Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On 09/08/2010 09:57 AM, Eric Chadbourne wrote: > as a home linux user is it time? does clam actually check for anything > that could hurt my trusty *nix? This might give you a jumping off point for further investigation: http://clamav-du.securesites.net/cgi-bin/clamgrok?virus=linux&search-type=contains&case-sensitivity=No&database=daily&database=main&display=database&display=virus&.submit=&.cgifields=database&.cgifields=case-sensitivity&.cgifields=search-type&.cgifields=display It's always difficult to work backwards from the virus "names" in an AV product's signature database to figure out the actual vector that it is using, but some of those search results are definitely linux viruses or worms. As usual though, if you're virus scanning using the (root) filesystem that might be infected, you've already lost... Matt
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |