


Malware is known as malware, it can be any script, application or anything harmful to our system and data.
Linux Malware detect (LMD) is a malware scanner for Linux, released under the GNU GPLV2 license and designed to address threats faced in hosted environments . It uses threat data from network edge intrusion detection systems to extract malware actively used in attacks and generate signatures for detection.
Threats in shared hosting environments are unique from standard AV product detection suites in that they focus on detecting operating system-level Trojans, rootkits, and traditional virus-infected files, but ignore ongoing threats at the user account level. Increased variety of malware as an attack platform.
Step 1: Download and install LMD
First log in to the server using an ssh client (e.g. putty), then use the following command to download the latest lmd source code.
#cd / opt #wget http://www.rfxn.com/downloads/maldetect-current.tar.gz
Now extract the downloaded archive in the current directory
Now extract the downloaded archive file in the current directory
#tar xfz maldetect-current.tar.gz
After decompressing the archive file, execute the install provided in the source .sh script that will install LMD in your system.
#cd maldetect-1.4.2 #sh install.sh
Step 2: Configure LMD
LMD creates a configuration file /usr/local/maldetect/conf.maldet, where we can define the work and requirements of LMD Action taken.
#vim /usr/local/maldetect/conf.maldet
# [ EMAIL ALERTS ] ## # The default email alert toggle # [0 = disabled, 1 = enabled] email_alert=1 # The subject line for email alerts email_subj="MLD Scan Report from $(hostname)" # The destination addresses for email alerts # [ values are comma (,) spaced ] email_addr="webmaster@mydomain.com" # Ignore e-mail alerts for reports in which all hits have been cleaned. # This is ideal on very busy servers where cleaned hits can drown out # other more actionable reports. email_ignore_clean=0 ## # [ QUARANTINE OPTIONS ] ## # The default quarantine action for malware hits # [0 = alert only, 1 = move to quarantine & alert] quar_hits=1 # Try to clean string based malware injections # [NOTE: quar_hits=1 required] # [0 = disabled, 1 = clean] quar_clean=1 # The default suspend action for users wih hits # Cpanel suspend or set shell /bin/false on non-Cpanel # [NOTE: quar_hits=1 required] # [0 = disabled, 1 = suspend account] quar_susp=0 # minimum userid that can be suspended quar_susp_minuid=500
Step 3: Start scanning manually
At this stage, LMD has been successfully installed and configured on the system. Let us run the first scan manually by executing the following command.
#maldet --scan-all / var / www / html
The above command will scan all files and directories under /var/www/html. Depending on the number of files, it may take a long time to complete. After completing the above command, it will display a command to view the report as shown below
#maldet --report 060214-1946.24560
malware detect scan report for svr1.tecadmin.net: SCAN ID: 060214-1946.24560 TIME: May 28 19:46:12 +0530 PATH: /var/www/html/ TOTAL FILES: 4441 TOTAL HITS: 0 TOTAL CLEANED: 0 =============================================== Linux Malware Detect v1.4.2 < proj@rfxn.com >
In this example, TOTAL HITS is 0, so LMD will not detect any malware on the system. But if it detects any malware on the system, the malware can be quarantined using one of the following commands
# maldet --quarantine SCANID OR # maldet --clean SCANID
The SCANID can be found in the report generated above.
Step 4: Set up periodic scans
During the installation of LMD, it has created crontab files that are executed daily.
#vi /etc/cron.daily/maldet
However, if your system has a large number of files and directories, you can change the scan to weekly instead of daily.
This article has ended here. For more other exciting content, you can pay attention to the Linux Video Tutorial column on the PHP Chinese website!
The above is the detailed content of How to install a Linux malware detection program. For more information, please follow other related articles on the PHP Chinese website!

linux设备节点是应用程序和设备驱动程序沟通的一个桥梁;设备节点被创建在“/dev”,是连接内核与用户层的枢纽,相当于硬盘的inode一样的东西,记录了硬件设备的位置和信息。设备节点使用户可以与内核进行硬件的沟通,读写设备以及其他的操作。

区别:1、open是UNIX系统调用函数,而fopen是ANSIC标准中的C语言库函数;2、open的移植性没fopen好;3、fopen只能操纵普通正规文件,而open可以操作普通文件、网络套接字等;4、open无缓冲,fopen有缓冲。

端口映射又称端口转发,是指将外部主机的IP地址的端口映射到Intranet中的一台计算机,当用户访问外网IP的这个端口时,服务器自动将请求映射到对应局域网内部的机器上;可以通过使用动态或固定的公共网络IP路由ADSL宽带路由器来实现。

在linux中,eof是自定义终止符,是“END Of File”的缩写;因为是自定义的终止符,所以eof就不是固定的,可以随意的设置别名,linux中按“ctrl+d”就代表eof,eof一般会配合cat命令用于多行文本输出,指文件末尾。

在linux中,可以利用“rpm -qa pcre”命令判断pcre是否安装;rpm命令专门用于管理各项套件,使用该命令后,若结果中出现pcre的版本信息,则表示pcre已经安装,若没有出现版本信息,则表示没有安装pcre。

在linux中,交叉编译是指在一个平台上生成另一个平台上的可执行代码,即编译源代码的平台和执行源代码编译后程序的平台是两个不同的平台。使用交叉编译的原因:1、目标系统没有能力在其上进行本地编译;2、有能力进行源代码编译的平台与目标平台不同。

linux查询mac地址的方法:1、打开系统,在桌面中点击鼠标右键,选择“打开终端”;2、在终端中,执行“ifconfig”命令,查看输出结果,在输出信息第四行中紧跟“ether”单词后的字符串就是mac地址。

在linux中,rpc是远程过程调用的意思,是Reomote Procedure Call的缩写,特指一种隐藏了过程调用时实际通信细节的IPC方法;linux中通过RPC可以充分利用非共享内存的多处理器环境,提高系统资源的利用率。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Atom editor mac version download
The most popular open source editor

Dreamweaver Mac version
Visual web development tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 English version
Recommended: Win version, supports code prompts!
