Is Unix infallible?

Paul Ducklin


There seems to be a lot of debate about whether Unix anti-virus products are useful. Some people even think...

Paul Ducklin


There seems to be a lot of debate about whether Unix anti-virus products are useful. Some people even think they are a confidence trick, because there are so few Unix viruses about.

But why do some fans of Unix (and particularly Linux) think this way?

The most popular explanation I hear for why the virus writers have targeted Microsoft systems and platforms is that Microsoft is "bad" but Unix is "good". Microsoft's operating systems and products are fundamentally weak against viruses, the argument goes, while Unix is virus-proof by design.

This argument is rubbish. Consider one of the most dramatic viruses in history. It is believed to have infected more than a quarter of all computers on the Internet. It spread using e-mail; it spread without user intervention; it paralysed the Internet within 24 hours; and the author was identified, prosecuted and convicted.

Sounds like Melissa or the Love Bug, doesn't it? But I'm talking about a Unix-specific virus that pre-dates them both by more than a decade: Robert T Morris' Internet Worm (aka the Great Worm) of 1988.

So, let the Great Worm remind us that Unix systems are technically as much at risk from viruses as those running Windows. The real reason Microsoft has cornered the virus-writer market is a consequence of it having cornered the market in operating systems and software.

But as Unix becomes ever more popular (especially for home users), we must not be surprised to see the Unix virus scene taking off.

Paul Ducklin is head of global support at Sophos Anti-Virus

This was first published in September 2000



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Antivirus, firewall and IDS products



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...