PC Security question regarding dual Linux and Windows operating systems
I have been considering adding a Linux OS to both my laptop and desktop PCs, so that each has a dual operating system, with the intention of using the Linux OS while browsing the internet and the Windows OS when I need to use programs incompatible with Linux. What I want to know is whether doing this would really confer any advantage to me in terms of reducing the likelihood of picking up some form of malware while browsing. After reading a Myth Busting discussion from last year about whether or not Linux machines are immune to them, I now have doubts about it.
The reason I am considering it is that I have had two severe malware infections on my Windows desktop within less than a year -- the first one completely destroyed my hard drive, resulting in the loss of several very important files and the second one totally blocked my use of it, leaving only the Safe Mode with command prompt functional. I'm having to copy needed files individually in this mode -- a very time consuming process! I don't want this happening again, which is why I am considering Linux, but I also want to be able to continue to use certain of my Windows programs. I came across information to the effect that you can have both OSs and switch back and forth between them if needed. But now I am wondering if a dual system would still leave my machines vulnerable, so if anyone can shed some light on this subject, I would really appreciate it!
Comments
With that in mind ,the malware can still be on your system but inactive, this means that it will not hurt a Linux OS, but if the files are transferred to a windows computer without being scanned and cleaned by an AV tool then they can still affect your windows installation.
If your windows based software does not require 3d video acceleration your best bet would be to install a Linux based OS as the primary OS, then installing the windows OS in a virtualbox virtual machine, this will allow you to set a snapshot of a clean state in windows and revert to it if an infection occurs.
But the likely hood of that occuring if the installs are on seperate partitions is pretty low is it not? What would cause an infected file to transfer from some place on a Linux partition over to the Windows partition? and then proceed to run itself?
There are some free av apps like clamAv that you can schedule to run on your system and use to scan shared partitions and external media to help prevent spreading the viri to windows based hosts.
What is 3d video acceleration and how do you find out whether a particular software requires it?
Will you please clarify just what you mean by this and explain how it is done?
Am I correct in understanding you to mean that clamAv is capable of scanning the Windows partition as well? How well does it compare to some of the top Windows-based security software like Bitdefender and Kaspersky Antivirus?
#d acceleration is used in video cards for things such as transparency effects and some video games, unfortunately the only was to find out if something needs it is when you gen an error message, however at least in virtuabox you can enable a guest machine to use 3d acceleration on specific hardware.
ClamAv is used as the core for many of the commercial AV software because it is free, the protection is quite good and generally better than norton or mcafee which I have found to both be jokes. You can use ClamAV as a base in the Linux OS to catch most issues and still install a commercial AV product in the windows installation to accent your protection. I have never used bitdefender of Kaspersky, but for my friend and family with windows I always recommend Antivir because it is outperformed every other AV I have attempted to use for cleanup.