9 More Discussions You Might Find Interesting
1. Hardware
Running Debian 8.5 on a Dell Laptop
I have an Epson V39 scanner. Simple scan cannot detect it.
Here is what I have:
root@server1:/home/server1# sane-find-scanner
# sane-find-scanner will now attempt to detect your scanner. If the
# result is different from what you expected, first... (2 Replies)
Discussion started by: Meow613
2 Replies
2. Ubuntu
Hi, somewhat of a newbie with Linux, although I have been at it for about three weeks now.
Is there a way to wake up or initialize my scanner with a command in the terminal? (6 Replies)
Discussion started by: klrman
6 Replies
3. Red Hat
Hey guys..
What is the best tool that can be used on Linux for IP scanning tool that can bring ping status, hostname, and any other open service. I wish I can find a tool like "The Dude" from Mikrotik, but that works only under Windows.
Thanks (4 Replies)
Discussion started by: leo_ultra_leo
4 Replies
4. Linux
epson microfilm 500 scsi:
Is there any way to make this work under linux ? I'm using pclinuxos, it shows the machine in the device panel as sg2 and lists the machine , so Im guessing the kernel knows what it is, but I can't view it as a scanner or capture or input device . What catagory does... (4 Replies)
Discussion started by: tom1200
4 Replies
5. UNIX for Dummies Questions & Answers
I have multiple web sites and have SSI all working fine! but I want a script that allows me to place a SSI script (or .html) on any web site within my server - One problem, SSI is limited to files located within the file structure - I want to access a file outside, (but still on my server) I found... (1 Reply)
Discussion started by: johnzule
1 Replies
6. Boot Loaders
hey,
I've done a lot of searching on the internet and I can't seem to find anything that answers this question. All I'm finding are old post from 2005 where it didn't have support for it. So does grub currently have support for booting from a disk with the Unix file system? (4 Replies)
Discussion started by: neur0n
4 Replies
7. Shell Programming and Scripting
Just started to create my own small content scanner that searches all the visible files on my server, but now I got stuck. It should be used to scan the files for phrases like in the following example.
What I tried is the following code:
#!/bin/bash
find /home/userid*/public_html/ -size... (18 Replies)
Discussion started by: medic
18 Replies
8. Solaris
anyone know of a FREE logfile checker that they would recommend?
looking to scan thru syslog, sulog, messages, etc... looking for security type related entries., thanks,
brian (1 Reply)
Discussion started by: BG_JrAdmin
1 Replies
9. UNIX for Dummies Questions & Answers
I'm Presently Writting A College Report On Operating Systems, Not Enjoying It Very Much.
I Was Hoping Someone Could Direct Me To A Site Where I Could Get Information Such As The Role Of Operating Systems, Types Of Operating Systems (Multi-User Multi-Tasking etc), Modes Of Operating systems... (3 Replies)
Discussion started by: OSNovice
3 Replies
LEARN ABOUT DEBIAN
clamav::client
ClamAV::Client(3pm) User Contributed Perl Documentation ClamAV::Client(3pm)
NAME
ClamAV::Client - A client class for the ClamAV "clamd" virus scanner daemon
VERSION
0.11
SYNOPSIS
Creating a scanner client
use ClamAV::Client;
# Try using socket options from clamd.conf, or use default socket:
my $scanner = ClamAV::Client->new();
# Use a local Unix domain socket:
my $scanner = ClamAV::Client->new(
socket_name => '/var/run/clamav/clamd.ctl'
);
# Use a TCP socket:
my $scanner = ClamAV::Client->new(
socket_host => '127.0.0.1',
socket_port => 3310
);
die("ClamAV daemon not alive")
if not defined($scanner) or not $scanner->ping();
Daemon maintenance
my $version = $scanner->version;
# Retrieve the ClamAV version string.
$scanner->reload(); # Reload the malware pattern database.
$scanner->quit(); # Terminates the ClamAV daemon.
$scanner->shutdown(); # Likewise.
Path scanning (lazy)
# Scan a single file or a whole directory structure,
# and stop at the first infected file:
my ($path, $result) = $scanner->scan_path($path);
my ($path, $result) = $scanner->scan_path(
$path, ClamAV::Client::SCAN_MODE_NORMAL );
my ($path, $result) = $scanner->scan_path(
$path, ClamAV::Client::SCAN_MODE_RAW );
Path scanning (complete)
# Scan a single file or a whole directory structure,
# and scan all files without stopping at the first infected one:
my %results = $scanner->scan_path_complete($path);
while (my ($path, $result) = each %results) { ... }
Other scanning methods
# Scan a stream, i.e. read from an I/O handle:
my $result = $scanner->scan_stream($handle);
# Scan a scalar value:
my $result = $scanner->scan_scalar($value);
DESCRIPTION
ClamAV::Client is a class acting as a client for a ClamAV "clamd" virus scanner daemon. The daemon may run locally or on a remote system
as ClamAV::Client can use both Unix domain sockets and TCP/IP sockets. The full functionality of the "clamd" client/server protocol is
supported.
Constructor
The following constructor is provided:
new(%options): RETURNS ClamAV::Client
Creates a new "ClamAV::Client" object. If no socket options are specified, first the socket options from the local "clamd.conf"
configuration file are tried, then the Unix domain socket "/var/run/clamav/clamd.ctl" is tried, then finally the TCP/IP socket at
127.0.0.1 on port 3310 is tried. If either Unix domain or TCP/IP socket options are explicitly specified, only these are used.
%options is a list of key/value pairs representing any of the following options:
socket_name
A scalar containing the absolute name of the local Unix domain socket. Defaults to '/var/run/clamav/clamd.ctl'.
socket_host
A scalar containing the name or IP address of the TCP/IP socket. Defaults to '127.0.0.1'.
socket_port
A scalar containing the port number of the TCP/IP socket. Defaults to 3310.
Instance methods
The following instance methods are provided:
Daemon maintenance
ping: RETURNS SCALAR; THROWS ClamAV::Client::Error
Returns true ('PONG') if the ClamAV daemon is alive. Throws a ClamAV::Client::Error exception otherwise.
version: RETURNS SCALAR; THROWS ClamAV::Client::Error
Returns the version string of the ClamAV daemon.
reload: RETURNS SCALAR; THROWS ClamAV::Client::Error
Instructs the ClamAV daemon to reload its malware database. Returns true if the reloading succeeds, or throws a ClamAV::Client::Error
exception otherwise.
quit: RETURNS SCALAR; THROWS ClamAV::Client::Error
shutdown: RETURNS SCALAR; THROWS ClamAV::Client::Error
Terminates the ClamAV daemon. Returns true if the termination succeeds, or throws a ClamAV::Client::Error exception otherwise.
scan_path($path): RETURNS SCALAR, SCALAR; THROWS ClamAV::Client::Error
scan_path($path, $scan_mode): RETURNS SCALAR, SCALAR; THROWS ClamAV::Client::Error
Scans a single file or a whole directory structure, and stops at the first infected file found. The specified path must be absolute.
A scan mode may be specified: a mode of ClamAV::Client::SCAN_MODE_NORMAL (which is the default) causes a normal scan ("SCAN") with
archive support enabled, a mode of ClamAV::Client::SCAN_MODE_RAW causes a raw scan with archive support disabled.
If an infected file is found, returns a list consisting of the path of the file and the name of the malware signature that matched the
file. Otherwise, returns the originally specified path and undef.
scan_path_complete($path): RETURNS HASH; THROWS ClamAV::Client::Error
Scans a single file or a whole directory structure completely, not stopping at the first infected file found. The specified path must
be absolute. Only the normal, non-raw mode is supported for complete scans by ClamAV.
Returns a hash with a list of infected files found, with the file paths as the keys and the matched malware signature names as the
values.
scan_stream($handle): RETURNS SCALAR; THROWS ClamAV::Client::Error
Scans a stream, that is, reads from an I/O handle. If the stream is found to be infected, returns the name of the matching malware
signature, undef otherwise.
scan_scalar($value): RETURNS SCALAR; THROWS ClamAV::Client::Error
Scans the value referenced by the given scalarref. If the value is found to be infected, returns the name of the matching malware
signature, undef otherwise.
SEE ALSO
The clamd and clamav man-pages.
AVAILABILITY and SUPPORT
The latest version of ClamAV::Client is available on CPAN and at http://www.mehnle.net/software/clamav-client
<http://www.mehnle.net/software/clamav-client>.
Support is usually (but not guaranteed to be) given by the author, Julian Mehnle <julian@mehnle.net>.
AUTHOR and LICENSE
ClamAV::Client is Copyright (C) 2004-2005 Julian Mehnle <julian@mehnle.net>.
ClamAV::Client is free software. You may use, modify, and distribute it under the same terms as Perl itself, i.e. under the GNU GPL or the
Artistic License.
perl v5.14.2 2012-01-17 ClamAV::Client(3pm)