Citeren "G.W. Haywood via clamav-users" :
I've seen no evidence of a memory leak at all. The 0.103.0-rc2 daemon
has been running for eight days continuously. It's currently using
(top, RSS) about 8.6 MBytes of RAM - and 6.9 MBytes of that is shared.
I used
systemd-cgtop system.slice/fre
Hi there,
On Wed, 9 Sep 2020, Arjen de Korte via clamav-users wrote:
Citeren Arjen de Korte via clamav-users :
DefaultMemoryAccounting is enabled in openSUSE Tumbleweed. One observation
I still have, is that the memory usage of freshclam.service seems to
steadily increase after each update.
Thank you for the professional answer, the numbers can count something.
According to your answer, I assume that PC setup/configuration count
like 80 %, and AV is like 20 % against threats.
Then ClamAV’s On-Access Scanner will still function, scanning and
alerting on files normally in real time
Hi Royce,
There may be an issue with the way you are running clamonacc.
Scanning the hole filing system can cause recursion as the system may
try to re-scan the log every time it is updated generating a new log
entry or may try to scan special files that are not suitable for scanning.
Stop t
On 11.09.2020 13:08, Wirth Ervin via clamav-users wrote:
Dear ClamAV Users,
I was looking after "Does ClamAV catch WannaCry malware?" on Google,
but I haven't found any significant answer about this.
Could you answer?
Thank you,
Ervin Wirth
ClamAV might detect signatures of WannaCry malwar
I setup *clamd* running as the clamscan user. I have *clamonacc* running as
root.
I was not able to get *clarmonacc* to use syslog so I pass it a log file
path argument. It is logging but for each file on the scan mount of */* it
has a log entry for not having the real file name.
Failed to deter
MHi there,
On Fri, 11 Sep 2020, Wirth Ervin via clamav-users wrote:
I was looking after "Does ClamAV catch WannaCry malware?" on Google,
but I haven't found any significant answer about this.
The answer to your question is probably "yes, with qualifications".
One of those qualifications is t
I am using Windows 7 (on notebook) and 10 (on PC).
When there was the worldwide peak of WannaCry,
it was interesting to see it mostly affected older Windows versions,
like 7 (at my workplace).
I was thinking to pick ClamAV, since I've seen that some popular AV
softwares like Malwarebytes (the
I'm a macOS user, so cannot give you a definitive answer, but at the time it
was so common that I can't imagine that all necessary signatures for the
original and all subsequent variants were added years ago.
I'm also under the impression that most versions of Windows OS have been
patched to pr
Dear ClamAV Users,
I was looking after "Does ClamAV catch WannaCry malware?" on Google,
but I haven't found any significant answer about this.
Could you answer?
Thank you,
Ervin Wirth
___
clamav-users mailing list
clamav-users@lists.clamav.net
https
Hi there,
On Fri, 11 Sep 2020, Zayan abdul shukoor via clamav-users wrote:
... Is it possible to detect virus inside the zip with ScanArchive
turned off? ...
Tell the client to unpack zip, send the unpacked content to clamd.
--
73,
Ged.
___
clam
11 matches
Mail list logo