On Tue, Oct 31, 2006 at 02:51:29AM +, Stephen Gran said:
> On Mon, Oct 30, 2006 at 06:45:04PM -0800, Dennis Peterson said:
> >
> > Did you include a randomizer so everyone doesn't hit Steve's server
> > on the hour? :) I provide a feed for a URLBL list and it's
> > surprising how many people c
Le Mardi 21 Novembre 2006 15:38, David De Rosa a écrit :
> #! /bin/sh
> # clam-ip-drop.sh
>
> ip=`tail -n 4 /var/log/httpd/error_log | grep "virus daemon" | grep -v
> "cannot
> create" | cut -d " " -f8-8 | cut -d "]" -f1-1`;
> date=`date`;
>
> iptables -n -L INPUT > /tmp/iptList
>
>
> for i in $ip
On Friday December 08, 2006 at 12:19:14 (AM) Noel Jones wrote:
> I'm pleased with clamav's detection of phish, but I'm really
> impressed with Steve Basford's add-on rules for phish and other
> malicious non-viral email. I strongly recommend them.
> http://www.sanesecurity.com/clamav/
I hardil
John Wilcock wrote:
http://www.microsoft.com/technet/security/advisory/929433.mspx
It's not clear from MS or news sources whether any exploits are actively
spreading...
To my knowledge there is (at least) 1 known case - malware dropped when
viewing the exploited Word document.
Does Clam