On 2009-11-05 18:27, George R. Kasica wrote:
On Mon, 2 Nov 2009 16:32:57 + (GMT), you wrote:
Hi there,
On Thu, 29 Oct 2009 aCaB wrote:
On our side we do a lot of QA
...
I really believe something needs to happen here so that these type of
bugs can be caught quickly
Freddie Cash wrote:
Yes, I still have this directory. If anyone is interested in it, I
can tar it up and make it available. Can also tar up the working
directory is needed.
Hi,
Yep, I'll take a look and see if I can see anything this end.
Cheers,
Steve
Sanesecurity
Besides the Virus Name %v
Are there any other details from the running scanner that can be
exported to a VirusEvent Script?
Thanks
--
Sincerely,
Nathan Gibbs
Systems Administrator
Christ Media
http://www.cmpublishers.com
signature.asc
Description: OpenPGP digital signature
Please take me off this list.
On Thu, Nov 5, 2009 at 2:14 PM, Nathan Gibbs nat...@cmpublishers.com wrote:
Besides the Virus Name %v
Are there any other details from the running scanner that can be
exported to a VirusEvent Script?
Thanks
--
Sincerely,
Nathan Gibbs
Systems
David Vo wrote:
Please take me off this list.
The instructions to do this are in the headers of each message you've ever
received from this list server but which I include here:
Reply-To: ClamAV users ML clamav-users@lists.clamav.net
List-Id: ClamAV users ML clamav-users.lists.clamav.net
On Thu, Nov 5, 2009 at 11:46 AM, Steve Basford
steveb_cla...@sanesecurity.com wrote:
Freddie Cash wrote:
Yes, I still have this directory. If anyone is interested in it, I
can tar it up and make it available. Can also tar up the working
directory is needed.
Yep, I'll take a look and see
On Thu, 05 Nov 2009 15:14:19 -0500
Nathan Gibbs nat...@cmpublishers.com wrote:
Besides the Virus Name %v
Are there any other details from the running scanner that can be
exported to a VirusEvent Script?
Inside the script itself you can access $CLAM_VIRUSEVENT_VIRUSNAME
(== %v) and
* Tomasz Kojm wrote:
On Thu, 05 Nov 2009 15:14:19 -0500
Nathan Gibbs nat...@cmpublishers.com wrote:
Besides the Virus Name %v
Are there any other details from the running scanner that can be
exported to a VirusEvent Script?
Inside the script itself you can access
* Nathan Gibbs wrote:
* Tomasz Kojm wrote:
On Thu, 05 Nov 2009 15:14:19 -0500
Nathan Gibbs nat...@cmpublishers.com wrote:
Besides the Virus Name %v
Are there any other details from the running scanner that can be
exported to a VirusEvent Script?
Inside the script itself you can access
We're currently investigating the possibility of using the OpenSUSE
build service to test the next ClamAV release on multiple Linux
distributions, including many old ones:
openSUSE 11.x, SLES/SLED 9/10/11, Fedora 10/11, RHEL 4/5, CentOS 5,
Mandriva 2009, xUbuntu 6.06/8.04/8.10/9.04
OK...I'm not
* aCaB wrote:
G.W. Haywood wrote:
I suspect that rather than QA, what you do is just a lot of hap-hazard
testing. That's why, whenever I see a new release of ClamAV, first I
will suppress a groan and then, before I risk it on any of my servers,
I'll wait a while and watch the users' list to
11 matches
Mail list logo