Hi,
 I'm wondering if it's possible to run ClamAV on a file system that has a
ton of WordPress installs.  I'm looking to see if any files have been
infected. It's trivial for us to do a tripwire like check to see if the
core files have been modified, but user uploaded files, themes, and
vulnerabilities could end up in new files that end up serving malware. Is
the scanner and db, capable of looking for payloads known in the WordPress
community?
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to