SparkyLinux Forums

Installation & Upgrade => System upgrading => Topic started by: nemomen on October 10, 2020, 06:03:53 PM

Title: Sparky upgrade via terminal.
Post by: nemomen on October 10, 2020, 06:03:53 PM
Hello,
I having run as routine of each booting a command line started with sudo apt update and so on.
Among them the Sparky-Upgrade as well. They having been run in order previously and for the year today, except once. Then the process has been stopped and asked for password only for Sparky-Upgrade again. I had immediately checked my request, and I found to typed each request including ... && sudo sparky-upgrade &&...correctly, so I do not think so, it was a simple typing error. The processes before and after the Sparky-Upgrade request had been taken place smoothly.
I have no idea what has been taken place, was it a virus or any similar. The virus scanner did not report any infection that time and until so far.
What would has been taken time during the update/update process? Is it necessary to take any steps in settings in order to avoid next case?
Thanks.
nemomen
Title: Re: Sparky upgrade via terminal.
Post by: paxmark1 on October 10, 2020, 09:26:12 PM
Different OS  different malware.    Viruses are basically a windows thing, much lesser on modified FreeBSD Apple. Very very rare in linux.  Calm. 

   "sudo apt update"   "sudo apt upgrade"  (use apt full-upgrade if in rolling - testing)   should be enough.   Occasional autoclean,   a rare autoremove if in stable.  Those steps should run through your entire /etc/apt/sources .....    repositories.   

Others are wiser than me.  wait for their replies

It might have had something to do with keyring upgrade issues

https://forum.sparkylinux.org/index.php/topic,5538.0.html


opps his other post at the end was more correct as it had pavroos comment.

https://forum.sparkylinux.org/index.php/topic,5533.0.html
Title: Re: Sparky upgrade via terminal.
Post by: nemomen on October 11, 2020, 11:34:12 AM
Dear Paxmark1,
thanks 4 yr quick respond.
I agree on U, but on the other side, I had heard at least 3 Linux viruses like emotet during nowadays (Aug/Sept), so keep my powder dry.
I'm gonna modify my routine: change full-upgrade 2 upgrade thus stable version.
I do not want 2 appreciate any person, when I wait just a little before <solving>.
No Covid 4 every person.
nemomen
Title: Re: Sparky upgrade via terminal.
Post by: 151tom on October 13, 2020, 05:02:37 PM
Run your browser in Firejail from the repository and have gufw firewall enabled and use common sense web habits you should be good.




Title: Re: Sparky upgrade via terminal.
Post by: nemomen on October 13, 2020, 05:47:54 PM
Hello 151tom,
I usually do not use the Firejail sandbox, but use always the UFW enabled, I am gonna check it and hope a good result.
Thanks for paying attention to me.
Have a nice day, nemomen.