[Clamav-users] format/location/use of .wdb for Phishing.Heuristics.Email.SpoofedDomain
I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in archives which says Whitelisting heuristic phishing signatures is done using a .wdb file. I have not found any information on how to use such a file (format, location, compiling, etc.) and I would like a pointer to the information location. The Phishing.Heuristics.Email.SpoofedDomain is wonderful at blocking real phishing attempts at our college. We do NOT want to turn it off. However, it is also blocking a lot of news letters and social networking site emails leading to too many help desk complaints. -- Robert Lopez Unix Systems Administrator Central New Mexico Community College (CNM) 525 Buena Vista SE Albuquerque, New Mexico 87106 ___ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml
Re: [Clamav-users] format/location/use of .wdb for Phishing.Heuristics.Email.SpoofedDomain
On 8/26/2009 10:18 AM, Robert Lopez wrote: I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in archives which says Whitelisting heuristic phishing signatures is done using a .wdb file. I have not found any information on how to use such a file (format, location, compiling, etc.) and I would like a pointer to the information location. The Phishing.Heuristics.Email.SpoofedDomain is wonderful at blocking real phishing attempts at our college. We do NOT want to turn it off. However, it is also blocking a lot of news letters and social networking site emails leading to too many help desk complaints. The documentation is here: http://www.clamav.net/doc/latest/phishsigs_howto.pdf -- Noel Jones ___ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml
Re: [Clamav-users] format/location/use of .wdb for Phishing.Heuristics.Email.SpoofedDomain
On Wed, Aug 26, 2009 at 10:26 AM, Noel Jonesnjo...@megan.vbhcs.org wrote: On 8/26/2009 10:18 AM, Robert Lopez wrote: I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in archives which says Whitelisting heuristic phishing signatures is done using a .wdb file. I have not found any information on how to use such a file (format, location, compiling, etc.) and I would like a pointer to the information location. The Phishing.Heuristics.Email.SpoofedDomain is wonderful at blocking real phishing attempts at our college. We do NOT want to turn it off. However, it is also blocking a lot of news letters and social networking site emails leading to too many help desk complaints. The documentation is here: http://www.clamav.net/doc/latest/phishsigs_howto.pdf -- Noel Jones ___ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml Just what I needed thanks. -- Robert Lopez Unix Systems Administrator Central New Mexico Community College (CNM) 525 Buena Vista SE Albuquerque, New Mexico 87106 ___ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml