In message <[EMAIL PROTECTED]> "David F. Skoll"
<[EMAIL PROTECTED]> was claimed to have wrote:
>Dave Warren wrote:
>
>> True, but you could make it realistic enough to fool most of the people,
>> most of the time, especially with a readme.txt noting that the new
>> versions are signed slightly dif
On Mon, Dec 01, 2008 at 09:04:37AM CET, Dave Warren <[EMAIL PROTECTED]> said:
>
> The only way a key can be completely trusted is if it's provided
> completely independently of the download infrastructure, hosted
> elsewhere entirely, requiring a compromise of two unique and unrelated
> systems.
Hi Everyone,
This is a reminder of this week's ClamAV Webcast on Wednesday 3rd December
at 1800UTC (1300EST).
The presentation will cover common pitfalls in the deployment of ClamAV. It
will then recommend the best practices for logging, scan limits, SMP
systems, usage of
PUA, setting up freshcl
On Mon, Dec 1, 2008 at 10:35 AM, Török Edwin <[EMAIL PROTECTED]> wrote:
> On 2008-11-30 21:03, Odhiambo Washington wrote:
> > On Sun, Nov 30, 2008 at 9:51 PM, Török Edwin <[EMAIL PROTECTED]>
> wrote:
> >
> >
> >> On 2008-11-30 20:42, Odhiambo Washington wrote:
> >>
> >>> There are no lines with FO
Today started again what seems to establish itself as the Monday run [1]
of user-frightening malware attachments, properly phrased German. The
last one is exactly one week ago, and they appear to start after office
hours. *sigh*
Given the recent report on this list of malware submissions, where pa
I'm running clamd and clamav-milter on a few CentOS 5.2 boxes and have
noticed the last few weeks that clamav-milter has been dying on Sunday
nights...
This seems to have started with 0.94.1, and I've just upgraded to 0.94.2 this
morning.
Basically, when logrotate does its weekly run, it execute