Comment by j16sdiz
2 years ago
In my experience, an weekly-patched, default installation debian Linux cira 2015 get a malware in a week or two on the open internet.
2 years ago
In my experience, an weekly-patched, default installation debian Linux cira 2015 get a malware in a week or two on the open internet.
I am not sure exactly what you're saying: Are you saying that you had experience in 2015 that your "default installation" Debian Linux server got malware on the open internet despite it being fully updated weekly?
If I read that right, I would like two things clarified:
1: what "default installation" means. Do you have any open network ports?
2: What does "get a malware" mean? Do you mean it was possible to get malware because a user downloaded som random binary off of the internet? Or do you mean that entirely passively, some malware remotely exploited some network service?
I would like to contribute my experience: I have been responsive for running many Debian servers on the internet for that last 25 years. During those years I have not once encountered one of my systems being compromised. Of course, you might say that I have just been unknowingly compromised. While this is indeed possible, it is possible for all systems to be compromised without owners knowing it.
Which tool do you use to detect malwares on Debian?