seem to have a malware on my sisters kubuntu

Discussion in 'all things UNIX' started by boredog, Jul 18, 2016.

  1. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,064
    Location:
    Canada
    The damage can be wholly prevented if it's a malicious embedded script/frame, in which case script control will stop it dead in its tracks. That's why I'd love to know the link so I can test it.
     
  2. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    I don't know what she clicked on and so I won't be able to post a link

    sorry.
     
  3. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,064
    Location:
    Canada
    No worries. It would just be interesting to hear how things go if she utilizes some form of "lightweight" script control, as I suggest in post #13

    Also, if she uses Chrome or related browser, could you get her to type and enter in the address bar:
    Code:
    chrome://sandbox
    then see what she gets? She should see something similar to:

    Sandbox Status
    SUID Sandbox No
    Namespace Sandbox Yes
    PID namespaces Yes
    Network namespaces Yes
    Seccomp-BPF sandbox Yes
    Seccomp-BPF sandbox supports TSYNC No
    Yama LSM enforcing Yes
    You are adequately sandboxed.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.