• Thumbnail for Arch Linux
    Arch Linux (/ɑːrtʃ/) is an open source, rolling release Linux distribution. Arch Linux is kept up-to-date by regularly updating the individual pieces...
    58 KB (5,050 words) - 18:33, 23 July 2025
  • Thumbnail for OpenSUSE
    OpenSUSE (redirect from SUSE linux)
    openSUSE ( /ˌoʊpənˈsuːzə/) is a free and open-source Linux distribution developed by the openSUSE Project. It is offered in two main variations: Tumbleweed...
    84 KB (6,922 words) - 17:42, 17 July 2025
  • X-Agent (category Malware stubs)
    or XAgent is a spyware and malware program designed to collect and transmit hacked files from machines running Windows, Linux, iOS, or Android, to servers...
    4 KB (326 words) - 06:08, 19 July 2025
  • Thumbnail for Pale Moon
    Pale Moon (category Linux web browsers)
    There are official releases for Microsoft Windows, FreeBSD, macOS, and Linux. Pale Moon originated as a fork of Firefox, but has subsequently diverged...
    19 KB (1,519 words) - 12:41, 20 July 2025
  • Thumbnail for Package manager
    "documentation/sles11". en.opensuse.org. Archived from the original on 1 December 2022. Retrieved 16 August 2017. "XBPS Package Manager - Void Linux Handbook". docs...
    35 KB (2,920 words) - 06:41, 14 July 2025
  • Thumbnail for VeraCrypt
    VeraCrypt (category Linux security software)
    ShellExecute security issue. Linux and macOS users benefit from support for hard drives with sector sizes larger than 512. Linux also received support for...
    38 KB (3,218 words) - 13:02, 5 July 2025
  • Thumbnail for Free and open-source software
    using FOSS include decreased software costs, increased security against malware, stability, privacy, opportunities for educational usage, and giving users...
    89 KB (7,586 words) - 16:01, 27 July 2025
  • Comparison of antivirus software (category Linux security software)
    term "Email security" refers to the protection of email from viruses and malware, while "Antispam" refers to the protection from spam, scam and phishing...
    48 KB (397 words) - 08:14, 15 June 2025
  • Thumbnail for Intel Management Engine
    ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data." — Tatu Ylönen, ssh...
    46 KB (4,428 words) - 21:24, 30 April 2025
  • includes notable examples of digital forensic tools. Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration...
    11 KB (662 words) - 20:02, 15 May 2025
  • PMC 9367180. Alsagoff, Syed Nasir (2010). Malware self protection mechanism issues in conducting malware behaviour analysis in a virtual environment...
    11 KB (1,103 words) - 12:12, 24 May 2025
  • Thumbnail for Jonathan Brossard
    In 2012, Jonathan presented a Proof of Concept BIOS and PCI firmware malware. named Rakshasa, the first known example of a permanent Hardware backdoor...
    15 KB (1,070 words) - 09:48, 25 March 2025
  • Software Test Series, consisting of a Real-World Test, a False Alarm Test, a Malware Protection Test and a Performance Test as well as a review. Anti-Phishing...
    6 KB (555 words) - 02:20, 22 July 2025
  • Thumbnail for Tor (network)
    circumvention, as well as distribution of child abuse content, drug sales, or malware distribution. Tor has been described by The Economist, in relation to Bitcoin...
    168 KB (14,002 words) - 08:04, 26 July 2025
  • Thumbnail for FrostWire
    FrostWire (category BitTorrent clients for Linux)
    it. Around 2019, Frostwire has been noted to install other adware and malware, such as the browser hijacker WebDiscover. Software based in the original...
    11 KB (896 words) - 07:13, 23 April 2025
  • NScripter (redirect from ONScripter-EN)
    that PNaCl technology offers, the user can play without worrying about malware potentially present in a game. Also known by its production title NONS...
    34 KB (3,575 words) - 11:43, 23 June 2025
  • Thumbnail for Mozilla VPN
    recommended server locations, the ability to block ads, block ad trackers and malware, the ability to exclude certain applications from protection, the ability...
    11 KB (912 words) - 01:26, 4 June 2025
  • WordPerfect (category Linux word processors)
    commercial Linux market, Corel also developed their own distribution of Linux. This included WordPerfect 8.1 for Linux. Although the Linux distribution...
    94 KB (10,070 words) - 00:26, 7 July 2025
  • embedded in mIRC and Adiirc, IRC clients for Windows but work with WiNE for Linux. Light channel and personal protection against many types of attacks (flooding...
    14 KB (1,476 words) - 00:50, 29 December 2024
  • TrueCrypt (category Linux security software)
    DragonFly BSD and Linux. The Dm-crypt module included in default Linux kernel supports a TrueCrypt target called "tcw" since Linux version 3.13. Individual...
    66 KB (6,485 words) - 13:33, 15 May 2025
  • Thumbnail for Internet
    Internet (section Malware)
    malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks...
    160 KB (16,961 words) - 20:51, 24 July 2025
  • Keystroke logging (category Malware)
    categories: Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which thus remains...
    46 KB (5,285 words) - 22:50, 26 July 2025
  • Thumbnail for CrypTool
    with Java/Eclipse/RCP/SWT) (abbreviated JCT) runs on Windows, macOS, and Linux, and offers both a document-centric and a function-centric perspective....
    8 KB (616 words) - 21:59, 29 June 2025
  • Thumbnail for Firefox
    Firefox (category Linux web browsers)
    Firefox is available for Windows 10 or later versions of Windows, macOS, and Linux. Its unofficial ports are available for various Unix and Unix-like operating...
    194 KB (17,130 words) - 20:49, 22 July 2025
  • Thumbnail for PDF
    allows PDF files that have been infected with viruses, Trojans, and other malware to inflict damage. Such PDF files can have hidden JavaScript code that...
    86 KB (9,514 words) - 18:23, 16 July 2025
  • the expansion of internet access throughout the world.: 484  Significant malware programs in 2003 included the SQL Slammer,: 484  the Blaster worm, the...
    139 KB (14,081 words) - 02:41, 28 July 2025
  • Thumbnail for SQLite
    SQLite (category Relational database management software for Linux)
    management within the Solaris and OpenSolaris operating systems Flame (malware) BMW IDrive Sat Nav system TomTom GPS systems, for the NDS map data Proxmox...
    37 KB (3,417 words) - 23:38, 7 July 2025
  • Thumbnail for LineageOS
    LineageOS (category Embedded Linux distributions)
    the current balance of LOSCoins. Many users mistook the prank for actual malware, and others reportedly found it to be in "poor taste". It was especially...
    53 KB (3,678 words) - 14:49, 27 July 2025
  • Thumbnail for Proxy server
    ICAP-based antivirus software to provide security against viruses and other malware by scanning incoming content in real-time before it enters the network...
    46 KB (5,553 words) - 10:45, 25 July 2025
  • ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data. — Tatu Ylönen, ssh...
    62 KB (6,360 words) - 09:05, 27 May 2025