I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in archives which says "Whitelisting heuristic phishing signatures is done using a .wdb file."
I have not found any information on how to use such a file (format, location, compiling, etc.) and I would like a pointer to the information location. The Phishing.Heuristics.Email.SpoofedDomain is wonderful at blocking real phishing attempts at our college. We do NOT want to turn it off. However, it is also blocking a lot of news letters and social networking site emails leading to too many help desk complaints. -- Robert Lopez Unix Systems Administrator Central New Mexico Community College (CNM) 525 Buena Vista SE Albuquerque, New Mexico 87106 _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml
