Jason Haar wrote:
> However, I think you'll be out of luck. The only "network virus
> scanners" I know of are big beasts - because they effectively have to
> inline translate packets back to specific protocols (such as
> SMB/CIFS), pull the data content out, then run real AV over the fully
> formed files (or at least some largish data window). How they do that
> inline and manage to drop the session (i.e. killing the virus
> download) is a bit beyond me - I guess they rely on a RSET on the
> last packet being enough to cause the entire transfer to fail?

RSET should be enough.  Unless the user is really committed to infecting 
themselves, and astoundingly resourceful.

-- 
Matthew.van.Eerde (at) hbinc.com                 805.964.4554 x902
Hispanic Business Inc./HireDiversity.com         Software Engineer
perl -e"map{y/a-z/l-za-k/;print}shift" "Jjhi pcdiwtg Ptga wprztg,"
_______________________________________________
http://lurker.clamav.net/list/clamav-users.html

Reply via email to