On Wed, Aug 26, 2009 at 10:26 AM, Noel Jones<[email protected]> wrote:
> On 8/26/2009 10:18 AM, Robert Lopez wrote:
>>
>> I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in
>> archives which says "Whitelisting heuristic phishing signatures is
>> done using a .wdb file."
>>
>> I have not found any information on how to use such a file (format,
>> location, compiling, etc.) and I would like a pointer to the
>> information location. The Phishing.Heuristics.Email.SpoofedDomain is
>> wonderful at blocking real phishing attempts at our college. We do NOT
>> want to turn it off. However, it is also blocking a lot of news
>> letters and social networking site emails leading to too many help
>> desk complaints.
>>
>
> The documentation is here:
> http://www.clamav.net/doc/latest/phishsigs_howto.pdf
>
>  -- Noel Jones
>
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://www.clamav.net/support/ml
>

Just what I needed thanks.

-- 
Robert Lopez
Unix Systems Administrator
Central New Mexico Community College (CNM)
525 Buena Vista SE
Albuquerque, New Mexico 87106
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to