Ask HN: What is your routine to monitor for viruses and secure boot integrity?
2 by thrwawy74 | 0 comments on Hacker News.
I recently saw a script to confirm if several points of ones' secure boot process were secure, or had settings that were considered safe. I didn't get a screenshot of this tool or script, and I cannot find it on Github with my poor searching. I wanted to ask HN: 1) What is your routine to monitor for viruses/malware on your (desktop) Linux machines? 2) How do you stay aware of major CVEs and supply chain attacks? 3) I'm used to ClamAV, are there any polished GUIs for some of these antivirus scanners to make monitoring more informative/user friendly? 4) Know of any distro or package-manager specific tools for identifying malware? I recently got back into nodejs and I'm happy to see npm warning of insecurities. 5) Anyone know the Secure Boot "checker" I'm talking about above? 6) Anyone using several antivirus solutions together in a way that is efficient/smartly configured? (the thought of 2 daemons scanning all my files circularly doesn't seem fantastic) 7) Bonus points for mentioning Little Snitch-like daemons to block telemetry. I'm curious if anyone is using machine learning to identify patterns from software trying to phone-home vs normal operation. I understand the argument: If you can't trust what you're running locally, all is lost. Thank you
New ask Hacker News story: Ask HN: What is your routine to monitor for viruses and secure boot integrity?
Abubakar Mahmoud Sadiq
0
Comments
Tags
Hacker News
Post a Comment