Quoting "David F. Skoll" <[EMAIL PROTECTED]>: > I think ClamAV alone is too small and simple to build a whole course around. > If it were one component of a larger security course, it would be more > useful.
My first thought also. Though it might be tempting if it was expanded to cover all the "common" bases: * ClamAV (general) * ClamAV (on Mac OS X) * ClamAV (on Windows) * ClamAV (on Unix/Linux) * ClamAV-milter * Writing and using your own signature databases * Using freshclam with 3rd party signature databases * Integrating ClamAV with common mail programs (sendmail milter, postfix, MailScanner, exim, procmail, etc) * Integrating ClamAV with web servers/proxies * AntiVirus Best Practices * Effective (good) and Ineffective (bad) AntiVirus policies, and how to write/.implement/enforce them and so on... ClamAV is pretty simple in itself. But integrating it with the OS, with Mail, with 3rd party signatures is more complicated. Writing your own signatures even more so. So, like others, I would need to see what the course would cover before I could say yes/no to the idea. > Regards, > > David. > _______________________________________________ > Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net > http://lurker.clamav.net/list/clamav-users.html -- Eric Rostetter The Department of Physics The University of Texas at Austin Go Longhorns! _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://lurker.clamav.net/list/clamav-users.html