Thanks. That goes into the file of handy things to know.

--
Thomas Kern
ActioNet, Inc.
On contract to:
U.S. Department of Energy
301-903-2211 (Office)
301-905-6427 (Mobile)


-----Original Message-----
From: clamav-users-boun...@lists.clamav.net 
[mailto:clamav-users-boun...@lists.clamav.net] On Behalf Of Al Varnell
Sent: Friday, July 20, 2012 3:23 PM
To: ClamAV users ML
Subject: Re: [clamav-users] Virus decscriptions ?

On 7/20/12 5:57 AM, "Kern, Thomas (CONTR)" <thomas.k...@hq.doe.gov> wrote:

> Last night 4 files on one of our internal servers were flagged as 
> being infected with Exploit.PDF.Dropped-20.
> 
> How do I find out what Exploit.PDF.Dropped-20 is and how to fix the 
> files or the user's workstation from which they got uploaded?
> 
sigtool --find Exploit.PDF.Dropped-20 | sigtool --decode-sig


-Al-
 
--
Al Varnell
Mountain View, CA



_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to