Instruction/ maintenance manual of the product 1.24.1867 Unisar
Go to page of 102
User's Guide Copyright © 2006 SOFTWIN antivirus antivirus.
BitDefender Antivirus Scanner for Unices User's Guide SOFTWIN Published 2006.04.27 V ersion 1.24.1867 Copyright © 2006 SOFTWIN L egal Notice All rights reserved.
As every cat owner knows, nobody owns a cat. BitDefender Antivirus Scanner for Unices.
BitDefender Antivirus Scanner for Unices.
T able of Contents End User Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . ix P r e f a c e ...................................................... x i i i 1 . C o n v e n t i o n s u s e d i n t h i s b o o k ............
5.3.3. Install the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 5.3.4. Install the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 5 . 4 . T h ei n s t a l l e r .....................
1 0 . 2 . 3 .A m a v i s d - n e w ........................................ 7 0 1 1 . U p d a t e s ................................................ 7 3 1 1 . 1 . T r i g g e r e d u p d a t e .......................................... 7 3 1 1.1.1. Run the triggered update .
viii BitDefender Antivirus Scanner for Unices.
End User Softw ar e License A gr eement IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INST ALL THE SOFTW ARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", ".
product to be used for personal purposes, with no commercial implications whatsoever , under the terms of the EULA. For example, under the Personal License, you are allowed to scan your personal laptop or desktop computer but YOU ARE NOT ALLOWED TO USE THE PRODUCT IN A BUSINESS ENVIRONMENT SUCH AS AN OFFICE COMPUTER OR A COMP ANY SERVER.
LIMITED W ARRANTY . SOFTWIN warrants a 30 day fault free period for the media on which BitDefender is distributed as of the date BitDefender has been delivered to you. Any breach of this warranty shall only result in SOFTWIN replacing the faulty media, at its sole discretion, upon receipt of the said media, or refunding the BitDefender price.
NA VIGA TION, NUCLEAR F ACILITIES, OR COMMUNICA TION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICA TION OR INST ALLA TION WHERE F AILURE COULD RESUL T IN DEA TH, SEVERE PHYSICAL INJURY OR DAMAGE TO PROPERTY .
Pr eface This User's Guide is intended to all who have chosen BitDefender Antivirus Scanner for Unices as security solution for their systems. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to do administrative tasks on a Linux box.
Description Appearance The environment variables are MONOSPACED CAPITALS . ENV_VAR The emphasized text is specially marked to require your attention. emphasized The quoted text is provided as reference. “quoted text” Inline commands are printed using strong characters.
W arning This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications. Y ou should read and understand it, because it describes something extremely risky .
3. Request for Comments We invite you to help us improve the book. W e have tested and verified all of the information to the best of our ability , but you may find that features have changed (or even that we have made mistakes).
Description and featur es Description and features.
Description and features.
Chapter 1. Ov ervie w BitDefender provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management for over 41 million home and corporate users in more than 100 countries.
all complex threats that endanger a network, from a small local area to large multi-server , multi-platform W AN's. Y our Ultimate Protection. The final frontier for any possible threat to your computer system.
viruses, to do antivirus research, to develop new technologies for monitoring all possible ways to infect a system and, last but not least, to educate the IT&C public on the danger of computer viruses.
22 Overvie w Description and featur es 01.
Chapter 2. Pr oduct featur es The acquisition and installation of an antivirus product for the personal or company's systems is the most efficient way of preventing the infection of a computer and the spreading of viruses inside the company , and outside the company as well.
2.2. K ey F eatur es • Antivirus protection for the file system. • Automatic and incremental update of virus definitions and scanning engines directly from BitDefender servers.
Chapter 3. The scanning mechanism The central part of BitDefender Antivirus Scanner for Unices consists of the BitDefender architecture-independent scanning engines. These are specialized data analysis routines and malware signature definitions, since many viruses can be identified upon a distinctive code pattern.
26 The scanning mechanism Description and featur es 03.
Installation Installation.
Installation.
Chapter 4. Pr er equisites BitDefender Antivirus Scanner for Unices can be installed on package based Linux distributions (rpm or deb) and tbz based FreeBSD versions, but also all the other distributions are supported, using a pseudo-package system, with the same functionality of the others.
4.1.2. Softw are s ystem r equirements Linux requirements The Linux kernel should be 2.2, 2.4 or 2.6, the recommended one is 2.6, with support for a fast file system, which works well with multiple small files, such as ext3 or reiserfs. BitDefender requires glibc version 2.
4.2.2. Fr eeBSD conv ention bitdefender-scanner- {ver} .tbz Where {ver} is the package version. For example, 7.5_3 is version 7, subversion 5, package build 3.
32 Prer equisites Installation 04.
Chapter 5. P ack age installation This chapter will explain you how to install BitDefender on a Unix-like system, such as Linux or FreeBSD. This is pretty straightforward: get the desired package, test it for integrity , then install it.
Then, export the key to a local file: # gpg --armor --export 0x0EC4FE05 > bd-pack.key For the rpm packages, you have to import the key into rpm key ring, using the next command. # rpm --import bd-pack.key When you wish to check a rpm package, just issue a command similar to the following.
5.3. Install the pack age The installation process depends on the package type. There are different methods for rpm , deb and self-extractable archive, as well as a typical method for FreeBSD.
Additional par ameters For the not-so-inpatient user , the self-extractable archive supports few command line parameters, described in the following table.
Description P arameter Run the embedded uninstaller script instead of the normal installer . For uninstalling, please read more in Chapter 6 “ Uninstall ” (p.
Next, the Installation directory is asked, if you have installed BitDefender Antivirus Scanner for Unices on Linux, using the self-extracting archive. The default is /opt and we will assume you go for it.
Chapter 6. Uninstall If you ever need to remove BitDefender Antivirus Scanner for Unices, there are several methods to do it, depending on the package type. 6.1. Uninstall the rpm package T o uninstall BitDefender Antivirus Scanner for Unices on a RedHat based distribution, using the RedHat package manager , you have to run the following command.
Next, the uninstall procedure begins by removing installation directory , /opt/BitDefender-scanner . The MANPATH environment variable is restored to its previous value. Finally , the /usr/bin/bdscan symlink is deleted. At this moment, the system should be left in the same condition as found before installing.
Using BitDefender Using BitDefender.
Using BitDefender.
Chapter 7. The configur ation file The system-wide configuration of BitDefender Antivirus Scanner for Unices is stored inside a file located at /etc/BitDefender-scanner/bdscan.conf on Linux systems and at /usr/local/etc/bitdefender/bdscan.conf on FreeBSD systems.
# argument only files having the following extensions are scanned Extensions = 386:asp:bas:bin:chm:cla:class:cmd:com:bat:csc:dat:dll: doc:dot:exe:bat:hlp:hta:htm:html:ini:js:lnk:mdb:msi:nws:ocx:ole: ovl:pfd:php:pif:pot:ppa:ppt:prc:rtf:scr:shs:smm:sys:url:vbe:vbs: vxd:wbk:wdm:wiz:xla:xls:xlt:xml:xtp: # The update location.
Description K ey This is the location of the quarantine directory , where the infected files are stored when quarantine actions are invoked. QuarantinePath The quarantine directory can be specified at run-time using the --quarantine= path option. The default quarantine path is located at /opt/BitDefender-scanner/var/quarantine .
Description K ey The list can be specified at run-time using the --exclude-ext= ext1:ext2 option. This is the license key , necessary for product activation. Key Product r egistration Please see Chapter Product registration (page 77) for more information about license keys.
Chapter 8. T esting BitDefender Y ou can verify that BitDefender Antivirus component works properly with the help of a special test file, known as EICAR Standard Anti-virus T est file. EICAR stands for the European Institute of Computer Anti-virus Research .
Y ou will be told one file has been scanned, found infected and the virus identified. Y ou will see the virus name: EICAR-Test-File (not a virus) . Since no action was specified, the file EICAR.COM still lays on your hard disk. The command output will be the following.
BitDefender will unpack the archive and scan the content. This will be the command output. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL.
Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /tmp/mail.mbox ok /tmp/mail.mbox=>(message 0) ok /tmp/mail.mbox=>(message 1) ok /tmp/mail.mbox=>(message 1)=> ... 34 +0300 (EEST)]=>(MIME part) ok /tmp/mail.
Chapter 9. Real life usage These are some real-life usage examples of BitDefender . Use them as guidelines for improving your system protection and, if you have found a different way to use BitDefender Antivirus Scanner for Unices, do not hesitate to contact us and share your experience.
Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /t ... xe infected: EICAR-Test-File (not a virus) <- cevakrnl.xmd Results: Folders :0 Files :1 Packed :0 Archives :0 Infected files :1 Suspect files :0 Warnings :0 Identified viruses:1 I/O errors :0 9.
The next screen output shows the files scanned, found infected and finally quarantined. Y ou can notice the two sub-directories were not scanned. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved.
Only the found malware will be displayed on the screen, but the log file will contain one line about every file scanned and its status. Y ou can easily grep for “infected” and “suspected” keywords to see the report regarding them. This is the beginning of the log file.
As you can see, BitDefender reports to have scanned more files. This happens because each archive should be unpacked separately . Y ou can see also which engine process each step of unpacking and scanning. BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL.
BitDefender Antivirus Scanner v7.60124 Linux-i686 Copyright (C) 1996-2006 Softwin SRL. All rights reserved. This program is licensed for commercial use. Default action upon detecting an infected file: ignore action Default action upon detecting a suspected file: ignore action /tmp/mail.
# bdscan --log=/tmp/antivirus_scan.log --log-overwrite file.exe 9.2.2. Get mor e information BitDefender can offer some information about scanning engines, last update, key validity , etc. when called with --info command line option. # bdscan --info Y ou will get the next screen output.
9.2.4. Displa y the product ver sion Maybe you will need just to find the version of your installed BitDefender Antivirus Scanner for Unices. # bdscan --version BitDefender will display the product name, version and build number , architecture and copyright information.
Chapter 1 0. BitDefender integr ation BitDefender Antivirus Scanner for Unices is a versatile antivirus scanning solution, that could be easily integrated in desktop and server software to perform an instant target scan.
Different installation path If you have used another installation path and not the default one, please change the first line accordingly . That condition is used not to show the menu item if BitDefender Antivirus Scanner for Unices is not installed. Figure 1 0.
[Desktop Action Scan_With_BitDefender] Name=Scan with BitDefender Comment=Perform an AntiVirus scan with BitDefender Icon=bitdefender Exec=konsole -T "BitDefender Antivirus Scanner" --noclose --nomenubar --notoolbar --icon bitdefender --vt_sz 80x25 -e bdscan --no-list %f Figure 1 0.
• T ooltip. Set Perform an AntiVirus scan with BitDefender . • Command line. Set bdscan --no-list %aCurrent% . • Then check Execution mode → Run in terminal checkbox. Figure 1 0.3. Krusader's User A ctions Press the Ok button and close the window .
# Now let's run the scan process xterm -e "bdscan --no-list $*; echo -n 'Press ENTER to continue...'; read" # End of the script Do not forget to give it executable rights.
cat > $TMPFILE # Scan it with BitDefender and remember the exitcode $BDSCAN $TMPFILE EXIT=$? # Remove the temporary file and return the exitcode rm -f $TMPFILE exit $EXIT # End of the script What t.
displayed by Pine. Y ou should notice whether the email was infected or not. When finished reading the messages, press E to Exit the viewer . As stated before, it would be better to tell Pine to automatically scan the messages and what to do when some infected email is found.
1 0.1.6. Ev olution Evolution makes the tasks of storing, organizing, and retrieving your personal information easy , so you can work and communicate more effectively with others. It's a highly evolved groupware program, an integral part of the Internet-connected desktop.
1 0.1.7. KMail KMail is a fully-featured email client that fits nicely into the K Desktop Environment, KDE. It has features such as support for IMAP , POP3, multiple accounts, powerful filters, PGP/GnuPG privacy , inline attachments, and much more. —KMail website KMail integration can be done using the wizard from T ools → Anti-virus Wizard.
# Save the standard-input to a temporay file cat > $TMPFILE # Scan it with BitDefender, filter the output and echo the header if $BDSCAN $TMPFILE | grep -q infected; then echo "X-Virus-Flag: y.
1 0.2.1. Qmail-Scanner Qmail-Scanner is an add-on that enables a Qmail e-mail server to scan all gateway-ed e-mail for certain characteristics (i.e. a content scanner). —Qmail-Scanner website Qmail-Scanner supports BitDefender Antivirus Scanner for Unices out of package.
Once you have a working MailScanner installed on your server , open its configuration file /opt/MailScanner/etc/MailScanner.conf (for a default location) and find the next line.
amavisd-ne w installation Please refer to amavisd-new documentation for a detailed description of installation and configuration. 71 10 Using BitDefender BitDefender integration.
72 BitDefender integration Using BitDefender 10.
Chapter 1 1. Updates BitDefender Antivirus Scanner for Unices was designed with capabilities for triggered update. At the present time, the risk of getting infected is high, both because new viruses appear and the existing ones keep on spreading.
Edit the cron table The first method is to edit the cron tables, using the crontab tool. For example, if you want to run a daily update, run the following as root: # crontab -e Then add the next line: 00 02 * * * /opt/BitDefender-scanner/bin/bdscan --update All you have to do now is to signal the cron daemon to reload the crontables.
#!/bin/sh # BitDefender update script, using cron service # Copyright (C) 1996-2005 SOFTWIN SRL. All rights reserved. # Place this script under one of the following directories for daily # or even hourly updates (find their equivalents on your system if # they do not exactly match): # /etc/cron.
on the update server , containing the updates of the scanning engines and virus signatures: cumulative.zip and daily.zip . • cumulative.zip is released every week on Monday and it includes all the virus definitions and scan engines updates up to the release date.
Chapter 12. Pr oduct r egistr ation The product is delivered with a trial registration key valid for thirty days. At the end of the trial period, if you want to continue using the program, you have to provide a new license key . When you have the new key , open the configuration file from /etc/BitDefender-scanner/bdscan.
commercial implications whatsoever . For example, using the Personal License, you are allowed to scan your personal laptop or desktop computer but YOU ARE NOT ALLOWED TO USE IT IN A PRODUCTION ENVIRONMENT LIKE AN OFFICE COMPUTER OR COMP ANY SERVER. 12.
Chapter 13. Best pr actices These are some steps you should follow to ensure a system free from viruses. 1. After installing BitDefender Antivirus Scanner for Unices, perform a triggered update to have the latest virus signatures and engines, as described in Section T riggered update (page 73) .
80 Best practices Using BitDefender 13.
Getting help Getting help.
Getting help.
Chapter 14. Fr equently A sk ed Questions 1. Installation 1. What are the system requirements? Please consult Section 4.1 “ System requirements ” (p. 29) for an up to date system requirements. 2. Does BitDefender alter my system configuration? Y es, BitDefender Antivirus Scanner for Unices will touch several system files ( man.
If you have BitDefender Antivirus Scanner for Unices performing a regular update, this time should be recent enough. If not, this is a good moment to update you antivirus. 3. When I try to update the virus definitions/scanning engines, I always get this “No update available” message.
Chapter 15. Support 15.1. Support department As a valued provider , SOFTWIN strives to provide its customers with an unparallel level of fast and accurate support.
15.3. Contact information Efficient communication is the key to a successful business. For the past 10 years SOFTWIN has established an indisputable reputation in exceeding the expectations of clients and partners, by constantly striving for better communications.
Soporte técnico: < soporte@bitdefender-es.com > V entas: < comercial@bitdefender-es.com > Phone: +34 932189615 Fax: +34 932179128 Sitio web del producto: http://www .bitdefender-es.com U.S.A BitDefender LLC 6301 NW 5th W ay , Suite 3500 Fort Lauderdale, Florida 33308 T echnical support: < support@bitdefender.
88 Support Getting help 15.
Manual P ages 89 Manual P ages.
90 Manual P ages.
bdscan bdscan — BitDefender Antivirus Scanner for Unices Synopsis bdscan [ --action= disinfect | quarantine | delete | ignore ] [--no-archive] [--no-mail] [--no-pack] [--no-recursive] [--recursive-l.
--no-pack Specifies that bdscan should not scan inside packed programs. --no-recursive Specifies that bdscan should not enter sub-directories for scanning. If you select this option only the first level directories will be scanned. --recursive-level= level Set the maximum recursive level to level .
--log[= file.log ] Specifies that bdscan should log its activity to the mentioned file. If the user has no right to write this file, an error message will be output and the default one will be used. The default is ~/.BitDefender/bdscan.log . --log-overwrite Specifies that bdscan should not append the new output to the existing log file.
disinfect BitDefender will try to disinfect the object, by removing the infected or suspected part. The action can fail sometimes. quarantine The object will be moved from its original location to a secured directory , the quarantine.
Bugs Sometimes, bdscan may hang while scanning directories containing pipes or UNIX socket files. T o avoid this behavior , try to use it exclusively for regular files. Also, there may be rare cases when bdscan crashes while doing file scan. If this is the case, you should update the scan engines and virus signatures and definitions.
96 bdscan Manual P ages.
Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs, rather than static pages.
Internet Explorer . Both of these are graphical browsers, which means that they can display graphics as well as text. In addition, most modern browsers can present multimedia information, including sound and video, though they require plug-ins for some formats.
Events An action or occurrence detected by a program. Events can be user actions, such as clicking a mouse button or pressing a key , or system occurrences, such as running out of memory . False positive Occurs when a scanner identifies a file as infected when in fact it is not.
Macro virus A type of computer virus that is encoded as a macro embedded in a document. Many applications, such as Microsoft Word and Excel, support powerful macro languages. These applications allow you to embed a macro in a document, and have the macro execute each time the document is opened.
Port An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally , there are several ports for connecting disk drives, display screens, and keyboards. Externally , personal computers have ports for connecting modems, printers, mice, and other peripheral devices.
horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture T roy . Update A new version of a software or hardware product designed to replace an older version of the same product.
An important point after buying a device Unisar 1.24.1867 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Unisar 1.24.1867 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Unisar 1.24.1867 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Unisar 1.24.1867 you will learn all the available features of the product, as well as information on its operation. The information that you get Unisar 1.24.1867 will certainly help you make a decision on the purchase.
If you already are a holder of Unisar 1.24.1867, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Unisar 1.24.1867.
However, one of the most important roles played by the user manual is to help in solving problems with Unisar 1.24.1867. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Unisar 1.24.1867 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center