
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title> &#187; malware remove</title>
	<atom:link href="https://www.nikeshshk.com.np/tag/malware-remove/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.nikeshshk.com.np</link>
	<description></description>
	<lastBuildDate>Tue, 04 Nov 2025 10:25:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.2.4</generator>
	<item>
		<title>Scanning for malware with Linux Malware Detect (LMD)</title>
		<link>https://www.nikeshshk.com.np/news/scanning-for-malware-with-linux-malware-detect-lmd/</link>
		<comments>https://www.nikeshshk.com.np/news/scanning-for-malware-with-linux-malware-detect-lmd/#comments</comments>
		<pubDate>Sat, 25 Jul 2015 09:39:11 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[malware remove]]></category>
		<category><![CDATA[malware scan linux]]></category>
		<category><![CDATA[virus remove]]></category>
		<category><![CDATA[virus scan]]></category>

		<guid isPermaLink="false">http://www.nikeshshk.com.np/?p=841</guid>
		<description><![CDATA[Linux Malware Detect (LMD), also known as Maldet, is a malware scanner for Linux released under the GNU GPLv2 license. It is particularly effective for the detection of php backdoors, darkmailers and many other malicious files that can be uploaded on a compromised website. It will help you do detect infected websites and clean the infection, however securing the compromised user or website is still necessary to avoid re-infection. If the server has cPanel , we recommend you install ClamAV first, as maldet will use the ClamAV scan engine. ClamAV installation instructions are available here. You will need to be logged in as root to the server over SSH. 1 &#8211; Install maldet cd /usr/local/src/ &#38;&#38; wget http://www.rfxn.com/downloads/maldetect-current.tar.gz &#38;&#38; tar -xzvf maldetect-current.tar.gz &#38;&#38; cd maldetect-* &#38;&#38; sh install.sh This will automatically install a cronjob inside /etc/cron.daily/maldet so a daily scan will be run for local cPanel or Plesk accounts. 2 &#8211; Make sure to update to the latest version and virus signatures:&#160;<a href="https://www.nikeshshk.com.np/news/scanning-for-malware-with-linux-malware-detect-lmd/" class="read-more">Continue Reading</a>]]></description>
				<content:encoded><![CDATA[<p>Linux Malware Detect (LMD), also known as Maldet, is a malware scanner for Linux released under the GNU GPLv2 license. It is particularly effective for the detection of php backdoors, darkmailers and many other malicious files that can be uploaded on a compromised website. It will help you do detect infected websites and clean the infection, however securing the compromised user or website is still necessary to avoid re-infection.</p>
<p>If the server has cPanel , we recommend you install ClamAV first, as maldet will use the ClamAV scan engine. ClamAV installation instructions are <a href="http://kb.iweb.com/entries/21073403-Installing-and-configuring-ClamAV-for-cPanel?locale=1" target="_blank">available here.</a></p>
<p>You will need to be logged in as root to the server over SSH.</p>
<p>1 &#8211; Install maldet</p>
<blockquote><p>cd /usr/local/src/ &amp;&amp; wget <a href="http://www.rfxn.com/downloads/maldetect-current.tar.gz">http://www.rfxn.com/downloads/maldetect-current.tar.gz</a> &amp;&amp; tar -xzvf maldetect-current.tar.gz &amp;&amp; cd maldetect-* &amp;&amp; sh install.sh</p></blockquote>
<p>This will automatically install a cronjob inside /etc/cron.daily/maldet so a daily scan will be run for local cPanel or Plesk accounts.<br />
2 &#8211; Make sure to update to the latest version and virus signatures:</p>
<blockquote><p>maldet -d &amp;&amp; maldet -u</p></blockquote>
<p>3 &#8211; Run the first scan manually</p>
<p>To scan a specific user&#8217;s home directory, run the following command:</p>
<blockquote><p>maldet -a /home/user</p></blockquote>
<p>To launch a background scan for all user&#8217;s public_html and public_ftp in all home directories, run the following command:</p>
<blockquote><p>maldet -b &#8211;scan-all /home?/?/public_?</p></blockquote>
<p>(We also recommend you to scan /tmp and /dev/shm/)</p>
<p>4 &#8211; Verify the scan report</p>
<p>We recommend you to always read the scan reports before doing a quarantine. You will also be able to identify infected websites for further actions.</p>
<p>List all scan reports time and SCANID:</p>
<blockquote><p>maldet &#8211;report list</p></blockquote>
<p>Show a specific report details :</p>
<blockquote><p>maldet &#8211;report SCANID</p></blockquote>
<p>&nbsp;</p>
<p>Show all scan details from log file:</p>
<blockquote><p>grep &#8220;{scan}&#8221; /usr/local/maldetect/event_log</p></blockquote>
<p>&nbsp;</p>
<p>5 &#8211; Clean the malicious files</p>
<p>By default the quarantine is disabled. You will have to launch it manually.</p>
<blockquote><p>maldet -q SCANID</p></blockquote>
<p>6 &#8211; (optional) Automatically quarantine detected malware</p>
<p>Please review these configuration variables in /usr/local/maldetect/conf.maldet<br />
variable     value     description<br />
quar_hits     number     if the number is different than 0, enables automatic quarantine</p>
<p>7- (optional) Configure scan reports e-mail alerts</p>
<p>Maldet can send you and email alert each time it detects malware. Please review these configuration variables in /usr/local/maldetect/conf.maldet<br />
variable     value     description<br />
email_alert     1 or 0     enable or disable e-mail alerts<br />
email_addr      e-mail address      target e-mail for notifications, should be put in quotes like: &#8220;<a href="mailto:myuser@mydomain.com">myuser@mydomain.com</a>&#8221;</p>
<p>More information is available: /usr/local/maldetect/conf.maldet or <a href="https://www.rfxn.com/projects/linux-malware-detect/" target="_blank">https://www.rfxn.com/projects/linux-malware-detect/</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.nikeshshk.com.np/news/scanning-for-malware-with-linux-malware-detect-lmd/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
