Desktop dating malware
Rick Moen, an experienced Linux system administrator, counters that: [That argument] ignores Unix's dominance in a number of non-desktop specialties, including Web servers and scientific workstations.
A virus/trojan/worm author who successfully targeted specifically Apache httpd Linux/x86 Web servers would both have an extremely target-rich environment and instantly earn lasting fame, and yet it doesn't happen.
There has not yet been a single widespread Linux virus or malware infection of the type that is common on Microsoft Windows; this is attributable generally to the malware's lack of root access and fast updates to most Linux vulnerabilities.
Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented.
Linux mail servers should run AV software in order to neutralize viruses before they show up in the mailboxes of Outlook and Outlook Express users.
To gain control over a Linux system or to cause any serious consequences to the system itself, the malware would have to gain root access to the system.In the past, it has been suggested that Linux had so little malware because its low market share made it a less profitable target.In 2008 the quantity of malware targeting Linux was noted as increasing.Shane Coursen, a senior technical consultant with Kaspersky Lab, said at the time, "The growth in Linux malware is simply due to its increasing popularity, particularly as a desktop operating system ...Linux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system.
Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses.