On Thu, 2008-12-04 at 12:43 +1300, Lists wrote:
> Arthur Dent wrote:

> > The best thing to do is to download the script, put it somewhere where
> > the user that will run it (possibly "clamav") has read + execute access,
> > (I created a /home/clamav/ directory) and then try running it manually
> > first. If it works it will download the extra files need by Clamav for
> > the spam and phishing sigs.
> 
> So if the manual run works it will download everything needed and clam 
> will know its there and to use it?

Depends.  Come on, Kate, have a look at the scripts. As I briefly
mentioned before, they are intended to be read (at least those I ever
had a look at include their own full docs) and *configured*.

The latter is important. If it isn't configured according to *your*
ClamAV setup, it can't possibly do anything. If and how the script or
your cron job will have to poke clamd (you're running that, aren't you?)
again, depends.

> Also will it add info to the headers of the email so that I can  check 
> which emails are being hit by the plugin?

No, "it" doesn't.

It's third-party signatures. ClamAV uses them, if configured properly.
Whatever adds headers *now* will do so for third-party sigs just as
well.

Wait -- what "plugin" are you talking about?


/me mumbles something about "wrong list" and "should have included TM
    hints" according to some recent post on that other list...

-- 
char *t="[EMAIL PROTECTED]";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

Reply via email to