Virus

Do I have virus in my ipad mini?

Johnathan Burger wrote:
DId you sneeze on it?
That's the only way you get a virus on any iOS device.
Well there is always touching door knobs and stairwell banisters after an infected person. But maybe that only applies to Android users

Similar Messages

  • When i login to yahoo, my first click results in the spinning wheel. Could i have a virus Or why does it only happen when i login to yahoo?

    When i login to yahoo, my first click results in the spinning wheel. Could i have a virus? Or why does it only happen when i login to yahoo?

    Firefox allows to select part of a word. You can select a word with a double click and use Shift + left click to set the end of the selection, so you need to click at the end of the last word instead of in it.

  • Flash Player para de funcinar ao desinstalar o anti-virus

    Comprei um computador que veio com o McAfee para testar por um mes, como nao pretendia usar este anti-virus desinstalei ele para colocar outro, so que apos desinstala-lo o flash player parou de funcionar no internet explorer e o gadget do windows tambem, ele ficou somente um ponto borrado na tela com a opcao de fechar.
    Fiz a instalacao e desinstalacao do flash player varias vezes, mas nao resolveu nada, tentei ate deletar alguns arquivos na pasta do windows/macromed/flash, mas tambem nao resolveu, o unico jeito foi restaurar o sistema para antes de tirar o anti virus, quando fiz isso o flash voltou a funcionar normalmente.
    Agora preciso saber como tirar esse anti-virus e deixar o flash funcionando. Obs.: meu sistema e windows 7 home premium 64bits

    Os artigos a seguir podem ajudar: 
    http://translate.googleusercontent.com/translate_c?hl=en&ie=UTF8&prev=_t&rurl=translate.go ogle.com&sl=auto&tl=pt&twu=1&u=http://forums.adobe.com/thread/885448&usg=ALkJrhhAntqPVtNrC pH8aTjX0ph5XA-iXA
    http://translate.googleusercontent.com/translate_c?hl=en&ie=UTF8&prev=_t&rurl=translate.go ogle.com&sl=auto&tl=pt&twu=1&u=http://forums.adobe.com/thread/867968&usg=ALkJrhgNp7GsrUGy9 EdrdfmuIi_y-jB_jw
    The following articles may help:
    http://forums.adobe.com/thread/867968
    http://forums.adobe.com/thread/885448

  • Virus TI au and vst plugin in logic 8

    i've seen two cases where it causes massive crashes and lock ups. i hope access and apple fix this ASAP. it's really ******* my friends off...

    With the 2.5 beta my Virus TI behaves like that in Logic 7.2 aswell, so I'm afraid this is not a problem for Apple to fix, rather Access Music.
    The 2.5 beta update have helped in alot of areas, but it still freezes my computer up from time to time when launching the plugin.

  • Will it harm my Mac if I download the Graboid Video? Does it contain a virus or something like that?

    If you are using this program will you let me know if it is safe or not? I'll look forward for your answers.

    There's no virus in graboid.  I downloaded this some weeks ago to try it out but like all .pkg's I don't necessarily trust I didn't install it but use Pacifist to see what the installer would install and extract the desired parts.
    The GraboidVideoMac.app is really all I needed from the installer.  The installer tries to install it's own par2, unrar, and an older VLC.app (1.0.3, VLC is up to 1.1.12).  I didn't want this stuff installed since I already have these things in my desired places. 
    You have to set up an account which you can do from the GraboidVideoMac.app.  Problem is the amount you can download is limited (2 Megs I think).  After that you need to pay.  Screw that.  So I just forgot all about using it.

  • I ran a virus/trojan fix and this is what it said it could not repair something in the main library core or something like that.  What do I do?  The problem seems to be with safari?

    I ran a virus/trojan fix and this is what it said it could not repair something in the main library core or something like that.  What do I do?  The problem seems to be with safari?

    I ran the utility disk and this is what it said.
    Warning permission differ Applications/Safari drwxr-xrx they are -rwxr-xr system/livrary Cores has been modified and will not be repaired.
    Permission apllication differ on System/livrary/Pr or could be -rw-r--r-- they are rwxr-xr-x Application/iTune be droxr-xr-x they are rwxr-xr-x
    Then I hit fix permissions and it said this
    Warning SUID file Systm/Library/Core has been modified will not be repaired
    I also downloaded Bitdefender Virus Scanner and it found nothing.

  • Could this be a Mail virus or something like it?

    Just received an e-mail as follows:
    From: Mail Delivery Subsystem <[email protected]>
    Subject: Returned Mail: User unknown
    Date: November 27, 2005 10:41:55 AM AKST
    To: (my e-mail address here)
    The message indicates that the mail was returned to me because there was a problem with the delivery (The following addresses had permanent fatal errors..."):
    That paragraph is followed by a batch of 17 e-mail addresses, each with a user name beginning with the letters "p" and the letter "d," but every one of them addresses @ aol.com
    The Remote for each e-mail was: Remote-MTA: DNS; air-yc01.mail.aol.com
    X-Mailer Microsoft-Outlook-Express-Macintosh-Edition/5.02.2002
    Please note that I have never used Outlook Express. In fact, I don't think it's installed on my Mac. Also, here is where I think the problem is at:
    Reply-To-"PEA" <(my e-mail address is shown in here)>
    From: "Peabody" <(my e-mail address again shown in here)>
    Does it mean that somebody used my e-mail addressfor mass e-mail, or is it a virus? Nobody has my e-mail address, except for a couple of friends, and I have never answered to anybody I don't know personally.

    Not a virus since there are no viruses that currently affect OS X which has been available for 5 years.
    Please note that I have never used Outlook Express. In fact, I don't think it's
    installed on my Mac.
    OE for Macs is an OS 9 application which if installed on your Mac, would require OS 9 to be installed to run the Classic environment under OS X.
    A spammer is using your email address to appear as the sending address for their bulk spam mailings.

  • A tab popped up wich said Mozzilla Security, the web page seemed to scan my computer, stated it was infested with several viruses, and that I should download protection immediatly. Is this legit?

    A new tab opened up on my tool bar labeled Mozilla Security. The website looks like your security warning. But the security button is gray, McAfee doesn't recognize the site, and the web address does not contain Mozilla.com. The web address of this pop up page is: http://update89.modyett.co.be/index.php?Q57hGtS5bW5G7Hr+M0lEZy4rE7T40TcfocDyRAcjpCPVLS/PhAEpv1Hgq9vgx1qxsLunLyiXHnwwL5T3qX/CE0Q/ZRXJp+2mKYsC+kRq
    Do I have a virus, as it states, or is this uninvited web page trying to install a virus? What should I do?

    Just because it said Mozilla Security in the title bar does not mean it is from Mozilla as Mozilla nor the Firefox browser has ever done such a thing.
    This sounds like one of those fake animated scanners which claims it is scanning your computer and then says you are infected with such and such. It then suggests to download something that will be what really infects your computer if using Windows. As long as you did not download and install this whatever.exe then you should be safe. Though you may want to scan your computer with whatever antivirus software you have with updated definitions just to be safer.
    This sort of thing is even more obvious on being fake when Linux and Mac users can encounter these pages.

  • Could I have windows update virus on my macbook pro?

    Since last week I have suddenly had what I think must be a virus where a message suddenly flashes up telling me that my java is out of date or that windows "has detected you need to update winupdate videos" and starts a countdown with no option to cancel or delete so I have to exit safari. It seems to happen most frequently when I'm on AOL. I've downloaded avast but that doesn't seem to be finding it and I've checked for software updates in case there is a patch but there are no software updates apparently. Anyone else had this? Got any ideas?

    Beth Martin wrote:
    Thanks that is helpful. I actually have OS X 10.6.8
    Well that does change things a bit.  You probably know by now that Apple has terminated support for Snow Leopard and did not provide an earlier update for Java 6 and just this week failed to provide a Security Update.  It probably won't take long for malware developers to start attacking SL vulnerabilities as we've seen in the past with older versions of MicroSoft Word (for example) and I'm sure we will see when Windows XP reaches end-of-life in April.  So you need to start thinking about an OS X upgrade.
    I just went looking for a browser extension that blocks ads - any recommendations?
    I agree with Network 23 on AdBlock. Either ClickToFlash or ClickToPlugin (don't use both & I use the latter since it does more) will result in faster browsing, reduced fan usage, and increased battery life.

  • Could I have a virus

    Well - having had a virus myself all Christmas I am wondering whether my Mac also has one. This morning, before heading back home, my son (a complete mac head) decided that I should have the most up to date flash player downloaded onto my imac. Did a repair disk permissions following this. I was then using Firefox on the highways agency website when everything froze and I had to force quit. Both Safari and Firefox now seem to have slowed right down and when quitting Firefox a few minutes ago found a popup on my desktop. This was again after quitting the highways agency traffic information website. This has never happened before.
    Is there a possibility that when downloading the flash player my son also downloaded something else as well. I think he downloaded it from macupdate.com.
    In any case, is there any way I can check if something is amiss or can anyone recommend a virus scanner?
    Thanks
    Ann

    I think a virus is unlikely. If the version he installed is the one listed here:
    http://search.macupdate.com/search.php?keywords=flash&os=mac
    it is a beta version.
    You could uninstall it using this link: http://kb2.adobe.com/cps/141/tn_14157.html
    then download the latest stable version following this link:
    http://get.adobe.com/flashplayer/otherversions/

  • ClamAV fails to scan for viruses in emails [CLAWS MAIL]

    I've recently switched from Thunderbird to Claws Mail and ran into one small, but annoying, problem.
    I want to use ClamAV + the clamav extension for claws mail to scan for viruses, however it does seem to have permission problems.
    clamd is running, user and group clamav all have the relevant permissions as far as I can tell, however upon scanning my mail, I always end up with the following error:
    Scanning error:
    /home/username/.claws-mail/mimetmp/0000000e.mimetmp: lstat() failed: Permission denied. ERROR
    Here's my clamd.conf:
    ## Please read the clamd.conf(5) manual before editing this file.
    # Comment or remove the line below.
    #Example
    # Uncomment this option to enable logging.
    # LogFile must be writable for the user running daemon.
    # A full path is required.
    # Default: disabled
    LogFile /var/log/clamav/clamd.log
    # By default the log file is locked for writing - the lock protects against
    # running clamd multiple times (if want to run another clamd, please
    # copy the configuration file, change the LogFile variable, and run
    # the daemon with --config-file option).
    # This option disables log file locking.
    # Default: no
    #LogFileUnlock yes
    # Maximum size of the log file.
    # Value of 0 disables the limit.
    # You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
    # and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
    # in bytes just don't use modifiers.
    # Default: 1M
    #LogFileMaxSize 2M
    # Log time with each message.
    # Default: no
    LogTime yes
    # Also log clean files. Useful in debugging but drastically increases the
    # log size.
    # Default: no
    #LogClean yes
    # Use system logger (can work together with LogFile).
    # Default: no
    #LogSyslog yes
    # Specify the type of syslog messages - please refer to 'man syslog'
    # for facility names.
    # Default: LOG_LOCAL6
    #LogFacility LOG_MAIL
    # Enable verbose logging.
    # Default: no
    #LogVerbose yes
    # Log additional information about the infected file, such as its
    # size and hash, together with the virus name.
    #ExtendedDetectionInfo yes
    # This option allows you to save a process identifier of the listening
    # daemon (main thread).
    # Default: disabled
    PidFile /run/clamav/clamd.pid
    # Optional path to the global temporary directory.
    # Default: system specific (usually /tmp or /var/tmp).
    TemporaryDirectory /tmp
    # Path to the database directory.
    # Default: hardcoded (depends on installation options)
    DatabaseDirectory /var/lib/clamav
    # Only load the official signatures published by the ClamAV project.
    # Default: no
    OfficialDatabaseOnly yes
    # The daemon can work in local mode, network mode or both.
    # Due to security reasons we recommend the local mode.
    # Path to a local socket file the daemon will listen on.
    # Default: disabled (must be specified by a user)
    LocalSocket /var/lib/clamav/clamd.sock
    # Sets the group ownership on the unix socket.
    # Default: disabled (the primary group of the user running clamd)
    LocalSocketGroup clamav
    # Sets the permissions on the unix socket to the specified mode.
    # Default: disabled (socket is world accessible)
    #LocalSocketMode 660
    # Remove stale socket after unclean shutdown.
    # Default: yes
    #FixStaleSocket yes
    # TCP port address.
    # Default: no
    #TCPSocket 3310
    # TCP address.
    # By default we bind to INADDR_ANY, probably not wise.
    # Enable the following to provide some degree of protection
    # from the outside world.
    # Default: no
    #TCPAddr 127.0.0.1
    # Maximum length the queue of pending connections may grow to.
    # Default: 200
    #MaxConnectionQueueLength 30
    # Clamd uses FTP-like protocol to receive data from remote clients.
    # If you are using clamav-milter to balance load between remote clamd daemons
    # on firewall servers you may need to tune the options below.
    # Close the connection when the data size limit is exceeded.
    # The value should match your MTA's limit for a maximum attachment size.
    # Default: 25M
    #StreamMaxLength 10M
    # Limit port range.
    # Default: 1024
    #StreamMinPort 30000
    # Default: 2048
    #StreamMaxPort 32000
    # Maximum number of threads running at the same time.
    # Default: 10
    #MaxThreads 20
    # Waiting for data from a client socket will timeout after this time (seconds).
    # Default: 120
    #ReadTimeout 300
    # This option specifies the time (in seconds) after which clamd should
    # timeout if a client doesn't provide any initial command after connecting.
    # Default: 5
    #CommandReadTimeout 5
    # This option specifies how long to wait (in miliseconds) if the send buffer is full.
    # Keep this value low to prevent clamd hanging
    # Default: 500
    #SendBufTimeout 200
    # Maximum number of queued items (including those being processed by MaxThreads threads)
    # It is recommended to have this value at least twice MaxThreads if possible.
    # WARNING: you shouldn't increase this too much to avoid running out of file descriptors,
    # the following condition should hold:
    # MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual max is 1024)
    # Default: 100
    #MaxQueue 200
    # Waiting for a new job will timeout after this time (seconds).
    # Default: 30
    #IdleTimeout 60
    # Don't scan files and directories matching regex
    # This directive can be used multiple times
    # Default: scan all
    #ExcludePath ^/proc/
    #ExcludePath ^/sys/
    # Maximum depth directories are scanned at.
    # Default: 15
    #MaxDirectoryRecursion 20
    # Follow directory symlinks.
    # Default: no
    #FollowDirectorySymlinks yes
    # Follow regular file symlinks.
    # Default: no
    #FollowFileSymlinks yes
    # Scan files and directories on other filesystems.
    # Default: yes
    #CrossFilesystems yes
    # Perform a database check.
    # Default: 600 (10 min)
    #SelfCheck 600
    # Execute a command when virus is found. In the command string %v will
    # be replaced with the virus name.
    # Default: no
    #VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v"
    # Run as another user (clamd must be started by root for this option to work)
    # Default: don't drop privileges
    User clamav
    # Initialize supplementary group access (clamd must be started by root).
    # Default: no
    #AllowSupplementaryGroups no
    # Stop daemon when libclamav reports out of memory condition.
    #ExitOnOOM yes
    # Don't fork into background.
    # Default: no
    #Foreground yes
    # Enable debug messages in libclamav.
    # Default: no
    #Debug yes
    # Do not remove temporary files (for debug purposes).
    # Default: no
    #LeaveTemporaryFiles yes
    # Detect Possibly Unwanted Applications.
    # Default: no
    #DetectPUA yes
    # Exclude a specific PUA category. This directive can be used multiple times.
    # See http://www.clamav.net/support/pua for the complete list of PUA
    # categories.
    # Default: Load all categories (if DetectPUA is activated)
    #ExcludePUA NetTool
    #ExcludePUA PWTool
    # Only include a specific PUA category. This directive can be used multiple
    # times.
    # Default: Load all categories (if DetectPUA is activated)
    #IncludePUA Spy
    #IncludePUA Scanner
    #IncludePUA RAT
    # In some cases (eg. complex malware, exploits in graphic files, and others),
    # ClamAV uses special algorithms to provide accurate detection. This option
    # controls the algorithmic detection.
    # Default: yes
    #AlgorithmicDetection yes
    ## Executable files
    # PE stands for Portable Executable - it's an executable file format used
    # in all 32 and 64-bit versions of Windows operating systems. This option allows
    # ClamAV to perform a deeper analysis of executable files and it's also
    # required for decompression of popular executable packers such as UPX, FSG,
    # and Petite. If you turn off this option, the original files will still be
    # scanned, but without additional processing.
    # Default: yes
    #ScanPE yes
    # Executable and Linking Format is a standard format for UN*X executables.
    # This option allows you to control the scanning of ELF files.
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    # Default: yes
    #ScanELF yes
    # With this option clamav will try to detect broken executables (both PE and
    # ELF) and mark them as Broken.Executable.
    # Default: no
    #DetectBrokenExecutables yes
    ## Documents
    # This option enables scanning of OLE2 files, such as Microsoft Office
    # documents and .msi files.
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    # Default: yes
    #ScanOLE2 yes
    # With this option enabled OLE2 files with VBA macros, which were not
    # detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
    # Default: no
    #OLE2BlockMacros no
    # This option enables scanning within PDF files.
    # If you turn off this option, the original files will still be scanned, but
    # without decoding and additional processing.
    # Default: yes
    #ScanPDF yes
    ## Mail files
    # Enable internal e-mail scanner.
    # If you turn off this option, the original files will still be scanned, but
    # without parsing individual messages/attachments.
    # Default: yes
    #ScanMail yes
    # Scan RFC1341 messages split over many emails.
    # You will need to periodically clean up $TemporaryDirectory/clamav-partial directory.
    # WARNING: This option may open your system to a DoS attack.
    # Never use it on loaded servers.
    # Default: no
    #ScanPartialMessages yes
    # With this option enabled ClamAV will try to detect phishing attempts by using
    # signatures.
    # Default: yes
    #PhishingSignatures yes
    # Scan URLs found in mails for phishing attempts using heuristics.
    # Default: yes
    #PhishingScanURLs yes
    # Always block SSL mismatches in URLs, even if the URL isn't in the database.
    # This can lead to false positives.
    # Default: no
    #PhishingAlwaysBlockSSLMismatch no
    # Always block cloaked URLs, even if URL isn't in database.
    # This can lead to false positives.
    # Default: no
    #PhishingAlwaysBlockCloak no
    # Allow heuristic match to take precedence.
    # When enabled, if a heuristic scan (such as phishingScan) detects
    # a possible virus/phish it will stop scan immediately. Recommended, saves CPU
    # scan-time.
    # When disabled, virus/phish detected by heuristic scans will be reported only at
    # the end of a scan. If an archive contains both a heuristically detected
    # virus/phish, and a real malware, the real malware will be reported
    # Keep this disabled if you intend to handle "*.Heuristics.*" viruses
    # differently from "real" malware.
    # If a non-heuristically-detected virus (signature-based) is found first,
    # the scan is interrupted immediately, regardless of this config option.
    # Default: no
    #HeuristicScanPrecedence yes
    ## Data Loss Prevention (DLP)
    # Enable the DLP module
    # Default: No
    #StructuredDataDetection yes
    # This option sets the lowest number of Credit Card numbers found in a file
    # to generate a detect.
    # Default: 3
    #StructuredMinCreditCardCount 5
    # This option sets the lowest number of Social Security Numbers found
    # in a file to generate a detect.
    # Default: 3
    #StructuredMinSSNCount 5
    # With this option enabled the DLP module will search for valid
    # SSNs formatted as xxx-yy-zzzz
    # Default: yes
    #StructuredSSNFormatNormal yes
    # With this option enabled the DLP module will search for valid
    # SSNs formatted as xxxyyzzzz
    # Default: no
    #StructuredSSNFormatStripped yes
    ## HTML
    # Perform HTML normalisation and decryption of MS Script Encoder code.
    # Default: yes
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    #ScanHTML yes
    ## Archives
    # ClamAV can scan within archives and compressed files.
    # If you turn off this option, the original files will still be scanned, but
    # without unpacking and additional processing.
    # Default: yes
    #ScanArchive yes
    # Mark encrypted archives as viruses (Encrypted.Zip, Encrypted.RAR).
    # Default: no
    #ArchiveBlockEncrypted no
    ## Limits
    # The options below protect your system against Denial of Service attacks
    # using archive bombs.
    # This option sets the maximum amount of data to be scanned for each input file.
    # Archives and other containers are recursively extracted and scanned up to this
    # value.
    # Value of 0 disables the limit
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 100M
    #MaxScanSize 150M
    # Files larger than this limit won't be scanned. Affects the input file itself
    # as well as files contained inside it (when the input file is an archive, a
    # document or some other kind of container).
    # Value of 0 disables the limit.
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 25M
    #MaxFileSize 30M
    # Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
    # file, all files within it will also be scanned. This options specifies how
    # deeply the process should be continued.
    # Note: setting this limit too high may result in severe damage to the system.
    # Default: 16
    #MaxRecursion 10
    # Number of files to be scanned within an archive, a document, or any other
    # container file.
    # Value of 0 disables the limit.
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 10000
    #MaxFiles 15000
    ## Clamuko settings
    # Enable Clamuko. Dazuko must be configured and running. Clamuko supports
    # both Dazuko (/dev/dazuko) and DazukoFS (/dev/dazukofs.ctrl). DazukoFS
    # is the preferred option. For more information please visit www.dazuko.org
    # Default: no
    #ClamukoScanOnAccess yes
    # The number of scanner threads that will be started (DazukoFS only).
    # Having multiple scanner threads allows Clamuko to serve multiple
    # processes simultaneously. This is particularly beneficial on SMP machines.
    # Default: 3
    #ClamukoScannerCount 3
    # Don't scan files larger than ClamukoMaxFileSize
    # Value of 0 disables the limit.
    # Default: 5M
    #ClamukoMaxFileSize 10M
    # Set access mask for Clamuko (Dazuko only).
    # Default: no
    #ClamukoScanOnOpen yes
    #ClamukoScanOnClose yes
    #ClamukoScanOnExec yes
    # Set the include paths (all files inside them will be scanned). You can have
    # multiple ClamukoIncludePath directives but each directory must be added
    # in a seperate line. (Dazuko only)
    # Default: disabled
    #ClamukoIncludePath /home
    #ClamukoIncludePath /students
    # Set the exclude paths. All subdirectories are also excluded. (Dazuko only)
    # Default: disabled
    #ClamukoExcludePath /home/bofh
    # With this option you can whitelist specific UIDs. Processes with these UIDs
    # will be able to access all files.
    # This option can be used multiple times (one per line).
    # Default: disabled
    #ClamukoExcludeUID 0
    # With this option enabled ClamAV will load bytecode from the database.
    # It is highly recommended you keep this option on, otherwise you'll miss detections for many new viruses.
    # Default: yes
    #Bytecode yes
    # Set bytecode security level.
    # Possible values:
    # None - no security at all, meant for debugging. DO NOT USE THIS ON PRODUCTION SYSTEMS
    # This value is only available if clamav was built with --enable-debug!
    # TrustSigned - trust bytecode loaded from signed .c[lv]d files,
    # insert runtime safety checks for bytecode loaded from other sources
    # Paranoid - don't trust any bytecode, insert runtime checks for all
    # Recommended: TrustSigned, because bytecode in .cvd files already has these checks
    # Note that by default only signed bytecode is loaded, currently you can only
    # load unsigned bytecode in --enable-debug mode.
    # Default: TrustSigned
    #BytecodeSecurity TrustSigned
    # Set bytecode timeout in miliseconds.
    # Default: 5000
    # BytecodeTimeout 1000
    My freshclam.conf:
    ## Please read the freshclam.conf(5) manual before editing this file.
    # Comment or remove the line below.
    #Example
    # Path to the database directory.
    # WARNING: It must match clamd.conf's directive!
    # Default: hardcoded (depends on installation options)
    #DatabaseDirectory /var/lib/clamav
    # Path to the log file (make sure it has proper permissions)
    # Default: disabled
    UpdateLogFile /var/log/clamav/freshclam.log
    # Maximum size of the log file.
    # Value of 0 disables the limit.
    # You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
    # and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes).
    # in bytes just don't use modifiers.
    # Default: 1M
    #LogFileMaxSize 2M
    # Log time with each message.
    # Default: no
    #LogTime yes
    # Enable verbose logging.
    # Default: no
    #LogVerbose yes
    # Use system logger (can work together with UpdateLogFile).
    # Default: no
    #LogSyslog yes
    # Specify the type of syslog messages - please refer to 'man syslog'
    # for facility names.
    # Default: LOG_LOCAL6
    #LogFacility LOG_MAIL
    # This option allows you to save the process identifier of the daemon
    # Default: disabled
    #PidFile /var/run/freshclam.pid
    # By default when started freshclam drops privileges and switches to the
    # "clamav" user. This directive allows you to change the database owner.
    # Default: clamav (may depend on installation options)
    #DatabaseOwner clamav
    # Initialize supplementary group access (freshclam must be started by root).
    # Default: no
    #AllowSupplementaryGroups yes
    # Use DNS to verify virus database version. Freshclam uses DNS TXT records
    # to verify database and software versions. With this directive you can change
    # the database verification domain.
    # WARNING: Do not touch it unless you're configuring freshclam to use your
    # own database verification domain.
    # Default: current.cvd.clamav.net
    #DNSDatabaseInfo current.cvd.clamav.net
    # Uncomment the following line and replace XY with your country
    # code. See http://www.iana.org/cctld/cctld-whois.htm for the full list.
    # You can use db.XY.ipv6.clamav.net for IPv6 connections.
    #DatabaseMirror db.XY.clamav.net
    # database.clamav.net is a round-robin record which points to our most
    # reliable mirrors. It's used as a fall back in case db.XY.clamav.net is
    # not working. DO NOT TOUCH the following line unless you know what you
    # are doing.
    DatabaseMirror database.clamav.net
    # How many attempts to make before giving up.
    # Default: 3 (per mirror)
    #MaxAttempts 5
    # With this option you can control scripted updates. It's highly recommended
    # to keep it enabled.
    # Default: yes
    #ScriptedUpdates yes
    # By default freshclam will keep the local databases (.cld) uncompressed to
    # make their handling faster. With this option you can enable the compression;
    # the change will take effect with the next database update.
    # Default: no
    #CompressLocalDatabase no
    # With this option you can provide custom sources (http:// or file://) for
    # database files. This option can be used multiple times.
    # Default: no custom URLs
    #DatabaseCustomURL http://myserver.com/mysigs.ndb
    #DatabaseCustomURL file:///mnt/nfs/local.hdb
    # Number of database checks per day.
    # Default: 12 (every two hours)
    #Checks 24
    # Proxy settings
    # Default: disabled
    #HTTPProxyServer myproxy.com
    #HTTPProxyPort 1234
    #HTTPProxyUsername myusername
    #HTTPProxyPassword mypass
    # If your servers are behind a firewall/proxy which applies User-Agent
    # filtering you can use this option to force the use of a different
    # User-Agent header.
    # Default: clamav/version_number
    #HTTPUserAgent SomeUserAgentIdString
    # Use aaa.bbb.ccc.ddd as client address for downloading databases. Useful for
    # multi-homed systems.
    # Default: Use OS'es default outgoing IP address.
    #LocalIPAddress aaa.bbb.ccc.ddd
    # Send the RELOAD command to clamd.
    # Default: no
    NotifyClamd /etc/clamav/clamd.conf
    # Run command after successful database update.
    # Default: disabled
    #OnUpdateExecute command
    # Run command when database update process fails.
    # Default: disabled
    #OnErrorExecute command
    # Run command when freshclam reports outdated version.
    # In the command string %v will be replaced by the new version number.
    # Default: disabled
    #OnOutdatedExecute command
    # Don't fork into background.
    # Default: no
    #Foreground yes
    # Enable debug messages in libclamav.
    # Default: no
    #Debug yes
    # Timeout in seconds when connecting to database server.
    # Default: 30
    #ConnectTimeout 60
    # Timeout in seconds when reading from database server.
    # Default: 30
    #ReceiveTimeout 60
    # With this option enabled, freshclam will attempt to load new
    # databases into memory to make sure they are properly handled
    # by libclamav before replacing the old ones.
    # Default: yes
    #TestDatabases yes
    # When enabled freshclam will submit statistics to the ClamAV Project about
    # the latest virus detections in your environment. The ClamAV maintainers
    # will then use this data to determine what types of malware are the most
    # detected in the field and in what geographic area they are.
    # Freshclam will connect to clamd in order to get recent statistics.
    # Default: no
    #SubmitDetectionStats /path/to/clamd.conf
    # Country of origin of malware/detection statistics (for statistical
    # purposes only). The statistics collector at ClamAV.net will look up
    # your IP address to determine the geographical origin of the malware
    # reported by your installation. If this installation is mainly used to
    # scan data which comes from a different location, please enable this
    # option and enter a two-letter code (see http://www.iana.org/domains/root/db/)
    # of the country of origin.
    # Default: disabled
    #DetectionStatsCountry country-code
    # This option enables support for our "Personal Statistics" service.
    # When this option is enabled, the information on malware detected by
    # your clamd installation is made available to you through our website.
    # To get your HostID, log on http://www.stats.clamav.net and add a new
    # host to your host list. Once you have the HostID, uncomment this option
    # and paste the HostID here. As soon as your freshclam starts submitting
    # information to our stats collecting service, you will be able to view
    # the statistics of this clamd installation by logging into
    # http://www.stats.clamav.net with the same credentials you used to
    # generate the HostID. For more information refer to:
    # http://www.clamav.net/support/faq/faq-cctts/
    # This feature requires SubmitDetectionStats to be enabled.
    # Default: disabled
    #DetectionStatsHostID unique-id
    # This option enables support for Google Safe Browsing. When activated for
    # the first time, freshclam will download a new database file (safebrowsing.cvd)
    # which will be automatically loaded by clamd and clamscan during the next
    # reload, provided that the heuristic phishing detection is turned on. This
    # database includes information about websites that may be phishing sites or
    # possible sources of malware. When using this option, it's mandatory to run
    # freshclam at least every 30 minutes.
    # Freshclam uses the ClamAV's mirror infrastructure to distribute the
    # database and its updates but all the contents are provided under Google's
    # terms of use. See http://code.google.com/support/bin/answer.py?answer=70015
    # and http://safebrowsing.clamav.net for more information.
    # Default: disabled
    #SafeBrowsing yes
    # This option enables downloading of bytecode.cvd, which includes additional
    # detection mechanisms and improvements to the ClamAV engine.
    # Default: enabled
    #Bytecode yes
    # Download an additional 3rd party signature database distributed through
    # the ClamAV mirrors. Here you can find a list of available databases:
    # http://www.clamav.net/download/cvd/3rdparty
    # This option can be used multiple times.
    #ExtraDatabase dbname1
    #ExtraDatabase dbname2
    Any help is much appreciated.

    MatejLach wrote:
    clamd is running, user and group clamav all have the relevant permissions as far as I can tell, however upon scanning my mail, I always end up with the following error:
    Scanning error:
    /home/username/.claws-mail/mimetmp/0000000e.mimetmp: lstat() failed: Permission denied. ERROR
    Seems like a permissions error to me... maybe check the actual file it is attempting to scan... I know it is in your home folder, but just to be sure, you might want to check that everything is sane.

  • ITunes musical library located on a WD 2TB, ext. drv. Computer destroyed by virus; ED survived. Bought new laptop, connected ED. Not able to see library. ED shows as 'G:' 95% full. How can I reconnect my old library to new laptop?

    I had my iTunes musical library on an ext. drv. WD 2TB, ‘MY BOOK ESSENTIAL'. Three weeks ago, my computer was infected by a virus that fried it. It did not affect the external drive. I bought a new computer: a laptop, Dell XPS, Intel Core i7-2630QM CPU, Windows 7 Home Premium. I have been able to connect the WD external drive; however, I am not able to see the musical library in my iTunes or Explorer. ‘My Computer’ shows the external drive as ‘G:’ 95% full. It reads, 32.1 GB free of 1.36 TB. When I click on the drive to see its contents, it shows nothing. The library in iTunes also shows nothing. Can anyone help, please? How can I reconnect my old musical library to my new laptop and iTunes? Many thanks.

    Hmm, viruses don't generally "fry" drives. They can make bootable operating systems not bootable, hide data, and corrupt executable files. Software can potentially wipe all the data from the drive but it shouldn't be able to physically damage the drive. Bah! What's done is done.
    As to unhiding your files assuming they are just hidden....
    Hit Start > Run, type in CMD and press enter. Type the following at the prompt and then press enter:
    attrib -h -s -r g:\*.* /d /s
    This tells windows to clear the hidden, read-only, and system flags from all files on the drive, assuming of course your profile has the power to "see" the files and change them.
    If that doesn't work then you may need to take ownership of the drive first. The drive may have security settings that make it "belong" to an account on your old system. Right-click on the drive in Windows Explorer and click Properties. Click the Security tab, the Advanced button, the Owner tab, then the Edit tab. Make yourself the owner, then you can make any other changes to the security settings you want to back on the Permissions tab. (If you can't change the owner log out and log back in as Administrator). For iTunes your account (or everyone) and SYSTEM need full access to all files. Any changes you make should be applied to "This folder, subfolders and files", should be inheritable and you should also replace the permissions on all child objects.
    tt2

  • I bought adobe suite 4 student edition a few years ago and I am no longer a student and my laptop in which I have adobe suite has recently got a virus and I must uninstall the adobe suite in or to wipe the computer. If I uninstall the student edition and

    I bought adobe suite 4 student edition a few years ago and I am no longer a student and my laptop in which I have adobe suite has recently got a virus and I must uninstall the adobe suite in or to wipe the computer. If I uninstall the student edition and reinstall once the virus is removed from the computer will I have to go through the student product verification process or can I simply use the product key to reinstall the adobe suite?

    mikek05 wrote:
    …So if I use the disks that it came with to uninstall adobe suite and use the same disks to reinstall once I have fixed the computer…
    Re-read my post:  You must deactivate before uninstalling.

  • My laptop had a virus and I am trying to sync my IPHONE 4 to my desktop, how can I sync my phone without losing all my music, apps and contacts?

    my laptop had a virus and I am trying to sync my IPHONE 4 to my desktop, how can I sync my phone without losing all my music, apps and contacts?

    You are talking about the menu bar of Itunes, right?
    Yes. With iTunes open the menu bar is at the top of your screen.
    where exactly is the Store/synck you iphone option?
    After you authorize the computer connect your iPhone then follow the instructions here > iOS: How to transfer or sync content to your computer
    When you are done transferring the data to the desktop, right or control click the iPhone under Devices left side of the iTunes window then click Back Up.
    That way you will have a backup just in case you need to restore your iPhone.

  • Satellite 1415-s105: Virus alert - please help!

    Hi,
    I'm running XP home edition on a Satellite 1415-S105
    The computer is behaving very suspeciously, it says: :your computer is infected" - vist this or that website and we'll fix it for you without me even running browser.
    I've reinstalled xp with the recovery drive from toshiba serveral times, but this doesn't help. The virus or whatever it is is still there.
    What do I do?
    Everything is backed up. I just want to do complete clean up of the hard drive, but the recovery disk doesn't seem to be able to.
    Thanks a lot.

    Hi
    Did you use several partitions on the HDD?
    Its possible that the virus is placed on the second partition and not on C OS partition.
    Sometimes viruses, worms and other danger applications are hidden in the common files like mp3.
    In my opinion you should use the anti virus software like Norton antivirus and update the virus file definition. Its very important that your anti virus software is up to date.

  • Downloads to block viruses?

    looking for downloads to block viruses and malware?

    An addition comment I would add would be to avoid download anything and everything from P2P networks. The vast majority of that stuff is illegal for starters and also tends to be the easiest place to find download infected with malware. P2P includes LimeWire, ForstWire, transmission, bittorrent and the like.
    Allan

Maybe you are looking for