Hi,
1. I'm running ClamAV-0.73 on RH9 machine (qmail) and made all the updates, including daily 429. Anyway, it seems that mydoom.m is bypassing ClamAV since 2 of my servers (same config) didn't send any notification to the admin e-mail regarding the worm. After one of the servers i have NAV for Exchange that reported mydoom.m in a mail which passed through the linux box!!!
Is there a way of testing if the servers are really protected from this worm? Maybe someone can send an infected message to my e-mail :)


2. I'm using ClamAV for 6 months now and still the monthly report of NAV (again, the server running NAV is receiving mails ONLY from the Linux box running ClamAV) gives me the following:
*Bloodhound.Packed* *1*
[EMAIL PROTECTED] *23*
[EMAIL PROTECTED] *1*
[EMAIL PROTECTED] *3*
[EMAIL PROTECTED] *13*
[EMAIL PROTECTED] *82*
[EMAIL PROTECTED] *1*


How can all these viruses pass through ClamAV?
Thanks for any replies and hopefully I will stop a few servers from becoming worms' HQ :)
Arthur



------------------------------------------------------- This SF.Net email is sponsored by OSTG. Have you noticed the changes on Linux.com, ITManagersJournal and NewsForge in the past few weeks? Now, one more big change to announce. We are now OSTG- Open Source Technology Group. Come see the changes on the new OSTG site. www.ostg.com _______________________________________________ Clamav-users mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to