ClamAV An Introduction PacNOG I Workshop June 21, 2005 Nadi, Fiji Hervey Allen.

Slides:



Advertisements
Similar presentations
Computers Software. Computer Layers Hardware BIOS Operating System Applications.
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 Anti Virus System i-Specific Anti-Virus Product.
'08 Rabat Why are we using FreeBSD? Scaleable Services Workshop AfNOG 2008 Rabat, Morocco slides by Hervey Allen presented by Joe Abley.
2004, Jei Nessus A Vulnerability Assessment tool A Security Scanner Information Networking Security and Assurance Lab National Chung Cheng University
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
Dr. José M. Reyes Álamo 1.  Course website  Syllabus posted.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Network Perimeter Security Yu Wang. Main Topics Border Router Firewall IPS/IDS VLAN SPAM AAA Q/A.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Towards Extending the Antivirus Capability to Scan Network Traffic Mohammed I. Al-Saleh Jordan University of Science and Technology.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Filtering with Open Source Software OLUG – June 7, 2005.
SECURITY OPEN SOURCE OPERATING SYSTEM. NESSUS The versatile Nessus® vulnerability scanner provides patch, configuration, and compliance auditing; mobile,
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
NSDI/NBII Clearinghouse Server Training Slide 1 NSDI/NBII Clearinghouse Server Training Yellowstone to Yukon Initiative 7. December University of.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Archiving Techniques Frank Klaproth EMANI – Project Meeting February 14 th - 16 th, 2002 Springer-Verlag Heidelberg Göttingen State and University Library.
Linux Operations and Administration
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Cosc 4750 Electronic Mail.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Shadow Security Scanner Li,Guorui. Introduction Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Norman Protection Powerful and flexible Protection Gateway.
INFSOM-RI Juelich, 10 June 2008 ETICS - Maven From competition, to collaboration.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 4 System Software. Software Programs that tell a computer what to do and how to do it. Sets of instructions telling computers to perform actions.
Install Software. UNIX Shell The UNIX/LINUX shell is a program important part of a Unix system. interface between the user & UNIX kernel starts running.
Server Operating System: Windows NT (Windows 2000) vs. Unix Zaiqun Pan August 2000.
Return to the PC Security web page Lesson 5: Dealing with Malware.
11/7/2007HDF and HDF-EOS Workshop XI, Landover, MD1 HDF5 Software Process MuQun Yang, Quincey Koziol, Elena Pourmal The HDF Group.
Developing software and hardware in parallel Vladimir Rubanov ISP RAS.
The Roadmap to New Releases Derek Wright Computer Sciences Department University of Wisconsin-Madison
Introduction to MySQL MySQL Overview by Ray Williams CS 320/565 Marymount University.
SpamAssassin An Introduction PacNOG I Workshop June 20, 2005 Nadi, Fiji Hervey Allen.
1 Anti Virus IBM i Anti-Virus Product. 2 Reality of Virus, Worms Malware.
Amit Warke Jerry Philip Lateef Yusuf Supraja Narasimhan Back2Cloud: Remote Backup Service.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Two Types of Software.
Software in the Data Protector Architecture
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
OPERATING SYSTEM BY KINSHUK RASTOGI. WHAT IS AN OPERATING SYSTEM? What is an operating system in the first place? An operating system is a software that.
XAMPP.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Welcome to Open Source Technology An Overview of Software By Afroz Hippargi, CIT, YASHADA, Pune.
ECMM6018 Enterprise Networking For Electronic Commerce Tutorial 1 Installing A Web Server.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Spamfilter Relay Mailserver Mark McSweeney CentraLUG, February 1, 2010.
BY: SALMAN 1.
Top 5 Open Source Firewall Software for Linux User
BY: SALMAN.
System Center 2012 Configuration Manager
Overview – SOE PatchTT November 2015.
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
ClamXav Antivirus Scanner: A Free Tool for Your Mac OS X
Cloud based Open Source Backup/Restore Tool
Lecture 13 RPM and its advantages.
Getting Started ARCS Lab..
Chap 10 Malicious Software.
Chapter 4: Threads.
Chap 10 Malicious Software.
Presentation transcript:

ClamAV An Introduction PacNOG I Workshop June 21, 2005 Nadi, Fiji Hervey Allen

What is it? From Clam AntiVirus is a GPL anti-virus toolkit for UNIX. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi- threaded daemon, a command line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use with your own software. Most importantly, the virus database is kept up to date.

ClamAV – Key Features Based on: ● Command-line scanner ● Multi-threaded daemon ● milter interface for sendmail ● Database updater with support for digital signatures ● Virus scanner C library ● On-access scanning (Linux and FreeBSD) ● Detection of over viruses, worms and trojans ● Built-in support for RAR (2.0), Zip, Gzip, Bzip2, Tar, MS OLE2, MS Cabinet files, MS CHM (Compressed HTML) ● Built-in support for mbox, Maildir and raw mail files

ClamAV quick facts ● Virus database is updated (average) multiple times per week. ● End-users can submit samples directly: ● Will detect phishing as malware if you wish. ● freshclam daemon runs to keep virus definition up-to-date. ● ClamAV mailing list available:

Supported platforms OSes ● Linux ● Solaris ● FreeBSD ● OpenBSD ● NetBSD ● AIX ● Mac OS X ● Cygwin B20 Hardware – Intel – Alpha – Sparc – Cobalt MIPS boxes – PowerPC – RISC 6000

Where does it fit with Exim? Check for viruses after you've done: – Blacklists – Whitelists – Content-based solution (like SpamAssassin) Final action is up to you, but generally you'll deny any mail that's detected as having a virus. You'll do this in the acl_check_data ACL in the Exim configure file.

More resources ● ClamAV online specimen scanner: – ● ClamAV main site: – ● The ClamAV FAQ: – ● The AmaViS (A Mail Virus Scanner) Project. An alternative to ClamAV: –