On 20/07/2007, at 4:31 AM, Jeff Thurston wrote: >> > > No, they are not gzipped, I used the #2 download script and they > are stored > in /usr/local/share/clamav/sanesecurity.inc/ > > From my clamav.log: > > Thu Jul 19 10:31:14 2007 -> Database correctly reloaded (156058 > signatures) > Thu Jul 19 10:32:03 2007 -> > /var/lib/amavis/tmp/amavis-20070719T102627-11606/parts/p002: > Html.Phishing.Sanesecurity.TestSig FOUND > Thu Jul 19 10:42:19 2007 -> Reading databases from /usr/local/share/ > clamav > Thu Jul 19 10:42:26 2007 -> Database correctly reloaded (158975 > signatures) > Thu Jul 19 10:46:43 2007 -> > /var/lib/amavis/tmp/amavis-20070719T104137-14452/parts/p003: > MSRBL-Images/1-0-wsv6 FOUND > > So the signatures are loaded and presumably working. > That report was simply from clamd --version and freshclam log output.
I'm using the sanesecurity and MSRBL files too and are getting the same spam. I'll start sending them to Steve to incorporate. James. _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://lurker.clamav.net/list/clamav-users.html