I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in
archives which says "Whitelisting heuristic phishing signatures is
done using a .wdb file."

I have not found any information on how to use such a file (format,
location, compiling, etc.) and I would like a pointer to the
information location. The Phishing.Heuristics.Email.SpoofedDomain is
wonderful at blocking real phishing attempts at our college. We do NOT
want to turn it off. However, it is also blocking a lot of news
letters and social networking site emails leading to too many help
desk complaints.

-- 
Robert Lopez
Unix Systems Administrator
Central New Mexico Community College (CNM)
525 Buena Vista SE
Albuquerque, New Mexico 87106
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to