Jeff Thurston wrote: <SNIP> > > No, they are not gzipped, I used the #2 download script and they are stored > in /usr/local/share/clamav/sanesecurity.inc/ > > From my clamav.log: > > Thu Jul 19 10:31:14 2007 -> Database correctly reloaded (156058 signatures) > Thu Jul 19 10:32:03 2007 -> > /var/lib/amavis/tmp/amavis-20070719T102627-11606/parts/p002: > Html.Phishing.Sanesecurity.TestSig FOUND > Thu Jul 19 10:42:19 2007 -> Reading databases from /usr/local/share/clamav > Thu Jul 19 10:42:26 2007 -> Database correctly reloaded (158975 signatures) > Thu Jul 19 10:46:43 2007 -> > /var/lib/amavis/tmp/amavis-20070719T104137-14452/parts/p003: > MSRBL-Images/1-0-wsv6 FOUND > > So the signatures are loaded and presumably working. > That report was simply from clamd --version and freshclam log output.
If you are finding phish, scams, malware, etc. that are not being detected by SaneSecurity, forward the messages as an attachment (in order to preserve the original message headers) to [EMAIL PROTECTED], as Steve is very diligent about keeping his his signature files updated. Bill _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://lurker.clamav.net/list/clamav-users.html