We’ll have to wait for the ClamAV signature team to come to work in the AM to
get an official answer, but I’m curious on how you know that all of these
submissions to VirusTotal represent proven threats? In my experience, many
files uploaded to VT are totally harmless with no scanners
Hello,
On Mon, January 18, 2016 07:11, Al Varnell wrote:
> We’ll have to wait for the ClamAV signature team to come to work in the AM
> to get an official answer, but I’m curious on how you know that all of
> these submissions to VirusTotal represent proven threats? In my
> experience, many
I’m hearing from a couple of ClamXav users that several applications are being
identified as infected with Win.Adware.Softpulse-215. All these applications
contain the StuffIt framework.
I’ve uploaded the StuffIt Expander.app.zip to the ClamAV FP page with MD5
44f5ab1439a9c9c06b46aeb31b265e1e
Hi Walter,
Could you post a hash or two or
maybe a Virustotal link to one of the
Submitted ones.
Cheers,
Steve
Web: sanesecurity.com
Blog: sanesecurity.blogspot.com
On 18 January 2016 04:46:07 "Walter H." wrote:
Hello,
I want an explanation, why not adding?
You didn't attach anything.
--
Joel Esler
Manager, Talos Group
Sent from my iPhone
On Jan 17, 2016, at 10:47 AM, Jota Pe
> wrote:
I performed a ClamAV scan of all my desktop PC and the result (it is attached)
tells me about some possible
On 15.01.2016 23:16, Peter Bonivart wrote:
Not sure if it was appropriate to do, but I put a bug report into RedHat's
bugzilla for EPEL as well:
https://bugzilla.redhat.com/show_bug.cgi?id=1299072
I think it's the right thing to do. If I remember correctly it worked
out of the box for CentOS 6
I've been using the SRPM files from Fedora to build my own distribution. It is a
fairly simple matter to edit the specfile to create an rpm file that uses
directory structures and user/groups that you want. Here's a trail head tutorial
to get you started.