Maybe it isn't designed to run in background.
Yes, it is. The wiki shows methods running it as a daemon and as a scanner:
Run ClamAV as a Daemon
Install clamav-daemon. You can then use clamdscan where you would
previously have used clamscan. Lots of programs, especially e-mail
servers, can connect to a ClamAV daemon. This speeds up virus scanning
as the program is always in memory.
The clamav-daemon package creates a 'clamav' user; in order to allow
ClamAV to scan system files, such as your mail spool, you can add
clamav to the group that owns the files.
Let ClamAV listen for Incoming Scans
There are cases where you may want ClamAV daemon to act as a scanner
for other systems, so you don't have to run everything locally on the
system.
To do this, you simply have to modify the clamd.conf file and add
TCPSocket PORTNUMBER and TCPAddr IPADDRESS arguments to the clamd.conf
file and reload the daemon. The daemon will then accept connections to
it via the IP address and Port combination you specify.
I just want good protection for my system.
Linux is fundamentally different from Windows so we did not inherit the problems Windows (still) faces. Our system has been set up as a multi-user system: more than 1 user at the same time is expected to use it. This means we have a security model built into our system since some users are not expected to see all the content or be able to do what they want on our systems. That also hinders malware to abuse your system.
Yes, it does not make Linux invulnerable. But as long as it is easier to infect millions of Windows system than to infect 1 Linux machine we win. Only if your machine is targeted specifically (when you run a game server for instance) you need to take precautions. But those are: create regular backups, use a good password, use a router, keeping an eye on the CVE tracker, keeping your system up to date and not installing software you do not need. All things you should do any way.
- Have you used other software showing better protection than ClamAV?
Yes (1st part: as a system admin for 30+ systems I have examined several virus scanners and root kit detectors and also made an assessment about threat risks when not using one) and no (2nd part). But the no is not because ClamAV is so good: it is as bad as any other virus scanner. Virus scanners all have such a low success rate that they are useless. When near 100% of all claims it claims to be a virus are false, I can't use it.
- Are there any "enhancements" possible to increase the threat detection in ClamAV, since it is lightweight? (I have seen some websites suggesting to add their threat signatures to the ClamAV list. Is this safe?)
See for instance the "signatures.pdf" in the "doc" dir of ClamAV on how to upload extra virus signatures.
But this is only useful when you actually find a virus as the 1st person. The virus definition file gets updates pretty regularly so I doubt there is anything to improve.
- Overall (and this is important), below you can find additional tasks which can be performed for hardened protection, without slowing down the machine.
This is a question on its own and has also no relation to virus scanners.
- Encrypt your system.
- Do not install software that allows you to use FTP, Telnet, rlogin and rsh services
- Minimize the software installed: don't use it? Remove it.
- Keep your system up to date.
- Use strong passwords and password aging.
Important:
The protection of your system does not come from anti-virus software; it comes from how you treat your system. If you ever do find a virus you are too late: removing a virus is not enough as your system has been compromized and needs to be re-installed from a proven clean backup. You always have to assume they got your admin password.
Best Answer
How does it do that? (of course the article does not mention that ...). From the link ...
We need to know how they believe they can circumvent the admin password ...
Best method to counter this: create regular backups and keep more than 1 backup of anything important to you. It is always possible to format a disk and reinstall and to restore a clean backup.
Me too! But a virus is just a small part of all malware. You also got rootkits, and crapware like what you describe above.
No! That advice is the best you can get. At the moment we can consider Ubuntu Software Center free from malware. That article and similar articles I found all lack 1 bit of information: how does it actually encrypt our disks.