# freshclam
ClamAV update process started at Sun Jun 6 19:58:06 2021
Connecting via proxy
main.cld is up to date (version: 59, sigs: 4564902, f-level: 60,
builder: sigmgr)
Connecting via proxy
WARNING: getfile: Unknown response from db.local.clamav.net: HTTP/1.1 403
WARNING: getpatch: Can't dow
On 07.06.2021 08:49, G.W. Haywood via clamav-users wrote:
Hi there,
On Sun, 6 Jun 2021, Walter H. via clamav-users wrote:
# freshclam
ClamAV update process started at Sun Jun 6 19:58:06 2021
...
WARNING: getfile: Unknown response from db.local.clamav.net: HTTP/1.1
403
...
please help
On 07.06.2021 08:49, G.W. Haywood via clamav-users wrote:
Hi there,
On Sun, 6 Jun 2021, Walter H. via clamav-users wrote:
# freshclam
ClamAV update process started at Sun Jun 6 19:58:06 2021
...
WARNING: getfile: Unknown response from db.local.clamav.net: HTTP/1.1
403
...
please help
I'm using an old CentOS 6, not migrated to something newer
On 06.06.2021 20:04, Walter H. via clamav-users wrote:
# freshclam
ClamAV update process started at Sun Jun 6 19:58:06 2021
Connecting via proxy
main.cld is up to date (version: 59, sigs: 4564902, f-level: 60,
builder: s
On 08.06.2021 14:57, Richard via clamav-users wrote:
Date: Tuesday, June 08, 2021 08:00:16 +0200
From: "Walter H.
I'm using an old CentOS 6, not migrated to something newer
On 06.06.2021 20:04, Walter H. via clamav-users wrote:
# freshclam
ClamAV update process started at Sun Ju
On 11.09.2020 13:08, Wirth Ervin via clamav-users wrote:
Dear ClamAV Users,
I was looking after "Does ClamAV catch WannaCry malware?" on Google,
but I haven't found any significant answer about this.
Could you answer?
Thank you,
Ervin Wirth
ClamAV might detect signatures of WannaCry malwar
what sense does it have to send an email with suspicious attachments of
more than 40 MBytes to a mailing list?
here are pieces of the E-mail header ...
X-Hold-in-Queue: Suspicious 'application/x-7z-compressed'-File=libcef.dll.7z
X-Hold-in-Queue: Suspicious 'application/x-7z-compressed'-File=lib