@Linux infection check
As competent Linux admins never have to deal with rootkits, there are no ready-made tools. But a good Linux admin or security consultant would simply:
1.) Mount a suspicious Linux disk in a diagnostic machine, but not boot from it or run programs from it from the suspicious disk. That's what experts also do with Windows disks, btw.
2.) Do md5 sums of all executables and executable library files. Maybe also standard config files.
3.) Compare these md5s against a known good Linux disk of the same OS version and patch state.
4.) Maybe write a script which will download RPMs from e.g.
http://rhn.redhat.com/errata/RHBA-2002-055.html
,unpack RPMs and calculate md5s to compare with 2.)
5.) write a tiny script to list all scripts on the system and look at them. If they have not been tweaked (only the case for complex servers), just compare md5 against the package source (as in 4.))
The places where a virus could still, theoretically (!!) hide are
A) application files of applications which have a zero-day hole (PDFs / Acrobat Reader for example). But these would be user-level only, no full pwning.
B) in a file-system-based exploit directly hiding in file system structures. I have never heard of that kind of exploit on any operating system.
I suggest everybody uses the brain and deinstalls Java, Acrobat Reader and Flash. And/Or use a different, non-priviliged user to view youtube and the porn sites. That works for Windows, Linux and MacOS. NoScript does not hurt either.