Quoting "David F. Skoll" <[EMAIL PROTECTED]>:

> I think ClamAV alone is too small and simple to build a whole course around.
> If it were one component of a larger security course, it would be more
> useful.

My first thought also.  Though it might be tempting if it was expanded to
cover all the "common" bases:

* ClamAV (general)
* ClamAV (on Mac OS X)
* ClamAV (on Windows)
* ClamAV (on Unix/Linux)
* ClamAV-milter
* Writing and using your own signature databases
* Using freshclam with 3rd party signature databases
* Integrating ClamAV with common mail programs (sendmail milter, postfix,
   MailScanner, exim, procmail, etc)
* Integrating ClamAV with web servers/proxies
* AntiVirus Best Practices
* Effective (good) and Ineffective (bad) AntiVirus policies, and how to
   write/.implement/enforce them

and so on...

ClamAV is pretty simple in itself.  But integrating it with the OS, with
Mail, with 3rd party signatures is more complicated.  Writing your own
signatures even more so.  So, like others, I would need to see what
the course would cover before I could say yes/no to the idea.

> Regards,
>
> David.
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://lurker.clamav.net/list/clamav-users.html


-- 
Eric Rostetter
The Department of Physics
The University of Texas at Austin

Go Longhorns!
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to