until Wine is installed and run as root. Hence it is suggested not to run wine as root.

You can not set a Linux System without setting up root password and user password. It means every user in a Linux System must have a password except ‘Guest‘. Where as Windows allow you to set user and even root account without password. A user can not run a program be it install/uninstall without permission provided (sudo) or root password.

But this is not the case with Windows, All windows program can be installed or uninstalled without the consent of root (Administrator). Could you run windows without GUI ? NO! But you can certainly run a Linux without GUI and it remains as much productive as it is with GUI. Actually most of the System Administrator disable GUI as a security concern.

Linux is so much secure in architecture that you even don’t need to go behind a firewall until you are on Network. The access control Security Policy in Linux that is called Security-Enhanced Linux (SELinux) is a set of Kernel modification and user-space tools which implement security policies in a Linux system. Even SELinux is not must for normal users however it is important for users on network and Administrators.

An Open Source Antivirus ‘Clam AV‘ is available for free download and you should install it, if your machine is on Network for comparatively more protection.

Download ClamAV from here: http://www.clamav.net

Apart from these You can encrypt you disk, use a boot loader password, define and implement a custom boot, custom user roles, etc., makes Linux very much secure. However there are certain threats to Linux System and we will be discussing those here.

The known Linux threats like Viruses, Trojans, Worms and Malware of other kind counts up to 422 in 2005 which gets more than doubled in the recent year with the current count of 863, as reported which is seen as a sign of increasing popularity of Linux as claimed by technical experts.

Some Know Linux Threats
  1. Virues
  2. Tron horses
  3. Local Scripts
  4. Web Scripts
  5. Worms
  6. Targeted Attacks
  7. Rootkits, etc.

These days a new trend of cross platform viruses is getting common. Some of the measures one should implement, for Linux System protection:

  1. Protect bootloader
  2. Encrypt Disk
  3. check rootkits on regular basis
  4. Protect Root with strong Password
  5. Provide correct permission to files
  6. provide proper roles to users
  7. Implement SELinux
  8. Use Antivirus
  9. Go behind a Firewall
  10. Don’t keep un-necesarry packages and programs (It may result into security Flaw).

Using Linux sensibly is secure enough. Now the question arises if Linux is architecturally so much secure than Android which uses modified Linux Kernel for mobile devices has so much security flaws, Why?

Well Android is developed in Java Programming Language and Java itself is known to have a number of security flaws. Moreover Android is very much in its child stage and will take some time to get matured.

This article was aimed to provide you with the correct information while making you aware of prevalent misconception about Linux. That’s all for now . We will soon we coming with another interesting article related to Linux and FOSS Technologies. Till then keep connected and keep Visiting Tecmint.com.

Any suggestion regarding Article and Tecmint.com is welcome on a higher note.

Share Us and Help Us To Spread

Best Affordable Linux and WordPress Services For Your Business
Outsource Your Linux and WordPress Project and Get it Promptly Completed Remotely and Delivered Online.

If You Appreciate What We Do Here On TecMint, You Should Consider:

  1. Stay Connected to: Twitter | Facebook | Google Plus
  2. Subscribe to our email updates: Sign Up Now
  3. Get your own self-hosted blog with a Free Domain at ($3.45/month).
  4. Become a Supporter - Make a contribution via PayPal
  5. Support us by purchasing our premium books in PDF format.
  6. Support us by taking our online Linux courses

We are thankful for your never ending support.

RedHat RHCE and RHCSA Certification Book
Linux Foundation LFCS and LFCE Certification Preparation Guide

You may also like...

63 Responses

  1. why I should I tell you says:

    Huh, really Linux is an operating system?

    I thought It was a Kernel..

    OH I guess I need to study more

  2. Johnoo says:

    Hi,

    you have mentioned that “All windows program can be installed or uninstalled without the consent of root (Administrator).” Would you agree with it looking on Windows 7 and future versions? Could you elaborate on it? or at least point me in some direction because I would like that to be proven.

  3. shreya says:

    thanks!! this helps me ..

    • Ravi Saive says:

      @Shreya,

      I am glad that this article helped you, but may I know in what terms in has helped you, could you mention the things here so that we will also know..

  4. After fighting virus in Windows for years, I have turned 100% Linux. I have been duel boot several years . I just last week deleted my windows partition and now have duel boot Mint and Ubuntu

  5. indie says:

    which are methods used by malware to infect a Linux computer, and what can you do to counteract.

  6. Cybrat says:

    Well u have said it all.u ve a major in computer science and not computer penetration.nothing made by man that cannot be penetrated.
    Try studying operating system development and u will have to re-write this article.hehe

    • Anon says:

      Except he clearly wrote: “To be true, No! No OS on this earth can be ever be 100% immune to Viruses and Malware.”

      Try learning how to read and write.

      • Anon says:

        Also, he wrote he loves to hack (ethically).
        And please tell me which school I can attend where I major in computer penetration. Sounds painful.

        • Avishek Kumar says:

          @ Anon Do you want me to find a school to have a major in Computer Penetration, well yes it sounds painful. It would have been better if you could have understand the meaning and not just stepped in to comment.

      • Avishek Kumar says:

        It should be
        “To be true, No! No OS on this earth can ever be 100% immune to Viruses and Malware.”

        So what i figured is an additional ‘be’ (a mistake on my part) can boil you down. Good to know.
        Thanks

    • Avishek Kumar says:

      @ Cybrat, when i said * can not be penetrated?
      I have a major in CS and not Penetration so?

      where you want to take this discussion?

  7. ClamAV is one worthless of an antivirus, it never found much anything, on Linux and Window$. Pretty much any other non-sinister antivirus is better.

    • Avishek Kumar says:

      ClamAV is excellent at detecting email worms, phishing emails, average at detecting COM, EXE, macro viruses, fairly poor at detecting polymorphic viruses, unable to test boot sector viruses, unable to clean file, slow and have moderate meory usages, still it is a very young project and will take time to reach a level of maturity.

    • Avishek Kumar says:

      Memory**

Got something to say? Join the discussion.

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.