0:03
hey everybody Malcolm here Welcome to
0:05
our guide on keeping your Linux system
0:07
secure from viruses and malware think of
0:10
it like this right you wouldn't leave
0:12
your front door unlocked just because
0:13
you live in a safe neighborhood would
0:15
you it's always better to be safe than
0:17
sorry so in this video we're going to
0:19
walk you through some essential tools
0:21
and techniques to check for and deal
0:24
with viruses and other malicious
0:26
software on your Linux system
0:31
first up we've got clamav clamav is the
0:35
trusty guard dog of Linux antivirus
0:37
software installing clamav is easy use
0:40
pseudo app install clamav clamav demon
0:42
for dbn based systems pseudo yum install
0:45
clamav for Centos and red hat or pseudo
0:48
Pacman s clamav for Arch update with
0:51
pseudo fresh clam for a full scan use
0:54
pseudo clam scanr /home clamav alerts
0:57
you to threats and lets you quarantine
0:59
or delete them it's like having a
1:01
digital Exterminator on call
1:06
24/7 next up let's talk root kits these
1:09
sneaky malware buried deep in your
1:11
system that's where a CHR kit comes in
1:13
this tool sniffs out hidden nasties
1:16
install it with pseudo apt installed CHR
1:18
kit on Debian or pseudo yum installed
1:20
CHR kit on Centos run pseudo CHR kit to
1:23
scan your system it analyzes system
1:26
files and processes and reports any
1:28
suspicious activity think of it as a
1:34
detective so we've got clamy for General
1:36
malware and shrot kit for root kits but
1:39
why stop there let's add another layer
1:41
of protection with run run doesn't just
1:44
check for root kits it also hunts down
1:46
back doors and local exploits installing
1:49
it is as easy as the other tools pseudo
1:51
apt install R Hunter on Dean based
1:54
systems and pseudo yum installer cter on
1:57
Centos and red hat once installed update
2:00
its database by running pseudo Run
2:03
update for the main event type pseudo
2:05
run check and Let it Loose runter will
2:09
meticulously scan your system comparing
2:11
file hashes checking for suspicious
2:13
processes and looking for any signs of
2:18
compromise all right so we've covered
2:20
antivirus and root kit detection but
2:22
what about a more holistic approach to
2:24
security that's where Linus comes in
2:27
Linus performs a deep dive into your
2:28
system looking for potential
2:30
vulnerabilities and security weaknesses
2:32
installing Linus is straightforward
2:34
pseudo app install Linus on Debian based
2:37
systems to unleash its full potential
2:40
type in pseudo Linus audit system this
2:42
will initiate a comprehensive scan
2:44
checking everything from your kernal
2:46
configuration to your user accounts file
2:48
permissions and even installed
2:52
packages sometimes you got to roll up
2:54
your sleeves and do things the manual
2:56
way keep an eye on your running
2:58
processes m Hardware often disguises
3:01
itself as legitimate processes tools
3:03
like top or 8 top show realtime
3:06
processes sort by CPU memory or runtime
3:09
to spot issues the PS command is
3:11
powerful PS ARX lists all running
3:14
processes look for weird names or
3:19
usage malware loves to mess with your
3:22
system files replacing them with
3:23
malicious versions or modifying them to
3:25
do their bidding one way to verify the
3:28
Integrity of your important system files
3:30
is by using a tool like Aid Advanced
3:34
environment Aid lets you create a
3:36
baseline snapshot of your system files
3:39
and then compare them against future
3:40
scans to detect any unauthorized changes
3:43
installing Aid is simple pseudo apt
3:46
install Aid after installation
3:49
initialize Aid to create that initial
3:51
Baseline snapshot then run regular
3:53
Integrity checks with pseudo Aid to
3:55
check if Aid detects any discrepancies
3:58
it'll alert you allowing you to
4:03
further so there you have it folks we've
4:06
gone through some powerful tools and
4:08
techniques to help you keep your Linux
4:10
system safe from those nasty digital
4:11
Critters by using these tools and
4:14
methods you can help ensure your Linux
4:16
system remains secure and free from
4:18
malicious software stay vigilant and
4:20
keep your system safe until next time