FYI, there are 31 ClamAV signatures that contain the word "Linux". There are currently almost 6.4 million ClamAV signatures in the database.
All but two are in main.ndb or main.hdb, meaning they are relatively old. All but five start with Win.Trojan or Win.Exploit or Win.Tool so I'm not clear on their relationship to Linux. The two most recent ones are: - Unix.Trojan.Linux_DDoS_93-2 - Unix.Trojan.Linux_DDoS_93-5364119-0 -Al- On Wed, Dec 20, 2017 at 12:47 AM, Matus UHLAR - fantomas wrote: > On 19.12.17 12:44, Dan Rawson wrote: >> I'm working on running clamav on my Linux workstation - NOT a server >> environment. What is the recommended usage in that environment? clamd + >> OnAccess? clamscan scheduled from cron?? clamdscan scheduled from cron?? >> >> I did search through the documentation but didn't see much addressing "best >> practices" in a single machine environment. > > I haven't seen a linux malware yet. Well, I've heard that it exists, but > haven't seen it (except hacking suite...) > > what makes you think you need it? -Al- -- Al Varnell Mountain View, CA
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ clamav-users mailing list clamav-users@lists.clamav.net http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml