Coupla possibilities: Norton and Clam look in different places in the 
file to ID it. This allows a situation where a broken attachment 
(incomplete) may be identified by one product, but because pieces are 
missing, not identified by the other. Unless you execute it you probably 
can know if you got the whole thing or not.

Having virtual machines running on your system is a great way to test 
these things without damaging your system. Or a stand-alone system 
works, too. Regardless, any virus that slips past your system is worth 
submitting to ClamAV, and allow them sort out it's pedigree.

Don't get too hung up on names - they are arbitrary and there is little 
agreement as to what the vendors choose to call them. Whomever finds it 
first gets to call it anything they wish. Whomever finds it second also 
gets to call it whatever they wish. And so on. The sexier the name the 
more attention the bestower receives so there's financial rewards to not 
joining the pack.

dp

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

I tried to submit them, however the submission system wouldn't let me upload
them as the files I was uploading were scanned by the system and detected
them as already being in the database.....

Franklyn


_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to