On Wed, Aug 26, 2009 at 10:26 AM, Noel Jones<[email protected]> wrote: > On 8/26/2009 10:18 AM, Robert Lopez wrote: >> >> I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in >> archives which says "Whitelisting heuristic phishing signatures is >> done using a .wdb file." >> >> I have not found any information on how to use such a file (format, >> location, compiling, etc.) and I would like a pointer to the >> information location. The Phishing.Heuristics.Email.SpoofedDomain is >> wonderful at blocking real phishing attempts at our college. We do NOT >> want to turn it off. However, it is also blocking a lot of news >> letters and social networking site emails leading to too many help >> desk complaints. >> > > The documentation is here: > http://www.clamav.net/doc/latest/phishsigs_howto.pdf > > -- Noel Jones > > _______________________________________________ > Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net > http://www.clamav.net/support/ml >
Just what I needed thanks. -- Robert Lopez Unix Systems Administrator Central New Mexico Community College (CNM) 525 Buena Vista SE Albuquerque, New Mexico 87106 _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml
