Davide Prina writes:
> Corey H wrote:
>
>> how do you guys test all of the potential PNG/JPG potential malware payloads
What's your use-case? As I'm not aware of an vector for GNU/Linux in
normal everyday use¹, I guess you host files for Windows clients?
Did anyone mention ClamAV already? If so,
On Mon, Jun 20, 2022 at 06:10:45PM +0200, Sebastian Rose wrote:
> >> how do you guys test all of the potential PNG/JPG potential malware
> >> payloads
>
> What's your use-case? As I'm not aware of an vector for GNU/Linux in
> normal everyday use¹, I guess you host files for Windows clients?
http
On Mon, Jun 20, 2022 at 09:25:38AM -0700, Noah Meyerhans wrote:
> https://security-tracker.debian.org/tracker/source-package/imagemagick
>
> If you're processing data (images, videos, audio files, etc) from
> unknown sources, it's a really good idea to use sandboxing of some kind,
> ensure that sa
I feel like ClamAV would be the cheapest and easiest solution for
handling png and jpgs, But like Sebastian said it does depend on use
case. There are multiple av scanners/solutions but many are paid
services, I've been using clam av for my email setup and it feel like
it's been sufficient. You
(am I sending my emails right?? I selected "Reply All.")
>> how do you guys test all of the potential PNG/JPG potential malware
payloads
>What's your use-case?
lol funny story.
I downloaded all of the github.com links ripped from the blackarch main
page (~8GB worth of repositories)
ANYWAYS
I want
5 matches
Mail list logo