On Tue, Aug 14, 2012 at 10:25 AM, wrote:
>
> I don't want to list every file clamscan checks (because there are many).
> When I use the "-i" option to only print infected files, my scan summary
> results indicate there were errors. However, the errors are not reported
> because the "-i" option w
I don't want to list every file clamscan checks (because there are many).
When I use the "-i" option to only print infected files, my scan summary
results indicate there were errors. However, the errors are not reported
because the "-i" option was used. Is there any way to only print infected
fi
> -Original Message-
> From: clamav-users-boun...@lists.clamav.net [mailto:clamav-users-
> boun...@lists.clamav.net] On Behalf Of David Raynor
>
> On Mon, Aug 13, 2012 at 4:28 PM, Maarten Broekman
> wrote:
>
> > All,
> > I have a PHP.Remoteadmin-3 php script. I have
> ano
Vid Luther wrote:
I'm wondering if it's possible to run ClamAV on a file system that has a
ton of WordPress installs.
Yes, use (IIRC) clamscan to scan the directories.
I've done that on my servers when there's been any question about a
customer site.
--
Simon Hobson
Visit http://www.magpi
Hi,
I'm wondering if it's possible to run ClamAV on a file system that has a
ton of WordPress installs. I'm looking to see if any files have been
infected. It's trivial for us to do a tripwire like check to see if the
core files have been modified, but user uploaded files, themes, and
vulnerabili