Sponsored Content
Special Forums Cybersecurity anti-spam virus package for Unix Post 3956 by Neo on Monday 16th of July 2001 12:29:33 AM
Old 07-16-2001
The way the UNIX OS is designed, viruses are not much of a problem (versus MS OS variations where viruses are very much a problem); hence you will not find much on UNIX viruses, nor should you worry about it very much.

For anti-spam, the built in anti-spam features in the new releases of sendmail work quite nicely.

Also, check of this IEEE paper on email bombs and countermeasures:

http://www.silkroad.com/papers/html/bomb/

 

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Anti Virus sw

Can anyone recommend Anti Virus sw for a ten user small business environment running Unix... ver? Thanks for the help (1 Reply)
Discussion started by: rpm
1 Replies

2. Shell Programming and Scripting

anti virus caller

Hi all. Iam using AVG antivirus personel edition, and i can only set it to run at one time only. Iam running it on a Win98 machine. is it possilbe to write a Perl script or c++ script to set it up to run at 12pm and 3pm and 6pm ??? (1 Reply)
Discussion started by: perleo
1 Replies

3. Ubuntu

What anti-virus to use with Ubuntu

Greetings I just installed Ubuntu 9 on my computer and need to know what anti-virus software to use. I have been using Avast anti-virus on my other comps for years and really like it. I have not tried it with Ubuntu yet but it says for Windows based systems. Any ideas are appreciated Thanks... (5 Replies)
Discussion started by: N5TDA
5 Replies

4. Linux

Linux Anti Virus

Can anyone tell the best free antivirus for Linux? I'm using RED HAT 9.0 & want to install antivirus for it. So if anyone has any suggestions of where to get that antivirus, that would be great! (2 Replies)
Discussion started by: billcrosby
2 Replies

5. Linux

Anti-virus Software Question For Linux

Greetings To All! I am new in supporting Linux and recently I was tasked to find out the following information and am not sure how to find the answers, hence this posting... I am running Redhat Enterprise Server 5.4 I realize this is a Redhat specific question, but it pertains to all of our... (7 Replies)
Discussion started by: Rob Sandifer
7 Replies
Scan(3pm)						User Contributed Perl Documentation						 Scan(3pm)

NAME
File::Scan - Perl extension for Scanning files for Viruses SYNOPSIS
use File::Scan; $fs = File::Scan->new([, OPTION ...]); $fs->set_callback( sub { my $filename = shift; my $bytes = shift; ... return("Callback Value"); } ); $fs->scan([FILE]); if(my $e = $fs->error) { print "$e "; } if(my $c = $fs->skipped) { print "file skipped ($c) "; } if($fs->suspicious) { print "suspicious file "; } if(my $res = $fs->callback) { print "$res "; } DESCRIPTION
This module is designed to allows users to scan files for known viruses. The purpose is to provide a perl module to make plataform independent virus scanners. METHODS
new([, OPTION ...]) This method create a new File::Scan object. The following keys are available: callback => 'subroutine reference' if the item is set then use a callback subroutine reference to provide extra information and functionalities. The callback subroutine have two arguments: filename and first 1024 bytes read from the file. This only work for binary files. extension => 'string' add the specified extension to the infected file move => 'directory' move the infected file to the specified directory copy => 'directory' copy the infected file to the specified directory mkdir => octal_number if the value is set to octal number then make the specified directories (example: mkdir => 0755). delete => 0 or 1 if the value is set to 1 delete the infected file max_txt_size => 'size in kbytes' scan only the text file if the file size is less then max_txt_size. The default value is 5120 kbytes. Set to 0 for no limit. max_bin_size => 'size in kbytes' scan only the binary file if the file size is less then max_bin_size. The default value is 10240 kbytes. Set to 0 for no limit. scan([FILE]) This method scan a file for viruses and return the name of virus if a virus is found. set_callback([SUBREF]) This method is another way to install a callback subroutine reference. Take a look in callback kay. skipped() This method return a code number if the file was skipped and 0 if not. The following skipped codes are available: 0 file not skipped 1 file is not vulnerable 2 file has zero size 3 the size of file is small 4 the text file size is greater that the 'max_txt_size' argument 5 the binary file size is greater that the 'max_bin_size' argument suspicious() This method return 1 if the file is suspicious and 0 if not. callback() This method return the result from the callback subroutine. error() This method return a error message if a error happens. AUTHOR
Henrique Dias <hdias@aesbuc.pt> CREDITS
Thanks to Rui de Castro, Sergio Castro, Ricardo Oliveira, Antonio Campelo, Branca Silveira, Helena Gomes and Anita Afonso for the help. Thanks to Fernando Martins for the personal collection of viruses. SEE ALSO
perl(1). perl v5.10.0 2009-07-19 Scan(3pm)
All times are GMT -4. The time now is 02:44 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy