Re: [clamav-users] Solaris users in a bind

2021-11-06 Thread Sunhux G via clamav-users
We're still on Solaris 10 x86: what's the latest supported version of ClamAV, ideally a binary/ready-to-use copy that I can get hold of? The team will only move out of Solaris 10 in about two years' time. > ___ clamav-users mailing list clamav-user

Re: [clamav-users] 0.102.1 and Solaris 11.3...

2019-12-01 Thread Sunhux G via clamav-users
Btw, where's the link I could download a copy of the binary/package for Solaris 10 x86 of ClamAV 0.102.1 On 12/1/19, Andrew Watkins via clamav-users wrote: > Gary, > > Worstluck I am using Solaris 11.4 on x64 (8G ram)  and not seeing any > problems with 0.102.1. I am wonder if the older versi

Re: [clamav-users] how to verify if a malware signature is in DB & adding hash

2019-05-05 Thread Sunhux G via clamav-users
Thanks. Where can I download a copy of sigtool (that's pre-compiled) for Solaris 10 and RHEL7? Was combing clamav site but can't locate it. Appreciate a full URL to download it. As for actual file, it's too dangerous as they're ransomware/malware, so wouldn't want to get a copy of it. Sun On

Re: [clamav-users] how to verify if a malware signature is in DB & adding hash

2019-05-05 Thread Sunhux G via clamav-users
> https://www.clamav.net/documents/file-hash-signatures Need to clarify further based on the example in above link: so if I have the MD5 hash but not the malicious file itself, I'd add the MD5 value into a line in test.hdb & then run clamscan -d test.hdb /(ie scan for the MD5 in the entire

[clamav-users] how to verify if a malware signature is in DB & adding hash

2019-05-05 Thread Sunhux G via clamav-users
Hi How can I check if a a specific malware (by providing a name/hash) has been included in the current version of Clam DB & when it's added? In particular, I'm looking at: the ransomware, dubbed “Sodinokibi” & the botnet dubbed “Muhstik”. If they are not in, how can I add their hashes into my C

Re: [clamav-users] Any way to auto-update Clam engine (freshclam or any other tools)

2019-03-11 Thread Sunhux G via clamav-users
1 didn't provide any security fixes, at least > not as identified as such. > > Scott K > > On March 12, 2019 3:51:03 AM UTC, Sunhux G via clamav-users < > clamav-users@lists.clamav.net> wrote: > >Does freshclam auto-update Clam's engine. > > > >Re

Re: [clamav-users] Any way to auto-update Clam engine (freshclam or any other tools)

2019-03-11 Thread Sunhux G via clamav-users
mplete installation of the new ClamAV package to update the > engine. Freshclam only updates signatures. > > Sent from my iPad > > -Al- > > On Mar 11, 2019, at 20:51, Sunhux G via clamav-users > wrote: >> Does freshclam auto-update Clam's engine. > > >

[clamav-users] Any way to auto-update Clam engine (freshclam or any other tools)

2019-03-11 Thread Sunhux G via clamav-users
Does freshclam auto-update Clam's engine. Recently there's a vulnerability ( https://vuldb.com/?id.121488 ) so our 0.100.1 engine is viewed as outdated in an audit as 0.101.1 addresses this vulnerability Sun > > ___ clamav-users mailing list clama

[clamav-users] PrivateMirror : freshclam messages

2019-02-25 Thread Sunhux G via clamav-users
Our setup: 1) have freshclam download via Internet on a Solaris 10 x86 server in DMZ 2) an ex-colleague who left us served out cvd/cld via httpd on this Solaris server 3) have internal RHEL7 freshclam try to update from that Solaris httpd server using the private mirror In the internal RHEL7's, /e

Re: [clamav-users] after installation in an RHEL7, clamd not there

2019-02-22 Thread Sunhux G via clamav-users
Heard from an ex-colleague that using latest Clam packages from the latest epel will solve this. Anyone know the link/url for this latest epel ? Sun On Thu, Feb 21, 2019 at 2:03 PM Sunhux G wrote: > > Is the following package required? On some of our RHEL, epel is there & > in some, it's not

Re: [clamav-users] after installation in an RHEL7, clamd not there

2019-02-20 Thread Sunhux G via clamav-users
Is the following package required? On some of our RHEL, epel is there & in some, it's not there: epel-release-7-11.noarch.rpm On Thu, Feb 21, 2019 at 1:51 AM J.R. wrote: > > Btw I can't use 'yum' or 'apt-get' to install as our RHEL servers have > no > > Internet access > > The *systemd* pack