TheSteampunkHedgehog's Security Config

TheSteampunkHedgehog

Level 1
Thread author
Aug 29, 2015
4
My general security idea is to "not do anything stupid."
I run all my samples in a VirtualBox machine that is completely isolated (network disabled, shared folders read only, no USB etc)

I've never been hit by any serious malware (back when I was using WIndows), I only got some adware like Conduit.
 
  • Like
Reactions: MalwareT
D

Deleted member 178

Linux is not without malwares (even if they are very few), you have some Rootkit scanners (you can check your repositories with "rootkit as keywords)

except that your config is:

Approved by Staff

2s9jymOt.jpg
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
That configuration is already approve and infection rate are very minimal, no more any additional tools to be include unless you explore through its repositories. ;)
 
M

Mr. Tech

Exchange Adblock Plus with uBlock Origin, also consider adding ClamAV or Comodo.
 

TheSteampunkHedgehog

Level 1
Thread author
Aug 29, 2015
4
Sorry for the timely response everyone, I've been quite busy preparing my writeup for a malware sample! (coming soon)
Umbra: I absolutely completely forgot about stuff like chkrootkit and rkhunter! Which do you recommend?
Mr. Tech: I've used uBlock Origin before and have no idea why I went back to ABP, I won't switch back for now but I may if the memory usage gets too high ;)
Exterminator20: No problem. Happy to share!
Secondmineboy: I've heard about their AV (I read their blogs a lot) but I'm not sure if it's commercial and I think I'll be fine with chkrootkit or rkhunter, but I will try it some day.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top