clamav-users August 2009 archive
Main Archive Page > Month Archives  > clamav-users archives
clamav-users: [Clamav-users] format/location/use of .wdb for Phi

[Clamav-users] format/location/use of .wdb for Phishing.Heuristics.Email.SpoofedDomain

From: Robert Lopez <rlopezcnm_at_nospam>
Date: Wed Aug 26 2009 - 15:18:05 GMT

I see an email (2009-08-15 02:51 -600; Török Edwin to Len Conrad) in archives which says "Whitelisting heuristic phishing signatures is done using a .wdb file."

I have not found any information on how to use such a file (format, location, compiling, etc.) and I would like a pointer to the information location. The Phishing.Heuristics.Email.SpoofedDomain is wonderful at blocking real phishing attempts at our college. We do NOT want to turn it off. However, it is also blocking a lot of news letters and social networking site emails leading to too many help desk complaints. -- Robert Lopez Unix Systems Administrator Central New Mexico Community College (CNM) 525 Buena Vista SE Albuquerque, New Mexico 87106 _______________________________________________ Help us build a comprehensive ClamAV guide: visit