[Clamav-users] format/location/use of .wdb for Phishing.Heuristics.Email.SpoofedDomain

2009-08-26 Thread Robert Lopez
I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in
archives which says Whitelisting heuristic phishing signatures is
done using a .wdb file.

I have not found any information on how to use such a file (format,
location, compiling, etc.) and I would like a pointer to the
information location. The Phishing.Heuristics.Email.SpoofedDomain is
wonderful at blocking real phishing attempts at our college. We do NOT
want to turn it off. However, it is also blocking a lot of news
letters and social networking site emails leading to too many help
desk complaints.

-- 
Robert Lopez
Unix Systems Administrator
Central New Mexico Community College (CNM)
525 Buena Vista SE
Albuquerque, New Mexico 87106
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] format/location/use of .wdb for Phishing.Heuristics.Email.SpoofedDomain

2009-08-26 Thread Noel Jones

On 8/26/2009 10:18 AM, Robert Lopez wrote:

I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in
archives which says Whitelisting heuristic phishing signatures is
done using a .wdb file.

I have not found any information on how to use such a file (format,
location, compiling, etc.) and I would like a pointer to the
information location. The Phishing.Heuristics.Email.SpoofedDomain is
wonderful at blocking real phishing attempts at our college. We do NOT
want to turn it off. However, it is also blocking a lot of news
letters and social networking site emails leading to too many help
desk complaints.



The documentation is here:
http://www.clamav.net/doc/latest/phishsigs_howto.pdf

  -- Noel Jones

___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml


Re: [Clamav-users] format/location/use of .wdb for Phishing.Heuristics.Email.SpoofedDomain

2009-08-26 Thread Robert Lopez
On Wed, Aug 26, 2009 at 10:26 AM, Noel Jonesnjo...@megan.vbhcs.org wrote:
 On 8/26/2009 10:18 AM, Robert Lopez wrote:

 I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in
 archives which says Whitelisting heuristic phishing signatures is
 done using a .wdb file.

 I have not found any information on how to use such a file (format,
 location, compiling, etc.) and I would like a pointer to the
 information location. The Phishing.Heuristics.Email.SpoofedDomain is
 wonderful at blocking real phishing attempts at our college. We do NOT
 want to turn it off. However, it is also blocking a lot of news
 letters and social networking site emails leading to too many help
 desk complaints.


 The documentation is here:
 http://www.clamav.net/doc/latest/phishsigs_howto.pdf

  -- Noel Jones

 ___
 Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
 http://www.clamav.net/support/ml


Just what I needed thanks.

-- 
Robert Lopez
Unix Systems Administrator
Central New Mexico Community College (CNM)
525 Buena Vista SE
Albuquerque, New Mexico 87106
___
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml