Re: [Clamav-users] alpha version of freshclam-alike for 3rd part signatures

2006-12-08 Thread Stephen Gran
On Tue, Oct 31, 2006 at 02:51:29AM +, Stephen Gran said: > On Mon, Oct 30, 2006 at 06:45:04PM -0800, Dennis Peterson said: > > > > Did you include a randomizer so everyone doesn't hit Steve's server > > on the hour? :) I provide a feed for a URLBL list and it's > > surprising how many people c

Re: [Clamav-users] Apache with Clamav and VirusEvent

2006-12-08 Thread Laurent Besson
Le Mardi 21 Novembre 2006 15:38, David De Rosa a écrit : > #! /bin/sh > # clam-ip-drop.sh > > ip=`tail -n 4 /var/log/httpd/error_log | grep "virus daemon" | grep -v > "cannot > create" | cut -d " " -f8-8 | cut -d "]" -f1-1`; > date=`date`; > > iptables -n -L INPUT > /tmp/iptList > > > for i in $ip

Re: [Clamav-users] submit-to-publish time much too long for phishing

2006-12-08 Thread Gerard Seibert
On Friday December 08, 2006 at 12:19:14 (AM) Noel Jones wrote: > I'm pleased with clamav's detection of phish, but I'm really > impressed with Steve Basford's add-on rules for phish and other > malicious non-viral email. I strongly recommend them. > http://www.sanesecurity.com/clamav/ I hardil

Re: [Clamav-users] Latest MS Word zero-day exploit

2006-12-08 Thread Diego d'Ambra
John Wilcock wrote: http://www.microsoft.com/technet/security/advisory/929433.mspx It's not clear from MS or news sources whether any exploits are actively spreading... To my knowledge there is (at least) 1 known case - malware dropped when viewing the exploited Word document. Does Clam