FYI, there are 31 ClamAV signatures that contain the word "Linux". There are 
currently almost 6.4 million ClamAV signatures in the database.

All but two are in main.ndb or main.hdb, meaning they are relatively old.

All but five start with Win.Trojan or Win.Exploit or Win.Tool so I'm not clear 
on their relationship to Linux.

The two most recent ones are:
- Unix.Trojan.Linux_DDoS_93-2
- Unix.Trojan.Linux_DDoS_93-5364119-0

-Al-

On Wed, Dec 20, 2017 at 12:47 AM, Matus UHLAR - fantomas wrote:
> On 19.12.17 12:44, Dan Rawson wrote:
>> I'm working on running clamav on my Linux workstation - NOT a server 
>> environment.  What is the recommended usage in that environment?  clamd + 
>> OnAccess?  clamscan scheduled from cron?? clamdscan scheduled from cron??
>> 
>> I did search through the documentation but didn't see much addressing "best 
>> practices" in a single machine environment.
> 
> I haven't seen a linux malware yet. Well, I've heard that it exists, but
> haven't seen it (except hacking suite...)
> 
> what makes you think you need it?

-Al-
-- 
Al Varnell
Mountain View, CA




Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to