![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png)
Ok I’ll bite. What’s the software you “need”?
Ok I’ll bite. What’s the software you “need”?
That’s the OP is talking about selling out
“A decade”?! Try 2
Install Linux and this is the way.
If you think ClamAV on your mom’s laptop on Starbucks WiFi is doing anything useful, but you think fail2ban isn’t - you’re naive.
On phishing - you’ve got another great example. ublock origin or any other decent adblocker will do WAAAAY more to help than ClamAV.
Ideally you keep your configs in a git repo (like github). You know what’s modified because you’re the one who modified them. If you modify them - put that config file in the git repo.
As for “put down” I just meant copied to the system (from github) by your automation (like ansible)
https://docs.ansible.com/ansible/latest/getting_started/index.html
Sounds like you’ve got a better solution, but I think you forgot to mention what it was.
That, and:
Basically: put everything back as it was right before the ransomware encrypted your system on you.
Then of course - fix what you did wrong that got you compromised. ;-)
No, most desktops behind a NAT probably dont need fail2ban (though it wouldn’t hurt).
Everyone’s security profile/needs are different.
The point is that list does a hell of a lot more useful than ClamAV
You’d be better served learning how to setup and use:
Yup. Got the pop-up about being out of free articles. Opened a browser I never use (with no ad blocker… Cause I never use it) so I got to experience the site with ads.
The entire experience was hilariously ironic to read about service’s enshitification… While being bombarded with constant ad garbage.
Bye bye wired. That was a waste of my time.