Coupla possibilities: Norton and Clam look in different places in the file to ID it. This allows a situation where a broken attachment (incomplete) may be identified by one product, but because pieces are missing, not identified by the other. Unless you execute it you probably can know if you got the whole thing or not.
Having virtual machines running on your system is a great way to test these things without damaging your system. Or a stand-alone system works, too. Regardless, any virus that slips past your system is worth submitting to ClamAV, and allow them sort out it's pedigree. Don't get too hung up on names - they are arbitrary and there is little agreement as to what the vendors choose to call them. Whomever finds it first gets to call it anything they wish. Whomever finds it second also gets to call it whatever they wish. And so on. The sexier the name the more attention the bestower receives so there's financial rewards to not joining the pack. dp _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://lurker.clamav.net/list/clamav-users.html I tried to submit them, however the submission system wouldn't let me upload them as the files I was uploading were scanned by the system and detected them as already being in the database..... Franklyn _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://lurker.clamav.net/list/clamav-users.html
