Simplewater,
I don't know enough to answer your question. I have asked many times of different forums if there is some log or some activity monitor that could reveal if a program want to get out and to do thing.
One answer I did get was that the most clever trojans was so clever that they only get out on the internet if you activate a browser and do something like looking at internet pages so they mask their activity to coincide with other similar visits on the internet. Sop when you visit CNN then the Trojan visit their server and get instructions for further attacks and then go down dormant again and you have no way of knowing it was ever active at all until next time it needs to check with it's server for further updates. Maybe once a month or so. Meanwhile they lie dormant waiting for a wake up call.
Or how to find rootkits and such. Seems very hard to retell because the answers have either been way above my capacity to grasp or they tell it is not possible.
Some program are so clever that they can stay dormant for months and only get activated when the criminals wants to target their enemies and then they activate ten thousands such dormant "bots" all over the world to make overloading of the target and maybe then you notice that suddenly everything is very slow and CPU run wild. But that could be once a month or so.
What is most aorrysome are such program like keyloggers that try to wait out that you do online banking and then learn how to do it again or to play man in the middle next time you go banking them now learned how it should look like andthey make a fake site that look identical to your bank now that they know that you have money there.
rootkits is problematic due to the current progtrams to find out gives so many false positives so you have no idea what is the false positive or true rootkit.
But as I remember that old text maybe two or three years old they did use windows so sure linux is less targetted but there are many Apache servers that have been contamined and them are linux. So they most likely know how to if they have time and motivation to get into linux machines too.
Not all of us has any router and even if we had that is only some 128 or 256 steps from breaking in is it not? I mean if they step through it 256 times then they are in? Unless me fail to get how it works. Which I maybe do.
It all depends on if they think one are a worthy target or not.
My 80 old neighbor was targeted for what he owned. Somebody had tried to get info using an online service and he went to the poilice insisting to get to know who it was and it was a "distant" aquantice at the Sailors Club that had some criminal background. Very scary. He could have taking over the online identity of my neighbor and ordered costly wall TV and let him pay for them. He confronted the guy and told him to stop what he was doing and luckily that guy did apology for what he had set up. So hope he rethink the whole attitude to abuse identitities.
But others are not that lucky. Some get their identity taken over and it is not easy to get it back. They have time to do real damage before the legal system can put a stop to it.
So sure I am too alarmistic due to me a nooby on security I know too little but if one are unlucky and happen to have "unreliable friends" then them can do damage easily.
They show that if one set up a fake hot spot then some programs take the strongest open signal and just go out on the internet instead of asking which one of all the available one want to use.
But try to get info from people close to you that you can trust. only them can visit you and see if there is things that look different on your hdd that could be things hidden.
I've heard that the best trojans replace legit files so everything look totally okay. So they make use of the windows files and put their own altered versions with same name there.
I mean one need to know much to be able to spot them by a casual look. Can they pretend to be as old as the original files or does it show up that them being newer or used recent despite one never use windows ever? Or do they say one size identical with the old file and then when one look using puppy ROX then maybe them another size?
I wish one would new easy ways to find out if files get altered despite one don't use Windows. They have many GB to hide there
