variants, I'd suggest using dag. The install is almost
too easy and the updates come just long enough after a new release to
avoid most of the bugs. This is a very active area in the dag repository.
John Hinton
>
> I just installed ClamAV-0.91.2 on a Redhat EL 4 server for testi
http://clamav.net/binary.html
Thanks for a great product.
John Hinton
___
http://lurker.clamav.net/list/clamav-users.html
n' is short for manual, but it is
actually an acronym for 'm'uch 'a'bout 'n'othing. But some are actually
quite helpful!
John Hinton
___
http://lurker.clamav.net/list/clamav-users.html
ust works.
And a hearty thanks to the ClamAV team!!!
Best,
John Hinton
___
http://lurker.clamav.net/list/clamav-users.html
John Hinton wrote:
Chris Burton wrote:
09:12 http-proxy[14382]: [194.201.85.161:42872
84.18.202.162:80/daily.cvd] Error while sending/receiving. Can't
receive
data from server (Connection refused)
Have I been banned from the system? No configuration changes made at
this end. If so what
arted getting the dread
ERROR: Problem with internal logger.
I have checked permissions on the logs and everything looks fine. These
two systems are CentOS 3.7 using the Dag repo for ClamAV installs and
updates.
Can anyone lead me in the direction for repairing this issue?
Best,
John H
John Hinton wrote:
Robert Isaac wrote:
After many attempts at getting the LogWatch report to *not* tell me
my ClamAV was out of date when I knew I was running 0.87.1 I used
some advice from this list and ran find / -name "*clam*" -print and
removed everything associated with ClamA
ut the Logwatch distro
for RHEL from Dag Weers does include clamav information. Seems that the
RedHat version is a bit outdated or I guess one should say, a bit old
fashioned.
Best,
John Hinton
___
http://lurker.clamav.net/list/clamav-users.html
René Bellora wrote:
John Hinton wrote:
Seems all other viruses are being handled by Clam on these machines.
do you have 'DetectBrokenExecutables' enabled in clamd.conf ?
regards,
René
Rene,
You put me onto the right track. I guess I should admit to egg on my
face, or perhaps c
René Bellora wrote:
John Hinton wrote:
John Hinton wrote:
In the last couple of weeks, I'm getting reports from users that
Norton is reporting W32.Netsky.P making it through from my servers.
I'm configured right, have the latest db updates. I'm wondering if
this is another of Nor
John Hinton wrote:
In the last couple of weeks, I'm getting reports from users that
Norton is reporting W32.Netsky.P making it through from my servers.
I'm configured right, have the latest db updates. I'm wondering if
this is another of Norton's reporting of 'broken&
ystem Resouces
If you turn it all on, I've seen system loads increase by 30 times vs. a
system running almost none of the options.
Personally, I stayed with my milters (ClamAssassin for ClamAV)... at
least for now.
John Hinton
___
http://lur
rched the list
and only could find data from 2004.
I do know that these are appearing as at least .pif and .jpg extensions.
Sorry, but I don't have one of these messages to send to the clam report
virus system.
Seems all other viruses are being handled by Clam o
13 matches
Mail list logo