Hi there,

On Tue, 23 Feb 2010 beshoo wrote:
> On Mon, 22 Feb 2010 Lyle Giese wrote:
>
> You proably won't find their code using ClamAV.  More likely is that
> they will inject code in an HREF or some java to download the
> malicious content from a different site.  My experience is that that
> they won't inject code that will be detected by ClamAV, but will
> inject a pointer to their code. ... ClamAV is not the tool needed here.
>
> thank you but i dont think tha , i am sure that is the solution is here with
> clam , there is nothing to do with javascript here .

You really do need to start reading what people write.  Mr. Giese is
correct, and he didn't say anything about JavaScript.

As I have tried to explain, you can probably use ClamAV to scan POST
data with a simple script.  This may or may not protect against the
threats that you feel you are facing.  You might waste less time if
first you clarify for yourself exactly what the threats are.

If you have a system which permits content to be changed against your
wishes, then perhaps it's time to reconsider the system architecture
rather than try to prevent things from happening in ways which you
clearly do not understand.

Once again, this is not the place to ask about using Apache modules.

--

73,
Ged.
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to