libc.so.6: version `GLIBC_2.11' not found (required by sh) on Ubuntu 13.04 raring ringtail
lproven at gmail.com
Fri Jul 19 15:38:19 UTC 2013
On 19 July 2013 16:16, AV3 <arvimide at earthlink.net> wrote:
> Liam Proven is quite right to recommend you do your own research before
> asking for help. But as a professional language teacher I know that Usenet
> imposes on all users an obligation to completely master English at the
> native speaker level, and I think I detect a language comprehension problem
This is a very good point and I am sorry if I was too curt.
> So I offer the following reply to your request for information:
> 1. Scanning for malware is not a requirement but only a courtesy. It is
> unlikely that an user of any operating system other than Windows will be as
> diligent in keeping their anti-virus program completely up-to-date, so it is
> unlikely to be very thorough or helpful. But some of us try to be helpful,
> but I don't. It is up to Windows users to scan their own incoming messages.
True and I agree.
> 2. Unix-based operating systems require a password to access their root. For
> years Microsoft gained an enormous share of the operating system market by
> not requiring a password, i. e., by making installation of Windows easy. Its
> long-suffering purchasers accepted as a cost of doing business the
> eradication of malware and regular re-installation of their contaminated
> operating system.
> Since Unix-based systems don't require anti-virus protection, AV software is
> unnecessary and burdensome.
True, but there is more to it than that. However, any additional
clarification is not really relevant to this discussion.
> Of course, there is malware that could infect
> your personal user files, but not your root system.
As far as I know there are no infectious Linux viruses out there in
the wild. There are worms & rootkits, but they spread in a different
way -- and anyway, most virus detection programs would not notice
So I disagree with this statement.
Linux cannot execute Windows binaries. LibreOffice cannot execute MS
Office macros. So Linux cannot be infected by Windows viruses. It is
If someone adds the WINE Windows-compatibility layer, then the machine
can /catch/ a Windows virus, but not pass it on.
> Of course, you could be
> lured into betraying your password in installing software from a
> contaminated source, so caution in acquiring software is necessary.
That's a Trojan, something different from a virus. Again, virus
scanners are often powerless against these.
> I myself have never encountered such malware, nor has anyone I know
> personally. I do not remember reading about infestation in this forum. So it
> is not a big worry, but possible.
More or less, yes.
The most widely-used Linux antivirus tool is Clam AV. It is a scanner
- it does not defend your system against infection like a Windows A/V
program, but as discussed, this is not really necessary. Clam scans
your files for infections, that is all.
It does not run in the background. You run it, it scans, it finishes;
that's it. If you wish, though, you can schedule Clam with Cron, like
any other program, to do a regular scan in the background.
It is in the Ubuntu repositories. Google for info on how to install it.
Liam Proven • Profile: http://lproven.livejournal.com/profile
Email: lproven at cix.co.uk • GMail/G+/Twitter/Flickr/Facebook: lproven
MSN: lproven at hotmail.com • Skype/AIM/Yahoo/LinkedIn: liamproven
Tel: +44 20-8685-0498 • Cell: +44 7939-087884
More information about the ubuntu-users