Hi Edwin,

You can either:
> 1. Boot a Linux live CD, scan local drive from there, or run clamdscan
> and send to your debian server for scanning
>
>
the thing is that a friend oof mine seems to have virulent server or
network, which I wnat to scan from my debian notebook!
So, I will be in tne LAN and want to scan the net as a lot; if possible!


> 2. install clamdscan.exe on the windows client, write a clamd.conf with
> TCPAddr and TCPSocket point to your debian server, and run clamdscan -m
> C:\, then clamdscan -m D:\, and so on.
> This will of course fail to detect the malware that is already
> running in memory.
>
>
And that is exactly the thing: I want to find the malware especially
backdoors and trojans which do already reside in the memory or whereever!
Due to that I thought that there is a possibility to run clamav in a way
like that clamav 192.xxx.xxx.xxx/24


> Best regards,
> --Edwin
>

Will that somehow be possible???

Regards
Niels

> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://www.clamav.net/support/ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to