> Nbr 5) EICAR virus sent using BinHex encoding This was also missed on my ClamAV 0.65 running as clamd, however it was picked up by Amavisd-new for its extension. (Running ClamAV 0.65, Postfix 2.0.13, Amavisd-new-20030616-p5)
> I do not care about the second section of the test virus web page, since I do > not run OE. I do have OE clients, but they run their own Windows anti-virus > package. I also have OE clients (and MS Outlook Clients, which I believe also are vulnerable to the second section), and they use desktop AV as well. However, I'd like these to be caught by defense-in-depth. I haven't had time to research the "bugs" that testvirus/webmail.us says "MUST BE CAUGHT!" (emphasis added) by a mailserver, but I'll be tracking them down with amavisd-new experts as well. I mean, hey, if there's a pattern/signature to these threats, _something_ I'm using should catch it. --Seth ------------------------------------------------------- This SF.net email is sponsored by: Perforce Software. Perforce is the Fast Software Configuration Management System offering advanced branching capabilities and atomic changes on 50+ platforms. Free Eval! http://www.perforce.com/perforce/loadprog.html _______________________________________________ Clamav-users mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/clamav-users