Sponsored Content
The Lounge What is on Your Mind? The ISS has upgraded to Linux Post 302888655 by Perderabo on Sunday 16th of February 2014 12:28:19 PM
Old 02-16-2014
The ISS has upgraded to Linux

Remember this thread from a few years ago? What a difference just a few years make!

Those laptops I mentioned were running Windows. Then one of the Russians got an infected thumb drive. It infected his laptop and spread throughout the ISS. NASA ordered a switch to Linux to ensure that it doesn't happen again. The switch has been completed and now Linux is the only OS in operation aboard the ISS. This sounds like a plot from a movie, but it really happened.
These 2 Users Gave Thanks to Perderabo For This Post:
 

7 More Discussions You Might Find Interesting

1. Cybersecurity

ISS screws up.

Seems that security company ISS who brought us products such as BlackICE defender, released to the public, information concerning a vulnerability in apache that effects all versions on all platforms before telling the developers at Apache about it. This forced the people at Apache to work quickly... (1 Reply)
Discussion started by: ThePreacher
1 Replies

2. Solaris

Sol10 upgraded from 5.8 - shell issues?

I'm having issues after upgrading to Sol10 from 8. I have developers who have ksh scripts which execute profiles and such. I get errors from "/dev/null: cannon create" to "stty:no such device or address", to "bad string", etc. I have checked the link to /dev/null (its fine). I have a case open with... (1 Reply)
Discussion started by: buffsluft
1 Replies

3. Programming

Getting the random failure after upgraded the gcc version 3.1 to 3.4.6

I am getting the a random failure after upgrading the gcc version 3.1 to 3.4.6. My code where it is failing contains some STL and shared memory concepts.It is perfectly working on old version of gcc.I want to know what are possible causes that made this random error after upgrading gcc 3.4.6. (2 Replies)
Discussion started by: kapilkumawat
2 Replies

4. OS X (Apple)

upgraded to OSX 10.6.6 - cannot sudo

I've been using "sudo" inside Terminal. I just upgraded to 10.6.6 and now "sudo" gives me incorrect password errors. My user is an admin user, so i can install etc on GUI but unable to do anything in terminal. 1. I did a repair permissions and restarted but cannot sudo. 2. i had an... (0 Replies)
Discussion started by: sentinel
0 Replies

5. What is on Your Mind?

Tapatalk Upgraded

Hello, FYI, I upgraded our Tapatalk Version to version 4.8.1 today (from version 4.3.2). All seem to be OK but we never know! Please post in this thread if you see any problems after the upgrade. Thanks! (1 Reply)
Discussion started by: Neo
1 Replies

6. Solaris

Upgraded BIOS - cannot see Solaris partition??

I have recently upgraded my Supermicro X10SAT motherboard. I have also a SSD with a Windows10 partition and a Solaris 11.3 partition. Upon boot I press F11 and choose which partition I want to boot into. But after the bios upgrade, I cannot see the Solaris partition when I press "F11" to choose... (9 Replies)
Discussion started by: kebabbert
9 Replies

7. What is on Your Mind?

Cut Over to New Data Center and Upgraded OS Done. :)

Three days ago we received an expected notice from our long time data center that they were going dark on Sept 12th. About one and a half hours ago, after three days of marathon work, I just cut over the unix.com to a new data center with a completely new OS and Ubuntu distribution. (22 Replies)
Discussion started by: Neo
22 Replies
ClamAV::Client(3pm)					User Contributed Perl Documentation				       ClamAV::Client(3pm)

NAME
ClamAV::Client - A client class for the ClamAV "clamd" virus scanner daemon VERSION
0.11 SYNOPSIS
Creating a scanner client use ClamAV::Client; # Try using socket options from clamd.conf, or use default socket: my $scanner = ClamAV::Client->new(); # Use a local Unix domain socket: my $scanner = ClamAV::Client->new( socket_name => '/var/run/clamav/clamd.ctl' ); # Use a TCP socket: my $scanner = ClamAV::Client->new( socket_host => '127.0.0.1', socket_port => 3310 ); die("ClamAV daemon not alive") if not defined($scanner) or not $scanner->ping(); Daemon maintenance my $version = $scanner->version; # Retrieve the ClamAV version string. $scanner->reload(); # Reload the malware pattern database. $scanner->quit(); # Terminates the ClamAV daemon. $scanner->shutdown(); # Likewise. Path scanning (lazy) # Scan a single file or a whole directory structure, # and stop at the first infected file: my ($path, $result) = $scanner->scan_path($path); my ($path, $result) = $scanner->scan_path( $path, ClamAV::Client::SCAN_MODE_NORMAL ); my ($path, $result) = $scanner->scan_path( $path, ClamAV::Client::SCAN_MODE_RAW ); Path scanning (complete) # Scan a single file or a whole directory structure, # and scan all files without stopping at the first infected one: my %results = $scanner->scan_path_complete($path); while (my ($path, $result) = each %results) { ... } Other scanning methods # Scan a stream, i.e. read from an I/O handle: my $result = $scanner->scan_stream($handle); # Scan a scalar value: my $result = $scanner->scan_scalar($value); DESCRIPTION
ClamAV::Client is a class acting as a client for a ClamAV "clamd" virus scanner daemon. The daemon may run locally or on a remote system as ClamAV::Client can use both Unix domain sockets and TCP/IP sockets. The full functionality of the "clamd" client/server protocol is supported. Constructor The following constructor is provided: new(%options): RETURNS ClamAV::Client Creates a new "ClamAV::Client" object. If no socket options are specified, first the socket options from the local "clamd.conf" configuration file are tried, then the Unix domain socket "/var/run/clamav/clamd.ctl" is tried, then finally the TCP/IP socket at 127.0.0.1 on port 3310 is tried. If either Unix domain or TCP/IP socket options are explicitly specified, only these are used. %options is a list of key/value pairs representing any of the following options: socket_name A scalar containing the absolute name of the local Unix domain socket. Defaults to '/var/run/clamav/clamd.ctl'. socket_host A scalar containing the name or IP address of the TCP/IP socket. Defaults to '127.0.0.1'. socket_port A scalar containing the port number of the TCP/IP socket. Defaults to 3310. Instance methods The following instance methods are provided: Daemon maintenance ping: RETURNS SCALAR; THROWS ClamAV::Client::Error Returns true ('PONG') if the ClamAV daemon is alive. Throws a ClamAV::Client::Error exception otherwise. version: RETURNS SCALAR; THROWS ClamAV::Client::Error Returns the version string of the ClamAV daemon. reload: RETURNS SCALAR; THROWS ClamAV::Client::Error Instructs the ClamAV daemon to reload its malware database. Returns true if the reloading succeeds, or throws a ClamAV::Client::Error exception otherwise. quit: RETURNS SCALAR; THROWS ClamAV::Client::Error shutdown: RETURNS SCALAR; THROWS ClamAV::Client::Error Terminates the ClamAV daemon. Returns true if the termination succeeds, or throws a ClamAV::Client::Error exception otherwise. scan_path($path): RETURNS SCALAR, SCALAR; THROWS ClamAV::Client::Error scan_path($path, $scan_mode): RETURNS SCALAR, SCALAR; THROWS ClamAV::Client::Error Scans a single file or a whole directory structure, and stops at the first infected file found. The specified path must be absolute. A scan mode may be specified: a mode of ClamAV::Client::SCAN_MODE_NORMAL (which is the default) causes a normal scan ("SCAN") with archive support enabled, a mode of ClamAV::Client::SCAN_MODE_RAW causes a raw scan with archive support disabled. If an infected file is found, returns a list consisting of the path of the file and the name of the malware signature that matched the file. Otherwise, returns the originally specified path and undef. scan_path_complete($path): RETURNS HASH; THROWS ClamAV::Client::Error Scans a single file or a whole directory structure completely, not stopping at the first infected file found. The specified path must be absolute. Only the normal, non-raw mode is supported for complete scans by ClamAV. Returns a hash with a list of infected files found, with the file paths as the keys and the matched malware signature names as the values. scan_stream($handle): RETURNS SCALAR; THROWS ClamAV::Client::Error Scans a stream, that is, reads from an I/O handle. If the stream is found to be infected, returns the name of the matching malware signature, undef otherwise. scan_scalar($value): RETURNS SCALAR; THROWS ClamAV::Client::Error Scans the value referenced by the given scalarref. If the value is found to be infected, returns the name of the matching malware signature, undef otherwise. SEE ALSO
The clamd and clamav man-pages. AVAILABILITY and SUPPORT The latest version of ClamAV::Client is available on CPAN and at http://www.mehnle.net/software/clamav-client <http://www.mehnle.net/software/clamav-client>. Support is usually (but not guaranteed to be) given by the author, Julian Mehnle <julian@mehnle.net>. AUTHOR and LICENSE ClamAV::Client is Copyright (C) 2004-2005 Julian Mehnle <julian@mehnle.net>. ClamAV::Client is free software. You may use, modify, and distribute it under the same terms as Perl itself, i.e. under the GNU GPL or the Artistic License. perl v5.14.2 2012-01-17 ClamAV::Client(3pm)
All times are GMT -4. The time now is 07:56 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy