G.W. Haywood wrote:
Hi there,
On Tue, 25 Dec 2007 Paul Kosinski wrote:
In December 2006, we were running ClamAV 0.88.7, and there were still
a fair number of real viruses being detected in inbound email. Now
running 0.91.2 and 0.92, there seem to be only phishing attempts, and
not even
John Rudd wrote:
Luis Miguel R. wrote:
El Monday, 24 December del 2007 a las 10:55:51AM, Dennis Peterson escribió:
Paul Kosinski wrote:
In December 2006, we were running ClamAV 0.88.7, and there were still
a fair number of real viruses being detected in inbound email. Now
running 0.91.2 and
Block all mails from dynamic IP.
They are 99,99% spam.
No they aren't that rule causes quite a few of my customers a
headache, as the (linux) mailserver I often install sends the email
direct, irrespective of whether there Ip is dynamic or static. Some
ISPs charge an arm and a leg for
At 07:12 07/10/2004, you wrote:
Hello;
Any GUI for Clamav...I mean for Linux ???
and for SMEserver (aka e-smith)
http://sme.swerts-knudsen.dk/index.html?frame=http%3A//sme.swerts-knudsen.dk/howtos/howto_22.htm
Cheers
Brian
--
Brian J Read
www.abandonmicrosoft.co.uk
www.theonlineorganiser.com
At 18:53 16/08/2004, Mike Robinson wrote:
Why not just do what I've been working on. Just set up a procmail rule
that runs freshclam whenever you get a message from the clamav-virusdb
list. It should work just as good as the clamav team sending you a
virusdb push every time the database is
I am getting lots of these, and clamav is detecting them fine, but it
clearly is trying to email back the sender with a notification.
As the reply to is spoofed, this makes no sense at all (and i am getting
lots of bounces). How do we stop this happening?
Cheers
Brian
--
Brian J Read
At 14:57 27/01/2004, you wrote:
Brian Read wrote:
I am getting lots of these, and clamav is detecting them fine, but it
clearly is trying to email back the sender with a notification.
As the reply to is spoofed, this makes no sense at all (and i am getting
lots of bounces). How do we stop
from the CVS?
cheers
Brian
-Original Message-
From: Brian Read [mailto:[EMAIL PROTECTED]
Sent: 21 November 2003 10:34
To: [EMAIL PROTECTED]
Subject: Re: [Clamav-users] over sized zips from 0.65
At 09:37 21/11/2003, you wrote:
Brian Read wrote:
i am getting these, since upgrading to 0.65
At 22:09 18/09/2003, Darryl W. DeLao Jr wrote:
Anyone
know of a way to make clamscan email you when its done scanning with the
results included?
pipe the results into mail
viz:-
(cd /;/usr/bin/clamscan --recursive --quarantine /var/clamav/quarantine
--infected --stdout --log
fresclam again.
Best regards,
Diego d'Ambra
-Original Message-
From: Brian Read [mailto:[EMAIL PROTECTED]
Sent: 1. juli 2003 13:19
To: [EMAIL PROTECTED]
Subject: [clamav-users] checksum failure again?
My daily update has just failed with this:
Current working dir is /usr/share/clamav
Checking
My daily update has just failed with this:
Current working dir is /usr/share/clamav
Checking for a new database - started at Tue Jul 1 12:00:01 2003
Connected to clamav.elektrapro.com.
Reading md5 sum (viruses.md5): OK
Reading md5 sum (viruses2.md5): OK
Downloading viruses.db
Got a stream of these this morning:
Checking for a new database - started at Mon Jun 23 12:00:01 2003
Current working dir is /usr/share/clamav
Connected to clamav.elektrapro.com.
Reading md5 sum (viruses.md5): OK
viruses.db is up to date.
Reading md5 sum (viruses2.md5): OK
Downloading viruses.db2
Wash
Thanks for that, and a useful little trick as well!!
cheers
Brian
At 06:41 16/05/2003, you wrote:
* Brian Read [EMAIL PROTECTED] [20030516 08:34]: wrote:
One of my customers would like to know if he is covered for the Fizzer
virus?
Cheers
[EMAIL PROTECTED] ('tty') ~ 18 - grep Fizzer
Also here, we seem to go through this every 2-3 months!
Cheers
Brian
At 09:38 18/03/2003, Nicklas Hardman wrote:
Yes I was just wondering about this. I also get errors on updating the
virus database.
Checking for a new database - started at Tue Mar 18 08:00:00 2003
ERROR: Can't connect to port
holes in your local machine security... having /var/run 777 may be a
problem because then an arbitrary program can easily identify file
descriptors for priveleged access, not a good thing...
Try that and see how it goes...
I should be back tomorrow around noon or so...
Good Luck,
-Matt
Brian Read
I will change them to 765 tomorrow and check that it still works.
Thanks for the help.
Brian
At 18:53 29/12/2002, you wrote:
No problem, but like I said, be careful when dolling out 777 perms, a
virus may be the least of your worries then... Perms are still important
Brian Read wrote
log in... ;-)
Thus clamav runs with priveleged permissions, and has access to lots of
things that it needs in order to run right...
Brian Read wrote:
At 20:15 27/12/2002, you wrote:
On Fri, 27 Dec 2002 12:38:11 -0700
Matt Blecha [EMAIL PROTECTED] wrote:
Here's another question... Does
I get:
In file included from zziplib/zzip-dir.c:15:
zziplib/zzip-file.h:20:18: zlib.h: No such file or directory
make[1]: *** [zzip-dir.lo] Error 1
make[1]: Leaving directory `/usr/RPMs/ClamAV/clamav-0.54/libclamav'
make: *** [all-recursive] Error 1
I have tried (re) installing zlib, but it
I'm also gettig this error, on version 0.50, sonce the last db revision.
Cheers
Brian
At 08:10 06/11/2002, you wrote:
hi there is any one else haveing this problem wit .51 ??
the culprit is bellow from virus.db2
W98/Hybris.E (Clam)=10400081*75f16800104000c3
any ideas ??
At 09:14 16/10/2002, you wrote:
How do I make the report file to SHOW WHICH files are being infected?
The option -i -l report.txt does not yield much info. It only shows HOW
MANY files are infected. But not WHICH files. Can someone throw me a
bone here?
I think the infected file names goes out
It as this
# clamscan --stdout .
But WHERE is the stdout file? ... I did a updatedb but I could not find
that file. So where does clamscan reports the filename to? Or should I
put more options? .. If so what are the options..
Thanks
-Original Message-
From: Brian Read [mailto:[EMAIL
21 matches
Mail list logo