Is there any guarantee that software from Launchpad PPAs is free from viruses and backdoor threats?


Every package's install script has root access to your system, so the mere act of adding a PPA or installing a package from one is an implicit statement of trust on your part of the PPA owner.

So, what happens if your trust is misplaced and a PPA owner wants to be naughty?

In order to upload to a PPA, a package must be signed by a GPG key unique to the launchpad user (indeed, the same key they signed the code of conduct with). So in the case of a known malicious PPA we would simply ban the account and shut down the PPA (affected systems would still be compromised, but there's no good way fix them at that point anyway).

To some extent Launchpad's social features can be used as a bit of a preventative measure of bad users -- someone who has a history of contributing to Ubuntu and some established Launchpad karma, for instance, is less likely to be setting up a trap PPA.

Or what if someone gains control of a PPA that isn't theirs?

Well, this is a bit...

0 0

As Linux continues to grow and develop, and the more we use Linux, the greater the threat from viruses.

We also know that a virus/threat in Linux (if any) would have difficulty running or spreading when it is running as a normal user, but it is a different story if the virus/threat is running as the root user.

An example of this danger would be if a virus is tucked inside a PPA (intentionally or unintentionally) or if an application has an intentionally planted backdoor (e.g., pidgin could secretly send passwords to a particular address).

If we add software from a Launchpad PPA, is there any guarantee that software is from free viruses/backdoor threats?

Every package's install script has root access to your system, so the mere act of adding a PPA or installing a package from one is an implicit statement of trust on your part of the PPA owner.

So, what happens if your trust is misplaced and a PPA owner wants to be naughty?

In order to upload...

0 0

You have three different options:

Wait for the newest versions to be added to the distribution packages. Note that you might want to learn a new language or build a ship with your bare hands while you wait.

If waiting several years is not good for you then you have the following two options:

Use a PPA containing the latest version: Pros: Easy to do. Totally automated. Let you install Vim as any other software. Cons: You basically grant root privileges to a complete stranger. This method only works on Ubuntu and the derived distributions using PPA system. Build Vim from sources: Pros: You get a fine tuning of the options you enable (gui, Python/Lua support, etc.). You get the bleeding edge version and don't need any third party maintainer to get it. It's always useful to learn how to compile a software from sources. This is a distribution agnostic method. Cons: Not as automated as the PPA option. Can be frightening for a new user.

In two latter cases, here is a...

0 0



Last Updated June 09, 2017 13:02 PM

I need an alternative software of Remastersys since it's not working in my system (Ubuntu 12.04.)

I want software just like remastersys. I don't want to install any new packages, I just want a piece of software that makes an ISO of my current system without any added packages.

Answers 5

Ubuntu Builder is a simple tool to build your own distribution. It allows to download, extract, customize in many ways and rebuild your ubuntu images. You can customize i386 and amd64 images

you can install ubuntu-builder via it site or via ppa

Run these commands in gnome-terminal, to install via ppa

sudo add-apt-repository ppa:f-muriana/ubuntu-builder sudo apt-get update && sudo apt-get install ubuntu-builder

Further reading:

September 18, 2012 11:08 AM

Relinux is the best software to use instead of Remastersys.
Here is a great...

0 0

Myth Busting: Is Linux Immune to Viruses?

In a word, "NO."

Latest Info : CSTechFans - Exclusive News & Leaks about Technology

Any computer that is attached to a network is not immune to viruses. But, as with everything else, it's relative. If you compare the vulnerability of Linux to Windows, you can understand why so many say Linux is immune. But before we get into any myth busting, let's examine just what a computer virus is.

According to Wikipedia, a virus is a computer program that can copy itself and infect a computer. That's a pretty broad description. Most people would consider a more specific definition. That same Wiki page continues on to say The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware and spyware programs that do not have the reproductive ability.Now we're talking. So with the two definitions combined, you could say a computer virus is any type of malicious code or software that can...

0 0

DON’T PANIC! But be aware that the Internet is riddled with potential threats to the security and well-being of your Mac or iOS device. No computer system is completely immune from possible attack, but Apple’s OS X (being Unix-based) is less vulnerable than most, particularly the latest versions - Lion, Mountain Lion and Mavericks. The following seeks to offer some guidance on the main security threats and how to avoid them. If you have further questions please post in the forum appropriate to your particular hardware or operating system.

There are many forms of ‘Malware’ that can affect a computer system, of which ‘a virus’ is but one type, ‘trojans’ another. Using the strict definition of a computer virus, no viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions. The same is not true of other forms of malware, such as Trojans. (The expression ‘malware’ is a general term used by computer professionals to mean...

0 0

You may start getting “Failed to fetch” error messages when updating your software sources (e.g. through “apt-get update” or “Reload package information” in Synaptic), which may be due to a bug we’ve just cleaned up in Launchpad’s PPAs.

The error looks like this:

W: Failed to fetch Unable to find expected entry restricted/binary-i386/Packages in Meta-index file (malformed Release file?) E: Some index files failed to download, they have been ignored, or old ones used instead.

Fixing the cause of the error

Here’s how to fix it. In your terminal, type:

sudo gedit /etc/apt/sources.list

In the editor, look for PPA sources — these are URLs that feature the domain. In this example, someone has set up the ~ubuntu-x-swat/x-updates PPA incorrectly:

deb maverick main deb...
0 0

Here are 26 best free software to remove viruses from your computer. These let you remove all types of viruses from your PC easily. All these virus removal software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can remove all types of viruses from your computer easily, identify and eliminates viruses from your computer and make your PC run virus free, also blocks and removes spyware, worms, trojans, dialers, rootkits, provides rock solid protection to your PC against all kinds of viruses etc. So, go through this list of free virus removal software and see which ones you like the most.

You can also check out best free antivirus software and best free spyware removal software.

Avast Free Antivirus

Avast Free Antivirus is a free and handy virus remover software for your computer. With the help of this freeware you can remove all types of viruses from your computer easily. It is a very effective virus...

0 0

The idea that you don’t have to worry about viruses or malware if you have a Mac is still surprisingly popular. Many people believe that Macs can’t get viruses, and Apple does little to dispel that notion, but is it really true? Can Macs get viruses?

“The answer is definitely, yes,” says Bogdan Botezatu, Bitdefender’s Senior E-Threat Analyst, “There have been incidents, and there will be more.”

A few years ago, Flashback malware exploited a security flaw in Java. It managed to infect 600,000 Macs, which was roughly 1 percent of the user base. There is a page about it on Apple’s website.

Updated by Jeffrey Van Camp on 5-04-2015: For clarification, we use the words ‘malware’ and ‘virus’ mostly interchangeably in this article because, to most people, these are one and the same. However, technically speaking, malware is the blanket term for all malicious software that could attack or infect a computer. Wikipedia’s page on malware is a good resource if you want to...

0 0

We noticed that cookies are turned off in your browser settings. Cookies are small files that we place on your computer to personalize your experience whenever you visit our website. You must turn on your browser cookies to access certain McAfee services and products online.

Click your browser and follow the instructions to turn on your browser cookies.

Supported Browsers

Internet Explorer 7.0 or later

In Internet Explorer, click Tools, and then click Internet Options. Click the Security tab. If the Internet zone security level is set to High or Custom, click Default level. In the Privacy tab, click Advanced Click Override automatic cookie handling. Under First-party Cookies and Third-party Cookies, select Accept. Click Always allow session cookies, and then click OK. Click OK to exit.

Firefox 3.0 or later

In Firefox, click Tools, and then click Options. Click Privacy. ...
0 0

You've probably been sick before. It's not fun. In many cases, like the flu, you're sick because of a virus.. …tiny germs ready to multiply and spread from person-to-person, via handshakes or sneezes. Computer viruses are no different. Instead of germs, they are computer programs.

These programs are usually designed by criminals to multiply and spread from computer-to-computer like a disease. If one makes it to your computer, it can erase your files, send emails without your permission or even communicate sensitive info to criminals.

Let's take a closer look, because what we call computer viruses can actually be Viruses, worms or trojans - we’ll start with viruses.

These bugs hitch a ride when something, like a file, is shared between computers. This often happens via attachments sent in email or shared USB drives. Once someone clicks to open the file, the damage is done. The virus is now on that computer, where it starts to multiply and look for chances to...

0 0

Most of the threats that ESET security products are designed to defend against can be classified as viruses, malware, or remote attacks. Aside from the programs you install on your computer, your computer can be attacked by malicious programs (malware), or even subject to attack over a network by someone operating a computer from a remote location. Malicious software and remote attacks can cause emotional loss, cost you time, and lead to financial loss as well. Below you'll find descriptions of some of the most common types of computer threats, click the links below to jump to the corresponding section.

Viruses | Malware | Remote attacks


A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet). There are several types of viruses:

File viruses: File-infecting...

0 0

why? **assuming you still are able to boot and start it ,just repeatedly keep pressing F8 down and release 1 time per second or so - over and over at start up until it either beeps or allows you to choose start in SAFE MODE WITH Network... use UP & Down Arrows on your keyboard to highlight it and then just Press ENTER on your keyboard.
..and in Safe Mode With Networking , It is known that this is the best likely way to avoid virus type problems that Infections tend to overtake control of booting your computer. So if you Don't start in safe Mode with Network you may not be able to just go to www(dot)filehippo(dot)com
then find Malewarebytes Anti-Malware and download it absolutely FREE with out joining to get it or any of that bullsh**t, then after you install it just be sure to Update it with the UPDATE tab within itself.,then shut down your computer . Do It Exactly in this order too! so 1 time is all it will take!
...Now...when you power it...

0 0

Most PCs and laptop are now connected to the world wide web i.e Internet, making easier the spread of malicious software (known as malware), which includes Trojans (also known as trojan horses), viruses, worms, spyware, adware, rootkits and other malicious or unwanted programs.

Trojan horses are programs that enter into a system or network under the guise of another program. A Trojan horse may be included as an attachment or as part of an installation program. The Trojan horse could create a backdoor or replace a valid program during installation. It would then accomplish its mission under the guise of another program. Trojan horses can be used to compromise the security of your system, and they can exist on a system for years before they’re detected. Check out my recent post top 10 security tips for your system.

Unlike Trojans, Virus and Worms do not replicate themselves, but they can be just as destructive. On the surface, trojans appear benign and harmless,...

0 0

A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes. However, attackers often use backdoors that they detect or install themselves as part of an exploit. In some cases, a worm or virus is designed to take advantage of a backdoor created by an earlier attack.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Whether installed as an administrative tool, a means of attack or as a mechanism allowing the government to access encrypted data, a backdoor is a security risk because...

0 0

The last two decades have seen a steady migration from analog to digital means for communication and the storage of information.

Following closely behind (sometimes not closely enough, as some have found to their peril) was the drive to keep that information secure. The threat of hacking and the desire to assure users of their privacy has led to the encryption of data while it is both at rest and in transmission becoming standard practice. And, just as a bank can’t open a secure deposit box to which only you have the key, proper encryption means that even the companies providing and hosting services can’t access that data unless you authorize it.

But even the strongest safe or door will succumb to drill or explosives. Advances in cryptography methods and increases in computing power have created encryption that cannot be reversed in a realistic timeframe. For the first time in history, people have a way of securing their communications quickly, automatically, and at...

0 0


When you start to think about all the things that could go wrong when browsing the Internet, the web starts to look like a pretty scary place. Luckily, Internet users as a whole are getting far more savvy, and better at recognizing risky online behavior.

While pages with a dozen download buttons – or auto-checked boxes that tricked us into downloading things we didn’t want – are no longer quite as effective as they once were, that doesn’t mean there aren’t hackers out there right now trying to come up with new methods of deception The Latest Internet Security Threats That You Should Be Aware Of . In order to protect ourselves from these threats it’s important to understand just what they are, and how they differ.

Let’s dive in.

Understanding Online Security Threats and How They Differ


Malware is short for malicious software. This means that while most of us refer...

0 0

To know what can threat your data you should know what malicious programs (Malware) exist and how they function. Malware can be subdivided in the following types:

Viruses: programs that infect other programs by adding to them a virus code to get access at an infected file start-up. This simple definition discovers the main action of a virus – infection. The spreading speed of viruses is lower than that of worms.

Worms: this type of Malware uses network resources for spreading. This class was called worms because of its peculiar feature to “creep” from computer to computer using network, mail and other informational channels. Thanks to it spreading speed of worms is very high.

Worms intrude your computer, calculate network addresses of other computers and send to these addresses its copies. Besides network addresses, the data of the mail clients' address books is used as well. Representatives of this Malware type sometimes create working files on system discs,...

0 0

What every answer has missed so far is that there are more attack vectors than just network connections and file sharing, but with all the other parts of a virtual machine - especially in regards to virtualizing hardware. A good example of this is shown below (ref. 2) where a guest OS can break out of the VMware container using the emulated virtual COM port.

Another attack vector, commonly included and sometimes enabled by default, on almost all modern processors, is x86 virtualization. While you can argue that having networking enabled on a VM is the biggest security risk (and indeed, it is a risk that must be considered), this only stops viruses from being transmitted how they are transmitted on every other computer - over a network. This is what your anti-virus and firewall software is used for. That being said...

There have been outbreaks of viruses which can actually "break out" of virtual machines, which has been documented in the past (see references 1 and 2...

0 0

The terms viruses and vaccines have entered the jargon of the com puter industry to describe some of the bad things that can happen to computer systems and programs. Unpleasant occurrences like the March 6, 1991, attack of the Michelangelo virus will be with us for years to come. In fact, from now on you need to check your IBM or IBM- compatible personal computer for the presence of Michelangelo be fore March 6 every year — or risk losing all the data on your hard disk when you turn on your machine that day. And Macintosh users need to do the same for another intruder, the Jerusalem virus, before each Friday the 13th, or risk a similar fate for their data.

A virus, as its name suggests, is contagious. It is a set of illicit in structions that infects other programs and may spread rapidly. The Mich elangelo virus went worldwide within a year. Some types of viruses in clude the worm, a program that spreads by replicating itself; the bomb, a program intended to sabotage a...

0 0

Manual Library. Samsung Q3. Miami Service Manual. Service Manual Polaris Sportsman 5.

Audi 8. 0 9. 0 Coupe User Manual. Color Television Receiver S6. AP Manual. Audi 1. Repair Manual. Audi 8.

Maker Cuisinart dual-sandwich nonstick Durabrand cm4113d coffee maker instruction manual Durabrand sandwich. Breakfast Master Skillet and Waffle Maker 26046 manual.

Free kitchen appliance user manuals, instructions, and product support information. Find owners guides and pdf support documentation for blenders, coffee makers. Durabrand Sandwich Maker Manual Cookie Sheet, Wire Rack, Crumb Tray and Rotisserie Set and a users manual @@@Karri Best priceDurabrand Sandwich Maker Durabrand Sandwich. Comments about Durabrand nonstick waffle maker: This Durabrand nonstick waffle iron has been so easy to use. It's non stick surface makes clean up an absolute breeze!

Vacuums - I havr a durabrand S649A Mr Breakfast answers the following question: How do I clean my waffle maker?...

0 0