GuitarBob
Joined: 09 Jul 2006 |
Posts: 9 |
Location: USA |
|
 |
Posted: Sun Sep 23, 2007 1:57 am |
|
 |
 |
 |
 |
Does anyone know whether or not the Clam AV team has compliled/enabled all the experimental scanning options from Version 0.90 in their code now and if they are available to us ClamWin users?
Regards,
|
|
sherpya
Joined: 22 Mar 2006 |
Posts: 0 |
Location: Italy |
|
 |
Posted: Mon Sep 24, 2007 6:50 am |
|
 |
 |
 |
 |
latest experimental stuff are not usable right now,
javascript parser doesn't compile
detect-pua (possible unwanted applications) has no use right
now because there are no signature at this time
you can find recent snapshot of development releases here:
https://oss.netfarm.it/clamav/ https://oss.netfarm.it/clamav/
they are clamav cmd line port without clamwin, perhaps using them in place of stables
should work fine (but not suggested), pls remember that doing this
you will not be able to use clamwin incremental udate for the next release
|
|
GuitarBob
Joined: 09 Jul 2006 |
Posts: 9 |
Location: USA |
|
 |
Posted: Mon Sep 24, 2007 11:49 am |
|
 |
 |
 |
 |
Thanks for the info.
The PUA does seem to be working. Another poster here got upset in a thread because Jotti's Linux Clam version spotted a PUA in a file he uploaded which his copy of ClamWin didn't. I looked into it and set the PUA option in my ClamWin (--detect-pua). It kicked in yesterday in an anti-rootkit I scanned. Interestingly, Clam and four other small AVs on Jotti recognized it, but none of the big AVs there. So Jotti is using it, but VirusTotal isn't using it yet.
Regards,
|
|