![]() |
|
jimimaseye
|
Well, I have on file and could email you one of the macro-type DOC viruses (office word document) that gets trapped by it but......
Not sure why you have 'problems' installing. It was clear and plain for me. |
||||||||||||
|
|
|||||||||||||
|
CraigJConrad
|
I'm not sure I want a virus file purposely sent. I was just hoping that there would be a log report identifying the databases as ClamWin loads them when it does a scan. As I don't tell ClamWin which databases to use, I guess I have to assume that it simply uses *every* database in that folder. I'm skeptical of that, because if you want to stop using one of them, you'd have to go into that folder and either rename its extension or delete it, as opposed to removing it from a list. A selection list would seem more appropriate.
As to the install, I'm probably just too anal (it serves me well in programming, but not always in processing written directions). The instructions begin by describing what the sigupdate.bat and signame.txt do, then go right into the need to install Rsync. And the Rsync instructions tell you to put things into the "winrsync folder". There was never any instruction telling you to unzip the SaneSecurity files and where to put them. So, there is no context for putting the Rsync into the winrsync folder -- it doesn't exist unless you did a step that isn't identified in the instructions. So, reading it seems that you have to install rsync first, but the folder doesn't exist -- I created one only to figure out later it is a subfolder of SaneSecurity. Then step 2 is for installing ClamAV (which I already had, of course), but it reads "I'm assuming that you are using ClamWin or ClamWin command line for the correct db location". I couldn't figure out what that was telling me -- how do I know if I'm using it "for the correct db location"? Anyway, I eventually just ignored that. Finally, the sigupdate.bat wasn't working (the db files weren't appearing in the folder), so I had to open it in a command prompt and debug it. It lacked the "\bin" part of the folder path in three places, and still reports a pipe error (which I've ignored as the db files seem to be getting to where they belong now). Once I am confident that it is actually using the new databases, I will donate -- I've been unemployed for nearly three months, so it might not be very much, but the authors certainly deserve compensation ... I am appreciative of your time and assistance ... Craig |
||||||||||||
|
|
|||||||||||||
|
jimimaseye
|
ok, ...
1, even if I sent you the 'virus', it is a word .DOC file (with a macro) and of no danger if you dont open it or you dont have macros in MS OFFICE to automatically run. If your software is working correctly it will identify it anyway, and of not you will just have a DOC as an attachment which you can just delete. Rest assured that Clamwin default definitions WONT detect it and when it is detected it will be by the .UNOFFICIAL sane definitions. 2, Your 'sigupdate' folder should contain: readme.txt signames.txt sigupdate.bat (which should be called by task scheduler) (you might also have a 'sigupdate' logfile too) folder: dbtemp folder: winrsync (containing rsync) 3, As long as you have everything set up you should see the new databases exist in the existing Clamwin database: "%appdata%\.clamwin\clamwin.conf" (opened as your Clamwin system user). 4, If you want to add or remove any of the databases from being included, simply edit the signames.txt file. Any that you do include you should see evidence in the database folder (3) 5, Clamwin loads all database that exist in the dtaabase folder 6, go to 1. (a BASIC reference there for you programmers). FWIW, my SIGUPDATE.BAT looks like this (also includes handling creation of update log files for tracing - Note: 7z.exe is 7Zip which you need to install and point to.):
|
||||||||||||||
|
Last edited by jimimaseye on Tue Feb 16, 2016 2:44 pm; edited 2 times in total |
|||||||||||||||
|
GuitarBob
|
ClamWin uses all the databases you have if they are properly installed. If they are not, you should probably get an error message when you try to scan. You can check the Clam AV detection by downloading the EICAR test file and scanning it.
I've used the non-Clam AV databases some time ago for a while, but I prefer to stick to the "official" DB. That should be enough if you use ClamWin as a backup scanner to a real-time AV as the ClamWin developers recommend. I wouldn't contribute anything until your financial situation is more stable. Thanks for using ClamWin! Regards, |
||||||||||||
|
|
|||||||||||||
|
jimimaseye
|
Once the oven has cooked the chicken, to be sure it isnt still raw inside, show it to a candle. |
||||||||||||||
|
|
|||||||||||||||
|
GuitarBob
|
Well, yesterday I checked a malware on Virus Total. It was only detected by a handful of AVs, and Clam AV was one of them. It just depends upon what you get.
Instead of email attachments, the majority of viruses are now being spread via poisoned web sites, and you are redirected several times before you get to the site. So Clam probably relies upon Virus Total submissions unless it has a user that gets an attachment with a current malware. Clam AV has a place. If Bitdefender doesn't see a virus, they will not see it either. Clam AV certainly has a place for those who want it. By the way, when I was working signatures, Bitdefender didn't do that well at detecting non-PE malware. Perhaps it's changed now with the comeback of macro malware, but Avira, Sophos, and Eset usually detected doc, JS, html, etc. first. Regards, |
||||||||||||
|
|
|||||||||||||
|
jimimaseye
|
I actually run Avira on my home laptop as it happens. (I would have swapped to Bitdefender but there is a little more tailorability/user control with Avira than there is Bitdefender FREE home edition).
FYI: https://www.virustotal.com/en/file/ca8ee2783cdfe60ebcfbe1991ffbd952dc7c2bbab375b1e0f8f85b2a32d5a803/analysis/1455646006/ 3? months old https://www.virustotal.com/en/file/14aff6171866b62575af7f71febd172727503aef58182443d7ebdca11d61a458/analysis/1455646242/ 17 months old! https://www.virustotal.com/en/file/fcc639ddaf9b671fd1efdd70ad5a9358a18e9b3acd0e89f819a561933583c178/analysis/1455646471/ 2? months old. All were uploaded to Clam as viruses (after being tested on VT) by me at the time of receiving them. Can you imagine the damage done in 17 months by those reliant on Clam? This one: https://www.virustotal.com/en/file/1e9df8f10f5e9fc4cd48d79f3b58b01a44cd54ff1d57114227613700b898a996/analysis/1455646643/ received 15th January and STILL not detected by any of the signatures except SANESECURITY signatures (as a dangerous macro Doc) "Sanesecurity.Badmacro.Doc.badps1.UNOFFICIAL" |
||||||||||||
|
|
|||||||||||||
|
ROCKNROLLKID
|
Well, you can always write your won signatures and submit them to the Clam team. Not sure what there response time is for pushing community signatures. Mine has always been different. Sometimes a week, sometimes a day.
|
||||||||||||
|
|
|||||||||||||
|
jimimaseye
|
Well yes, its an option. IF...... a, you have the time and technical ability to do this. Most people, are just end users of such software b, you think that being the victim of a virus attack because it was not covered by your chosen anti-virus software is morally compensated by choosing to write a signature yourself so that OTHERS dont suffer and can benefit from your misery (assuming once you have been hit you still have and can identify the incoming seed for you to extract the info from, oh and that Clam actually receive and adapt your signature. Taking a week is just ridiculous, and 17 months (and counting...) is even worse) Personally, I dont fit either of the above profiles. I have no joy in wasting my time on the hope my signatures will help others whilst leaving my efforts at the mercy of a slack signature team/company, nor would I have a clue what to do even if I did. We are end users. I choose to use a dedicated team that provide signatures and software within a reasonable timeframe and with proven results (hence my use of 3rd party signatures for Clam and Bitdefender for the office clients) You dont go to the supermarket to buy some milk and get given a cow and an empty bottle and told to milk your own. |
||||||||||||||
|
|
|||||||||||||||
|
GuitarBob
|
I usually make a couple of signatures each day for myself based on a Sophos feed--old habits die hard. I delete the prior month sigs from the DB after a couple of weeks into the new month--assume either Clam has a sig or the malware is outdated by then. The Sane sigs should be good enough--they are developed by some dedicated people. The Clam AV sigs especially need some supplementation is in the non-PE stuff for us Windows users.
Regards, |
||||||||||||
|
|
|||||||||||||
|
ROCKNROLLKID
|
The signatures you are rely on (sanesecurity) are pretty much end users themselves. They write them on their spare time and no one gets paid, outside of donations. The same is with ClamWin and ClamAV.
It is actually quite easy to make a static signature at ClamAV. It is the bytecode ones that are time consuming. |
||||||||||||
|
|
|||||||||||||
|
jimimaseye
|
P.S For those that say "Clam is mainly written for use on Linux (and therefore understandably falls short on windows systems)...." ...I thought the linux world was proud and say that you dont get viruses on Linux and that windows is the most dangerous and targetted OS in the world. So what is the point of making an antivirus software dedicated to linux systems (which dont get viruses) and no signatures any good for windows that does? (I think the answer to Clams long-term existence is in that question.) |
||||||||||||||
|
|
|||||||||||||||
|
sanesecurity
|
Just a few FP updates:
1) I submitted a few FP's to the ClamAV team and most of them have now been fixed, mainly Win.Downloader.Kuluoz-36 2) The FP reporting page at ClamAV has now been fixed: https://www.clamav.net/reports/fp Concerning Sanesecurity signature generation: a) Some sigs are static hashes and generated automatically (hourly) (rogue.hdb) b) Some sigs are spam/malware domains found in my spam feed(s) and generated automatically (hourly) (blurl.ndb/jurlbl.ndb) c) Some sigs are manually generated (such as phish.ndb/badmacro.ndb and foxhole ones) Overall they should provide enough generic sigs to block stuff right from the start and if that doesn't block it, the automatic stuff should block the bad stuff at least hourly, which isn't too bad Cheers, Steve Sanesecurity.com |
||||||||||||
|
|
|||||||||||||
|
CraigJConrad
|
Well, I just got the first ClamWin scan report that reflects use of the SaneSecurity signatures. It reported nearly 400 problems -- all in files that have been there and stable for at least six months (some for eight years). The majority of them are Excel workbooks tagged with "Sanesecurity.Badmacro.Doc.admin.UNOFFICIAL FOUND". What is interesting is that nearly all of those are VBA macros for which I wrote 100% of the code. I'd be interested in knowing what I did in them that causes them to be marked as harmful. These macros do use Excel objects/services to read the directories, open/read/delete/create files, open/read/update MDBs, etc. Is that what leads to being tagged this way?
|
||||||||||||
|
|
|||||||||||||
| Sudden malware or false positives? |
|
||
|
Powered by phpBB © phpBB Group
Design by phpBBStyles.com | Styles Database.
Content © ClamWin Free Antivirus GNU GPL Free Software Open Source Virus Scanner. Free Windows Antivirus. Stay Virus Free with Free Software.
Design by phpBBStyles.com | Styles Database.
Content © ClamWin Free Antivirus GNU GPL Free Software Open Source Virus Scanner. Free Windows Antivirus. Stay Virus Free with Free Software.


