--- Begin Message ---
Hi there,
On Tue, 15 May 2018, Stefan Schumacher wrote:
I would like to use clamdscan to scan an entire server but exclude
sys, proc and dev.
mail6:~$ >>> cat testfile
/etc/perl/
mail6:~$ >>> clamdscan -f testfile
/etc/perl: OK
----------- SCAN SUMMARY -----------
Infected files: 0
Time: 0.020 sec (0 m 0 s)
8<----------------------------------------------------------------------
Log extract:
8<----------------------------------------------------------------------
May 15 17:21:22 mail6 clamd[670]: /etc/perl/sitecustomize.pl: OK
May 15 17:21:22 mail6 clamd[670]: /etc/perl/Net/libnet.cfg: OK
May 15 17:21:22 mail6 clamd[670]: /etc/perl/XML/SAX/ParserDetails.ini: OK
May 15 17:22:03 mail6 clamd[670]: /etc/perl/sitecustomize.pl: OK
May 15 17:22:03 mail6 clamd[670]: /etc/perl/Net/libnet.cfg: OK
May 15 17:22:03 mail6 clamd[670]: /etc/perl/XML/SAX/ParserDetails.ini: OK
8<----------------------------------------------------------------------
--
73,
Ged.
--- End Message ---
_______________________________________________
clamav-users mailing list
[email protected]
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/contact.html#ml