On 20/07/2007, at 4:31 AM, Jeff Thurston wrote:
>>
>
> No, they are not gzipped, I used the #2 download script and they  
> are stored
> in /usr/local/share/clamav/sanesecurity.inc/
>
> From my clamav.log:
>
> Thu Jul 19 10:31:14 2007 -> Database correctly reloaded (156058  
> signatures)
> Thu Jul 19 10:32:03 2007 ->
> /var/lib/amavis/tmp/amavis-20070719T102627-11606/parts/p002:
> Html.Phishing.Sanesecurity.TestSig FOUND
> Thu Jul 19 10:42:19 2007 -> Reading databases from /usr/local/share/ 
> clamav
> Thu Jul 19 10:42:26 2007 -> Database correctly reloaded (158975  
> signatures)
> Thu Jul 19 10:46:43 2007 ->
> /var/lib/amavis/tmp/amavis-20070719T104137-14452/parts/p003:
> MSRBL-Images/1-0-wsv6 FOUND
>
> So the signatures are loaded and presumably working.
> That report was simply from clamd --version and freshclam log output.

I'm using the sanesecurity and MSRBL files too and are getting the  
same spam.

I'll start sending them to Steve to incorporate.

James.
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to