Linux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses.
There has not yet been a single widespread Linux virus or malware infection of the type that is common on Microsoft Windows; this is attributable generally to the malware's lack of root access and fast updates to most Linux vulnerabilities.
Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented. To gain control over a Linux system or to cause any serious consequences to the system itself, the malware would have to gain root access to the system.
In the past, it has been suggested that Linux had so little malware because its low market share made it a less profitable target. Rick Moen, an experienced Linux system administrator, counters that:
Tru64 UNIX is a discontinued 64-bit UNIX operating system for the Alpha instruction set architecture (ISA), currently owned by Hewlett-Packard (HP). Previously, Tru64 UNIX was a product of Compaq, and before that, Digital Equipment Corporation (DEC), where it was known as Digital UNIX (formerly DEC OSF/1 AXP).
As its original name suggests, Tru64 UNIX is based on the OSF/1 operating system. DEC's previous UNIX product was known as Ultrix and was based on BSD.
It is unusual among commercial UNIX implementations, as it is built on top of the Mach kernel developed at Carnegie Mellon University. (Other UNIX implementations built on top of the Mach kernel are NeXTSTEP, MkLinux, Mac OS X and Apple iOS.)
Tru64 UNIX requires the SRM boot firmware found on Alpha-based computer systems.
In 1988, during the so-called "Unix wars", DEC joined with IBM, Hewlett-Packard, and others to form the Open Software Foundation (OSF) to develop a version of Unix. Dubbed OSF/1, the aim was to compete with System V Release 4 from AT&T Corporation and Sun Microsystems, and it has been argued that a primary goal was for the operating system to be free of AT&T intellectual property. The fact that OSF/1 was one of the first operating systems to use the Mach kernel is cited as support of this assertion. Digital also strongly promoted OSF/1 for real-time applications , and with traditional UNIX implementations at the time providing poor real-time support at best, the real-time and multi-threading support was heavily dependent on the Mach kernel. It also incorporated a large part of the BSD kernel (based on the 4.3-Reno release) to provide UNIX API. Back at the time of its proliferation, OSF/1 was the third major flavor of UNIX together with System V and BSD.
OSF may stand for:
When butterflies leave their silk palaces
And the scent of the garden blows towards Heaven's way
Like the toils of man, those who work for tomorrow
Linux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses.
There has not yet been a single widespread Linux virus or malware infection of the type that is common on Microsoft Windows; this is attributable generally to the malware's lack of root access and fast updates to most Linux vulnerabilities.
Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented. To gain control over a Linux system or to cause any serious consequences to the system itself, the malware would have to gain root access to the system.
In the past, it has been suggested that Linux had so little malware because its low market share made it a less profitable target. Rick Moen, an experienced Linux system administrator, counters that: