Re: [Clamav-users] How to find infected file

2007-12-24 Thread Gerard
 On December 23, 2007 at 10:49PM Robert Adams wrote:

 I am very curious to know why anybody wants to help someone that has such an 
 adversarial attitude towards them.  I understand that support is support and 
 should help people when they are able to, but not everybody's attitude 
 warrants that extra mile of help.
 
 Baz, keep paying those big bucks and remain a Windows-weenie.  It does 
 not appear to me as though you will ever get an answer that makes you happy 
 until you have someone hold your hand throughout the entire process.
 
 Linux requires a knowlege of the O/S AND the distro - please learn some of 
 the 
 basics of both before you junp down others' throats when they (very 
 patiently) try to help you.  These people have spent much more than the month 
 or so that you have put in to learn Linux.  Please show them the respect they 
 deserve, ESPECIALLY when they are offering you their assistance on a Sunday 
 evening.
 
 Hopefully my next posting will not be in regards to some spoiled, arrogant 
 pussy that expects other people to do all his work and thinking for him.

Big buck, little bucks or no bucks, it makes no difference. Money is only
relative. The problem resides with those who are either too lazy or stupid to
RTFM. The number of winey-weeners is relatively proportionate to the number of
users of both *.nix and Microsoft products, although it is usually easier to
find documentation on Win32 based products.

It is apparent that the OP does not know proper posting etiquette to begin
with. The first response to his posting informed of of that; never-the-less,
he choose to ignore it. At that point right there I would have dismissed his
further inquiries. I usually ignore top posters out of habit anyway. If they
chose to post in a non-traditional manner, why should I waste me time trying
to assist them?

The best response you can give to a poster like that is not to berate him,
which only feeds his desire for attention, but rather to just ignore him
completely until his attitude changes.

-- 
Gerard

A: Because it fouls the order in which people normally read text.
Q: Why is top-posting such a bad thing?
A: Top-posting.
Q: What is the most annoying thing on usenet and in e-mail?

TOPIC: Posting Etiquette
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] How to find infected file

2007-12-24 Thread G.W. Haywood
Hi there,

On Mon, 24 Dec 2007 Baz wrote:

 I installed ClamAV and ran a scan on my entire system returning a
 report of one infected file.  How do I find this file?  I

Did you accidentally press 'send' too soon?  I'm sure you intended to
tell us just what your system is and how you installed ClamAV on it;
exactly what you did, and exactly what you saw, when you ran the scan
process.  Clearly without that information we will be at considerable
disadvantage, any help that we can give will of necessity be couched
in fairly general terms.  Don't forget that there are people here who
run ClamAV on a bewildering variety of combinations of hardware and
software, for very much more than the odd scan of their system files.

So here's some fairly general help.

First, and probably most important, read everything you can find that
might help you to help yourself.  That's a common theme in the open
source software world.  If you want to optimize the help you get from
lists like this one, here's something important you need to read soon:

http://www.catb.org/~esr/faqs/smart-questions.html

Second, there are lots of ways of finding the file which you seek, but
of course the methods will depend on information that unfortunately
wasn't provided with your question.  I suspect that you ran 'clamscan'
and you were rewarded with a _very_ large list of file names, to each
of which was appended the four characters : OK, and at the end of
the list was a summary, which is how you came by the information that
one of the files is infected.  On almost any computer system, the list
of filenames on a full system scan would be so long that it scrolled
most of the information that you were hoping for (that is, the names
of any infected files) off the top of the screen so quickly you had no
chance to read it.  Am I right?  Well, one way of stopping this from
happening is to press 'CTRL-S' (that is, you hold down the 'CTRL' key
and press the 'S' key once) which stops the text scrolling on most
systems.  Then to make it start scrolling again, press 'CTRL-Q'.  You
need to be quick, and fairly patient, to do it this way.  You could
avoid this problem by using your wits (also a common theme in the open
source world) for example by piping output from your scan command
through 'grep' - if you have a system which permits piping output and
has 'grep' installed on it.  If you haven't got 'grep' (already I can
hear people asking What use is a system that doesn't have grep and
can't pipe output?  but never mind that for the moment:) then you
could send the entire output of your scan to a file, and use a pager
or a text editor to search for the rogue file.  If you haven't got or
can't use a pager or an editor for some reason, then maybe you'll be
able to read the output over the Christmas break, or come back here
with more information.  Please be assured that what you want to do is
trivially easy to do.

Your next question is taking vague shape in my mind.  It has to do
with what the file is that you've found, and what you should do with
it.  For today, I've guessed as much as I'm prepared to guess, and I
probably wouldn't have done that if it wasn't Christmas Eve.

Compliments of the season to all.

--

73,
Ged.
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] How to find infected file

2007-12-24 Thread Rob Sterenborg
I usually don't post but I just can't resist this insulting troll..

 wasn't provided with your question.  I suspect that you ran 'clamscan'
 and you were rewarded with a _very_ large list of file names, to each
 of which was appended the four characters : OK, and at the end of

[...snip things about grep, editor and pager...]

To make a really long story short; you mean something like:

$ clamscan /home/username | grep -v : OK | less

Of course, the OP would probably see a # instead of $ because he's
logged in as root, not as a mortal user like he should, considering his
experience.

However, I'm not familiar with a clam.conf/clamscan.conf/whatever.conf
file and I'm quite sure that it doesn't exist. There is of course the
clamd.conf file that the OP might want to locate (hint) if he were using
clamdscan instead of clamscan (OP: mind the little difference). But,
then the OP would need an up-to-date locate database (hint).

Ah wel, since it's almost Christmas eve (and before the OP starts
trolling and top-posting again) these are the lines to find clamd.conf:

(I haven't seen a recent distro that lacks these..)
# updatedb
# locate clamd.conf

OP:
- Don't tell us that you can't find updatedb, locate, grep and/or less.
In that case, please go seek help elsewhere. This list is about ClamAV,
not about learning to use Linux.
- You need to cleanup your act if you want help. It's you who's
insulting people that try to help you. If you can't use the help given,
it might be you who's not competent enough to perform basic tasks. This
would be your problem, not ours.
- If you don't want to learn how to work with *nix and it's apps, please
delete your Linux partition and stick with Windows as that would then be
best for all of us (including you).

 Compliments of the season to all.

Perhaps a bit early, but, merry Christmas to everyone!


Grts,
Rob
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] Source code for test/clam.exe?

2007-12-24 Thread Cort, Tom
Hello,

clamav comes with a sample virus (ClamAV-Test-File) for testing
purposes. It's located in the clamav source tarball in the 'test'
directory and named 'clam.exe'. I'd like to distribute it with a free
software program I maintain, but I can't find the corresponding source
code. Can someone point me to the source code for 'clam.exe'?

Thanks!
--
Tom Cort
Systems Developer
Vermont Department of Taxes
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Source code for test/clam.exe?

2007-12-24 Thread Lyle Giese
Cort, Tom wrote:
 Hello,

 clamav comes with a sample virus (ClamAV-Test-File) for testing
 purposes. It's located in the clamav source tarball in the 'test'
 directory and named 'clam.exe'. I'd like to distribute it with a free
 software program I maintain, but I can't find the corresponding source
 code. Can someone point me to the source code for 'clam.exe'?

 Thanks!
 --
 Tom Cort
 Systems Developer
 Vermont Department of Taxes
 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://lurker.clamav.net/list/clamav-users.html
Google for eicar

Lyle
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] WGET Option Configuration

2007-12-24 Thread DBS Labs




I have not been able to get freshclam working, I can not find a user agent 
string that will go through our firewall.  At one time I had a wget command 
that worked, but I can not find the script any more.  Do anyone know the 
command I need and can they forward to me.  Thanks.
_
Share life as it happens with the new Windows Live.
http://www.windowslive.com/share.html?ocid=TXT_TAGHM_Wave2_sharelife_122007
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


[Clamav-users] Email viruses almost non-existent?

2007-12-24 Thread Paul Kosinski
In December 2006, we were running ClamAV 0.88.7, and there were still
a fair number of real viruses being detected in inbound email. Now
running 0.91.2 and 0.92, there seem to be only phishing attempts, and
not even very many of them. In fact it seems that our log file shows
almost as many (hourly) signature update messages as phish detections
(much less real virus detections).

Have other ClamAV users experienced a similar decline in email
attacks?

P.S. I haven't disabled anything in our local conf file, and I don't
think there is any upstream AV. (Our domain's first level mail server
runs on a dedicated machine at our Web provider, but doesn't run any
AV there since it simply relays to our local gateway, where admin is
easier.)
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Email viruses almost non-existent?

2007-12-24 Thread Dennis Peterson
Paul Kosinski wrote:
 In December 2006, we were running ClamAV 0.88.7, and there were still
 a fair number of real viruses being detected in inbound email. Now
 running 0.91.2 and 0.92, there seem to be only phishing attempts, and
 not even very many of them. In fact it seems that our log file shows
 almost as many (hourly) signature update messages as phish detections
 (much less real virus detections).
 
 Have other ClamAV users experienced a similar decline in email
 attacks?
 
 P.S. I haven't disabled anything in our local conf file, and I don't
 think there is any upstream AV. (Our domain's first level mail server
 runs on a dedicated machine at our Web provider, but doesn't run any
 AV there since it simply relays to our local gateway, where admin is
 easier.)

You didn't provide any numbers, but it is no surprise you now see a lot of 
scams and 
phishing stuff as you weren't seeing those before. But the rate of old school 
viruses 
detected should remain approximately constant. On my servers the rate of old 
fashion 
viruses remains rather constant over time but a detailed view shows they come 
in 
waves possibly indicating re-infection of target machines. In many cases the 
payload 
of these viruses is a phishing and scam messaging bot. Consequently, phishing 
and 
scam messages, offering a real monetary return to the creator, are growing 
quickly. 
They are now the reason for the viruses. There are probably still viruses that 
are 
intended to simply trash the machine being distributed but that is no longer 
the 
norm. In fact those kinds of viruses would probably be of some value today at 
reducing the amount of other junk mail. It's often been suggested that a good 
bot 
killer virus would be a good thing for the Internet. I'm almost ready to agree.

dp
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] WGET Option Configuration

2007-12-24 Thread Török Edwin
DBS Labs wrote:
 I have not been able to get freshclam working, I can not find a user agent 
 string that will go through our firewall.  At one time I had a wget command 
 that worked, but I can not find the script any more.  

Well, if wget works, why not use  wget's user-agent string?

 Do anyone know the command I need and can they forward to me.  Thanks.
   


$ wget http://database.clamav.net/daily.cvd

--Edwin
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html


Re: [Clamav-users] Source code for test/clam.exe?

2007-12-24 Thread Dennis Peterson
Cort, Tom wrote:
 Hello,
 
 clamav comes with a sample virus (ClamAV-Test-File) for testing
 purposes. It's located in the clamav source tarball in the 'test'
 directory and named 'clam.exe'. I'd like to distribute it with a free
 software program I maintain, but I can't find the corresponding source
 code. Can someone point me to the source code for 'clam.exe'?


I've not looked into it because I have no Windows/DOS (the very thought of that 
gives 
me happy feet) to test it on, but what I understand from reading is the EICAR 
string 
is a complete DOS .com executable file. Remember those? The .exe version is a 
self-extracting archive made from the .com file.

Test it by copying the EICAR string to a file named eicar.com. It should 
execute in a 
Windows cmd session and will only print a line of text saying it's printing 
part of 
the EICAR test string. Then archive the com file into a self-extracting archive 
which 
should produce a file with a .exe extension. You now have two executables that 
have 
the EICAR virus sample in them. Testing both files with ClamAV should return 
a 
report that the EICAR string was found in the com and exe files.

dp
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html