Arch Linux (/ɑːrtʃ/) is an open source, rolling release Linux distribution. Arch Linux is kept up-to-date by regularly updating the individual pieces...
58 KB (5,050 words) - 18:33, 23 July 2025
OpenSUSE (redirect from SUSE linux)
openSUSE ( /ˌoʊpənˈsuːzə/) is a free and open-source Linux distribution developed by the openSUSE Project. It is offered in two main variations: Tumbleweed...
84 KB (6,922 words) - 17:42, 17 July 2025
X-Agent (category Malware stubs)
or XAgent is a spyware and malware program designed to collect and transmit hacked files from machines running Windows, Linux, iOS, or Android, to servers...
4 KB (326 words) - 06:08, 19 July 2025
Pale Moon (category Linux web browsers)
There are official releases for Microsoft Windows, FreeBSD, macOS, and Linux. Pale Moon originated as a fork of Firefox, but has subsequently diverged...
19 KB (1,519 words) - 12:41, 20 July 2025
"documentation/sles11". en.opensuse.org. Archived from the original on 1 December 2022. Retrieved 16 August 2017. "XBPS Package Manager - Void Linux Handbook". docs...
35 KB (2,920 words) - 06:41, 14 July 2025
using FOSS include decreased software costs, increased security against malware, stability, privacy, opportunities for educational usage, and giving users...
89 KB (7,586 words) - 16:01, 27 July 2025
VeraCrypt (category Linux security software)
ShellExecute security issue. Linux and macOS users benefit from support for hard drives with sector sizes larger than 512. Linux also received support for...
38 KB (3,218 words) - 13:02, 5 July 2025
Comparison of antivirus software (category Linux security software)
term "Email security" refers to the protection of email from viruses and malware, while "Antispam" refers to the protection from spam, scam and phishing...
48 KB (397 words) - 08:14, 15 June 2025
ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data." — Tatu Ylönen, ssh...
46 KB (4,428 words) - 21:24, 30 April 2025
includes notable examples of digital forensic tools. Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration...
11 KB (662 words) - 20:02, 15 May 2025
Acronis True Image (redirect from Acronis True Image Echo Server for Linux)
PMC 9367180. Alsagoff, Syed Nasir (2010). Malware self protection mechanism issues in conducting malware behaviour analysis in a virtual environment...
11 KB (1,103 words) - 12:12, 24 May 2025
In 2012, Jonathan presented a Proof of Concept BIOS and PCI firmware malware. named Rakshasa, the first known example of a permanent Hardware backdoor...
15 KB (1,070 words) - 09:48, 25 March 2025
Software Test Series, consisting of a Real-World Test, a False Alarm Test, a Malware Protection Test and a Performance Test as well as a review. Anti-Phishing...
6 KB (555 words) - 02:20, 22 July 2025
NScripter (redirect from ONScripter-EN)
that PNaCl technology offers, the user can play without worrying about malware potentially present in a game. Also known by its production title NONS...
34 KB (3,575 words) - 11:43, 23 June 2025
FrostWire (category BitTorrent clients for Linux)
it. Around 2019, Frostwire has been noted to install other adware and malware, such as the browser hijacker WebDiscover. Software based in the original...
11 KB (896 words) - 07:13, 23 April 2025
circumvention, as well as distribution of child abuse content, drug sales, or malware distribution. Tor has been described by The Economist, in relation to Bitcoin...
168 KB (14,002 words) - 08:04, 26 July 2025
recommended server locations, the ability to block ads, block ad trackers and malware, the ability to exclude certain applications from protection, the ability...
11 KB (912 words) - 01:26, 4 June 2025
WordPerfect (category Linux word processors)
commercial Linux market, Corel also developed their own distribution of Linux. This included WordPerfect 8.1 for Linux. Although the Linux distribution...
94 KB (10,070 words) - 00:26, 7 July 2025
TrueCrypt (category Linux security software)
DragonFly BSD and Linux. The Dm-crypt module included in default Linux kernel supports a TrueCrypt target called "tcw" since Linux version 3.13. Individual...
66 KB (6,485 words) - 13:33, 15 May 2025
embedded in mIRC and Adiirc, IRC clients for Windows but work with WiNE for Linux. Light channel and personal protection against many types of attacks (flooding...
14 KB (1,476 words) - 00:50, 29 December 2024
Keystroke logging (category Malware)
categories: Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which thus remains...
46 KB (5,285 words) - 22:50, 26 July 2025
Firefox (category Linux web browsers)
potentially dangerous ActiveX component, and vulnerability to spyware and malware installation.[citation needed] Microsoft responded by releasing Windows...
194 KB (17,130 words) - 20:49, 22 July 2025
LineageOS (category Embedded Linux distributions)
the current balance of LOSCoins. Many users mistook the prank for actual malware, and others reportedly found it to be in "poor taste". It was especially...
53 KB (3,678 words) - 14:49, 27 July 2025
the expansion of internet access throughout the world.: 484 Significant malware programs in 2003 included the SQL Slammer,: 484 the Blaster worm, the...
139 KB (14,081 words) - 02:41, 28 July 2025
with Java/Eclipse/RCP/SWT) (abbreviated JCT) runs on Windows, macOS, and Linux, and offers both a document-centric and a function-centric perspective....
8 KB (616 words) - 21:59, 29 June 2025
PDF (section Malware vulnerability)
allows PDF files that have been infected with viruses, Trojans, and other malware to inflict damage. Such PDF files can have hidden JavaScript code that...
86 KB (9,514 words) - 18:23, 16 July 2025
SQLite (category Relational database management software for Linux)
management within the Solaris and OpenSolaris operating systems Flame (malware) BMW IDrive Sat Nav system TomTom GPS systems, for the NDS map data Proxmox...
37 KB (3,417 words) - 23:38, 7 July 2025
ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data. — Tatu Ylönen, ssh...
62 KB (6,360 words) - 09:05, 27 May 2025
Digital rights management (redirect from Digital Restrictions Malware)
CSS-encrypted DVD to play on a computer running Linux, at a time when no compliant DVD player for Linux had yet been created. The legality of DeCSS is...
118 KB (11,495 words) - 07:00, 13 June 2025