Hi,
I found another false-positive, this time with
Heuristics.Phishing.Email.SpoofedDomain and I'd like help in figuring
out what domain within the email it thinks is spoofed.
I've pasted the email here:
http://pastebin.com/S7XkCg9a
Any ideas greatly appreciated.
Thanks,
Alex
__
Under Solaris 10 x86, gcc 4.7.1, gnu ld 2.21.1 libclamav is failing to
link. Here is an exerpt from the compile:
make[4]: Entering directory `/home/chris/apps/mail/clamav-0.98.1/libclamav'
CC unrar15.lo
CC unrar.lo
CC unrar20.lo
CC unrarppm.lo
CC unrarvm.lo
CC
Sorry, I mistyped my previous reply, meant to say:
You may find the ClamAV "bytecode compiler" useful in doing this.
http://www.clamav.net/lang/en/download/sources/
On Fri, Jan 31, 2014 at 2:53 PM, Steven Morgan wrote:
> Torge,
>
> You may find the ClamAV useful in doing this.
>
> http://www.
Hi--
On Jan 31, 2014, at 11:59 AM, Gene Heskett wrote:
[ ... ]
> Come on folks, if I am a subscriber to the mailing list, why is that not
> credentials for posting to your bugzilla? Boggles what little mind I have
> left.
You should be able to change your password to Mailman or Bugzilla to ma
On Friday 31 January 2014 14:55:39 Shawn Webb did opine:
> Hey Gene,
>
> Thank you for giving us ideas for new features. Our bugzilla system at
> https://bugzilla.clamav.net/ is the right place to file feature
> requests.
>
> Thanks,
>
> Shawn
Yup, and another place to require a login, with a
Torge,
You may find the ClamAV useful in doing this.
http://www.clamav.net/lang/en/download/sources/
On Fri, Jan 31, 2014 at 12:08 PM, Torge Husfeldt wrote:
> Hi List,
>
> I have a problem with obfuscated php-code of well-known shells.
> I have prepared an example where clamav correctly detect
Hey Gene,
Thank you for giving us ideas for new features. Our bugzilla system at
https://bugzilla.clamav.net/ is the right place to file feature requests.
Thanks,
Shawn
On Fri, Jan 31, 2014 at 2:23 PM, Gene Heskett wrote:
> Greetings;
>
> I have trolled thru the man pages at length, and can
Greetings;
I have trolled thru the man pages at length, and can find no option to make
it just a little more verbose by outputting something that would serve to
identify the originator of a compromised email. What we do get, is hard to
impossible to actually connect to a given email currently
Hi List,
I have a problem with obfuscated php-code of well-known shells.
I have prepared an example where clamav correctly detects the shell
itself, but happily flags as OK all the obfuscated variations.
You will find the files I'm talking about in the following zipfile
(protected with password
On 30 Jan 2014, at 18:26, Charles Swiger wrote:
> Hi--
>
> On Jan 30, 2014, at 9:31 AM, Gene Heskett wrote:
>> Is stuff like this in the clamav man pages? I haven't found it if it is,
>> hence the question.
>
> No. ClamAV documents what it does; one normally consults the documentation
> fo
On Fri, 2014-01-31 at 15:01 +0100, Pieter Caron wrote:
> On 29.01.2014 16:24, Greg Folkert wrote:
>
> >
> > You specifically *INCLUDE* /home/pc... you cannot Exclude a part of it
> > once you Include it. The Include Trumps the Exclude in this instance. At
> > least that is what I'm seeing myse
On 29.01.2014 16:24, Greg Folkert wrote:
>
> You specifically *INCLUDE* /home/pc... you cannot Exclude a part of it
> once you Include it. The Include Trumps the Exclude in this instance. At
> least that is what I'm seeing myself.
>
> I haven't tried changing the order of the rules yet and probab
12 matches
Mail list logo