Unisar 1.24.1867 User Manual

Loading...

User's Guide

antivirusti i

Copyright © 2006 SOFTWIN

BitDefender Antivirus Scanner for Unices

BitDefender Antivirus Scanner for Unices

User's Guide

SOFTWIN

Published 2006.04.27

Version 1.24.1867

Copyright © 2006 SOFTWIN

Legal Notice

All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of SOFTWIN. The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source. The content can not be modified in any way.

Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this documentisprovidedonan“asis”basis,withoutwarranty. Althougheveryprecautionhasbeentakeninthepreparation of this document, the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.

This book contains links to third-party Websites that are not under the control of SOFTWIN, therefore SOFTWIN is not responsible for the content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk. SOFTWIN provides these links only as a convenience, and the inclusion of the link does not imply that SOFTWIN endorses or accepts any responsibility for the content of the third-party site.

Trademarks. Trademarknamesmayappearinthisbook. Allregisteredandunregisteredtrademarksinthisdocument are the sole property of their respective owners, and are respectfully acknowledged.

BitDefender Antivirus Scanner for Unices

As every cat owner knows, nobody owns a cat.

BitDefender Antivirus Scanner for Unices

BitDefender Antivirus Scanner for Unices

Table of Contents

 

End User Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . .

ix

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

xiii

1. Conventions used in this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

xiii

1.1. Typographical conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

xiii

1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

xiv

2. The book structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

xv

3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

xvi

Description and features ..................................

17

1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

19

1.1. Why BitDefender? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

19

1.2. Data Security Division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

20

1.3. SOFTWIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

21

2. Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

23

2.1. BitDefender Antivirus Scanner for Unices . . . . . . . . . . . . . . . . . . . . . . . . .

23

2.2. Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

24

3. The scanning mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

25

Installation .................................................

27

4. Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

29

4.1. System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

29

4.1.1. Hardware system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

29

4.1.2. Software system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

30

4.2. Package naming convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

30

4.2.1. Linux convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

30

4.2.2. FreeBSD convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

31

5. Package installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

33

5.1. Getting BitDefender Antivirus Scanner for Unices . . . . . . . . . . . . . . . . . . . .

33

5.2. Test the package for integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

33

5.2.1. Test the rpm and deb packages . . . . . . . . . . . . . . . . . . . . . . . . . . . .

33

5.2.2. Test the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . .

34

5.2.3. Test the FreeBSD tbz package . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

34

5.3. Install the package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

35

5.3.1. Install the rpm package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

35

5.3.2. Install the deb package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

35

v

BitDefender Antivirus Scanner for Unices

5.3.3. Install the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . .

35

5.3.4. Install the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

37

5.4. The installer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

37

6. Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

39

6.1. Uninstall the rpm package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

39

6.2. Uninstall the deb package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

39

6.3. Uninstall using the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . .

39

6.4. Uninstall the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

40

6.4.1. Uninstall a package downloaded locally . . . . . . . . . . . . . . . . . . . . . . .

40

6.4.2. Uninstall from the ports collection . . . . . . . . . . . . . . . . . . . . . . . . . . .

40

Using BitDefender .........................................

41

7. The configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

43

8. Testing BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

47

8.1. Scan an executable file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

47

8.2. Scan an archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

48

8.3. Scan a mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

49

9. Real life usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

51

9.1. Virus scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

51

9.1.1. Scan a regular file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

51

9.1.2. Scan a directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

52

9.1.3. Scan the entire system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

53

9.1.4. Scan the archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

54

9.1.5. Scan the mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

55

9.2. Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

56

9.2.1. Using the log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

56

9.2.2. Get more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

57

9.2.3. Display the virus list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

57

9.2.4. Display the product version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

58

9.3. Virus submission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

58

10. BitDefender integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

59

10.1. Desktop integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

59

10.1.1. Midnight Commander . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

59

10.1.2. KDE Konqueror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

60

10.1.3. Krusader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

61

10.1.4. ROX-Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

62

10.1.5. Pine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

63

10.1.6. Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

66

10.1.7. KMail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

67

10.2. Server integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

68

10.2.1. Qmail-Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

69

10.2.2. MailScanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

69

vi

BitDefender Antivirus Scanner for Unices

10.2.3. Amavisd-new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

70

11. Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

73

11.1. Triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

73

11.1.1. Run the triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

73

11.1.2. Regular updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

73

11.1.3. HTTP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

75

11.2. Manual update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

75

12. Product registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

77

12.1. Trial License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

77

12.2. License for home or personal use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

77

12.3. License for commercial use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

78

13. Best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

79

Getting help ...............................................

81

14. Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

83

15. Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

85

15.1. Support department . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

85

15.2. BitDefender Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

85

15.3. Contact information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

86

15.3.1. Web addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

86

15.3.2. Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

86

Manual Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

89

bdscan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

91

Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

97

vii

BitDefender Antivirus Scanner for Unices

viii

End User Software License Agreement

End User Software License Agreement

IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT.

These Terms cover the home-user or corporate BitDefender Solutions and Services licensed to you, including the related documentation and any update and upgrade of the applications delivered to you under the purchased license or under any related service agreement, as defined in the documentation, as well as any copy thereof.

This License Agreement is a legal agreement between you (either an individual or a legal person) and SOFTWIN for the use of the SOFTWIN software product identified above,whichincludescomputersoftwareandservices,andmayincludetheassociated media,printedmaterials,and"online"orelectronicdocumentation(hereinafterreferred to as "BitDefender"), all of which are protected by international copyright laws and international treaties. By installing, copying or using BitDefender, you agree to be bound by the terms of this agreement.

If you do not agree to the terms of this agreement, do not install or use BitDefender.

BitDefender License. BitDefender is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. BitDefender is licensed, not sold.

GRANT OF LICENSE. SOFTWIN hereby grants you and only you the following non-exclusive,limited,non-transferableandroyalty-bearinglicensetouseBitDefender.

The BitDefender Antivirus Scanner for Unices ("BitDefender") is subject to 3 types of license:

1.Trial License. The product is distributed with a trial key which grants the user a

30day trial period as of install time, under the terms of the license agreement. At the end of the trial period, all scanbased product features (disinfect, delete) will be disabledandtheuserwillhavetoeithergoonlineto www.bitdefender.com andregister forapersonallicenseorpurchaseacommerciallicensefromanyBitDefenderreseller.

2.Home or Personal Use License. This license is free of charge and it can be retrieved from the BitDefender website after filling in a short form. It only allows the

ix

End User Software License Agreement

producttobeusedforpersonalpurposes,withnocommercialimplicationswhatsoever, under the terms of the EULA. For example, under the Personal License, you are allowed to scan your personal laptop or desktop computer but YOU ARE NOT ALLOWED TO USE THE PRODUCT IN A BUSINESS ENVIRONMENT SUCH AS AN OFFICE COMPUTER OR A COMPANY SERVER.

3. Commercial Use License. If you intend to use BitDefender with your own integrationsystemorpre-designedscripts,youmustpurchasetheCommercialLicense. The commercial license allows for the product to be used in any environment whatsoeverthroughoutthelicensingperiod,underthetermsoftheEULA. Commercial Licenses are granted on an individual user basis, which simply means that the cost depends on how many users benefit from the features of the product.

LICENSE TERM. The license hereunder is granted as of the date BitDefender has been purchased and until the end of the period for which such license has been purchased.

UPGRADES. If BitDefender is upgrade labeled, in order to use it, you must hold a SOFTWINlicenseallowingyoutouseproductsidentifiedbysuchcompanyaseligible forupgrade. AnupgradelabeledBitDefenderproductshallreplaceand/orsupplement the product based on which your were eligibile for such upgrade. You may use the resulting upgraded product only in accordance with the terms of this License Agreement. IfBitDefenderisanupgradeofasoftwarepackagecomponentwhichwas licensed to you as a single product, BitDefender may only be used and transferred as part of that single product package and it may not be separated so as to be used by more than the total number of licensed users. The terms and conditions of this license shallreplaceandsupersedeanypreviousagreementsthatmayhaveexistedbetween you and SOFTWIN regarding the original product or the resulting upgraded product.

COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyrights in and to BitDefender (including but not limited to any images, photographs, logos, animations, video, audio, music, text, and "applets" incorporated into BitDefender), the accompanying printed materials, and any copies of BitDefender are property of SOFTWIN. BitDefender is protected by copyright laws and international treaty provisions. Therefore,BitDefendermustbetreatedasanyothercopyrightedmaterial. The printed materials accompanying BitDefender shall not be copied. All copyright noticesshallbereproducedandincluded,intheiroriginalform,inalloftheBitDefender copies created, irrespective of the media or form in which BitDefender exists. The BitDefender license shall not be sub-licensed, rented, sold, leased or shared. The BitDefender source code shall not be reverse engineered, recompiled, disassembled, no derivative works shall be created based on it, it shall not be modified, translated and no attempts to discover it shall be made.

x

End User Software License Agreement

LIMITED WARRANTY. SOFTWIN warrants a 30 day fault free period for the media on which BitDefender is distributed as of the date BitDefender has been delivered to you. Any breach of this warranty shall only result in SOFTWIN replacing the faulty media, at its sole discretion, upon receipt of the said media, or refunding the BitDefender price. SOFTWIN does not warrant either the uninterrupted or error free operation of BitDefender or the correction of possible errors. SOFTWIN does not warrant that BitDefender will meet your requirements.

EXCEPTASEXPRESSLYSETFORTHINTHISAGREEMENT,SOFTWINDISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE PRODUCTS, ENHANCEMENTS, MAINTENANCE THEREOF OR SUPPORT RELATED THERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE) OR SERVICES THAT IT HAS SUPPLIED. SOFTWIN HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INTERFERENCE, ACCURACY OF DATA, ACCURACY OF INFORMATIONAL CONTENT, SYSTEM INTEGRATION, AND NON-INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY'S SOFTWARE, SPYWARE,ADWARE,COOKIES,EMAILS,DOCUMENTS,ADVERTISEMENTSOR THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING, CUSTOM AND PRACTICE, OR TRADE USAGE.

DISCLAIMER OF DAMAGES. Anyone using, testing, or evaluating BitDefender shall bears all risks as to the quality and performance of BitDefender. Under no circumstancesshallSOFTWINbeliableforanydamagesofanykind,including,without limitation, direct or indirect damages arising out of the use, performance, or delivery of BitDefender, even if SOFTWIN has been advised of the existence or possibility of such damages.

SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FORINCIDENTALORCONSEQUENTIALDAMAGES,SOTHEABOVELIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.

UNDER NO CIRCUMSTANCES SHALL SOFTWIN'S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR BITDEFENDER. The disclaimers and limitationssetforthaboveshallapplyregardlessofwhetheryouaccepttouse,evaluate, or test BitDefender.

IMPORTANT NOTICE TO USERS. THIS SOFTWARE IS NOT FAULT-TOLERANT AND IT IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. THIS SOFTWARE IS NOT INTENDED FOR USE IN THE OPERATION OF AIRCRAFT

xi

End User Software License Agreement

NAVIGATION,NUCLEARFACILITIES,ORCOMMUNICATIONSYSTEMS,WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICATION OR INSTALLATION WHERE FAILURE COULD RESULT IN DEATH, SEVERE PHYSICAL INJURY OR DAMAGE TO PROPERTY.

GENERAL. This Agreement shall be governed by the Romanian law and by the international copyright regulations and treaties. The courts of Romania shall have exclusive jurisdiction and venue to adjudicate any dispute arising from these License Terms.

BitDefender prices, costs and use fees are subject to change without prior notice to you.

In the event of invalidity of any provision of this Agreement, the invalidity shall not affect the validity of the remaining portions of this Agreement.

BitDefender and the BitDefender logos are trademarks of SOFTWIN. All other trademarks used in the product or in associated materials are property of their respective owners.

Any breach of these terms and conditions shall result in the immediate termination of this license, without any notice. You shall not be entitled to a refund from SOFTWIN or any resellers of BitDefender as a result of such termination. Confidentiality terms and conditions and restrictions on use shall remain in force even after termination.

SOFTWIN may revise these Terms at any time and the revised terms shall automatically apply to the corresponding versions of the Software distributed under such terms. None of these Terms being found to be void and unenforceable shall affect the validity of rest of the Terms, which shall remain valid and enforceable.

In case of controversy or inconsistency between the translations of these Terms into other languages, the English version issued by SOFTWIN shall prevail.

Contact SOFTWIN, at 5, Fabrica de Glucoza street, 72322-Sector 2, Bucharest, Romania, or at Tel No: 40-21-2330780 or Fax:40-21-2330763, e-mail address:

<office@bitdefender.com>

xii

Preface

Preface

This User's Guide is intended to all who have chosen BitDefender Antivirus Scanner for Unices as security solution for their systems. The information presented in this bookissuitablenotonlyforcomputerliterates,itisaccessibletoeveryonewhoisable to do administrative tasks on a Linux box.

ThisbookwilldescribeforyouBitDefenderAntivirusScannerforUnices,theCompany and the team who built it, will guide you through the installation process, will teach youhowtoconfigureitattheverydetail. YouwillfindhowtouseBitDefenderAntivirus Scanner for Unices, how to update, interrogate, test and customize it. You will learn how to integrate it with various software and how to get the best from BitDefender.

We wish you a pleasant and useful lecture.

1. Conventions used in this book

1.1. Typographical conventions

Several text styles are used in the book for an improved readability. Their aspect and meaning are presented in the table below.

Appearance

Description

variable

Variables and some numerical data are printed

 

with monospaced characters.

http://www.bitdefender.com

The URL links is pointing to some external

 

location, on http or ftp servers.

<support@bitdefender.com>

Emails are inserted in the text for contact

 

information.

Chapter5“Packageinstallation”(p. This is an internal link, towards some location

33)

inside the document.

filename

Fileanddirectoriesareprintedusing monospaced

 

font.

xiii

Preface

Appearance

Description

ENV_VAR

The environment variables are MONOSPACED

 

CAPITALS.

emphasized

The emphasized text is specially marked to

 

require your attention.

“quoted text”

The quoted text is provided as reference.

command

Inline commands are printed using strong

 

characters.

# command -parameter

Command examples are printed with strong

monospaced characters in specially marked

 

 

environment. The prompt can be one of the

 

following.

 

#

The root prompt. You should be root in

 

 

order to run this command.

 

$

Thenormaluserprompt. Youdonotneed

 

 

special privileges to run the command.

screen output

The screen output and code listings are printed withmonospacedcharactersinspeciallymarked environment.

1.2. Admonitions

The admonitions are in-text notes, graphically marked, offering to your attention additional information related to the current paragraph.

Note

The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic.

Important

This requires your attention and is not recommended to skip over it. Usually, it provides non-critical but significant information.

xiv

Preface

Warning

This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications. You should read and understand it, because it describes something extremely risky.

2. The book structure

The book consists of four parts, containing the major topics: Description and features, Installation, Usage and Getting help. Moreover, a glossary and UNIX manual pages are provided to clarify some different aspects of BitDefender, which could issue technical problems.

Description and features. A short introduction to BitDefender. It explains who is BitDefender, who is SOFTWIN and Data Security Division. You are presented BitDefender Antivirus Scanner for Unices, its features, the product components and the basics of the integration and the filtering mechanism.

Installation. Step by step instructions for installing BitDefender on a system. Starting with the prerequisites for a successfully installation, you are conducted through the whole installation process. Finally, the uninstall procedure is described in case you need to uninstall BitDefender.

Using BitDefender. Description of basic administration and maintenance of BitDefender. You are presented the BitDefender configuration file, how to get run-time information, how to test the antivirus efficiency, how to perform the updates and how to register the product. You are also presented real life usage scenarios, covering various aspects of using BitDefender to detect malware on your system, and several desktop and server integration procedures, to have the antivirus scanning the files directly from the file manager or the emails passing your local email server.

Getting help. Where to look and where to ask for help if something goes not so right. You are guided to the Knowledge Base and offered the BitDefender and BitDefender partners contact information to call, if needed.

Manual pages. The manual pages of BitDefender Antivirus Scanner for Unices are included for a quick and convenient reference. Whenever you will find examples of BitDefender commands, the manual pages will provide you a valuable help to understand all the options and actions.

Glossary. The Glossary tries to explain some technical and uncommon terms you will find in the pages of this book.

xv

Preface

3. Request for Comments

We invite you to help us improve the book. We have tested and verified all of the information to the best of our ability, but you may find that features have changed (or even that we have made mistakes). Please write to tell us about any flaws you find in this book or how you think it could be improved, to help us provide you the best documentation possible.

Let us know by sending an email to <documentation@bitdefender.com>.

xvi

Description and features

Description and features

Description and features

Overview

Description and

01

features

 

Chapter 1. Overview

BitDefenderprovidessecuritysolutionstosatisfytheprotectionrequirementsoftoday's computing environment, delivering effective threat management for over 41 million home and corporate users in more than 100 countries.

Designedtoprovidefullprotectionforcorporatenetworkandsystems,theBitDefender solution range comprises, beside antivirus protection, antispam, personal firewall and security management solutions. BitDefender also specializes in providing assistance with designing and establishing content security policies for corporate networks.

BitDefender Professional was the third product of its kind in the world to receive ICSA certification for Windows XP and the first to be awarded for groundbreaking innovation by the European Commission and Academies. BitDefender Antivirus is certified by all the major reviewers in the antivirus field - ICSA Labs, CheckMark, CheckVir, TÜV and Virus Bulletin.

BitDefender is headquartered in Bucharest, Romania and has offices in Tettnang, Germany, Barcelona, Spain and Florida, US. Website: http://www.bitdefender.com

1.1. Why BitDefender?

Proven. Most reactive antivirus producer. BitDefender fast reactivity in case of computervirusepidemicwasconfirmedbeginningwiththelastoutbreaksofCodeRed, NimdaandSircam,aswellasBadtrans.Borotherdangerous,fast-spreadingmalicious codes. BitDefenderwasthefirsttoprovideantidotesagainstthesecodesandtomake them freely available on the Internet for all affected people. Now, with the continuous expansion of the Klez virus - in various versions immediate antivirus protection has become once more a critical need for any computer system.

Innovative. Awarded for innovation by the European Commission and EuroCase.

BitDefender has been proclaimed a winner of the European IST-Prize, awarded by the European Commission and by representatives of 18 academies in Europe. Now in its eighth year, the European IST Prize is a reward for groundbreaking products that represent the best of European innovation in information technology.

Comprehensive. Covers every single point of your network, providing complete security. BitDefender security solutions for the corporate environment satisfy the protection requirements of today's business environment, enabling management of

19

01

Description and

Overview

features

 

all complex threats that endanger a network, from a small local area to large multi-server, multi-platform WAN's.

Your Ultimate Protection. The final frontier for any possible threat to your computer system. Asvirusdetectionbasedoncodeanalysishasnotalwaysoffered good results, BitDefender has implemented behavior-based protection, providing security against born-new malware. MIDAS (Malware Intrusion Detection Advanced System), featuring three levels of security, guarantees your serenity even after the fastest epidemics.

These are the costs that organizations want to avoid and what the security products are designed to prevent:

Worm attacks

Communication loss because of infected e-mails

E-mail breakdown

Cleaning and recovering systems

Lost productivity experienced by end users because systems are not available

Hacking, and unauthorized access that causes damage

Some simultaneously developments and benefits can be accomplished by using the BitDefender security suite:

Increase network availability by stopping the spread of malicious code attacks (i.e., Nimda, Trojan horses, DDoS).

Protect remote users from attacks.

Reduce administrative costs and deploys rapidly with BitDefender Enterprise management capabilities.

Stopthespreadingofmalwarethroughe-mail,usingaBitDefendere-mailprotection at the company's gateway. Temporarily or permanently block unauthorized, vulnerable, and expensive application connections.

1.2.Data Security Division

Ever since the beginning, SOFTWIN's Data Security Division approached data protection in a specific manner, with the first intelligent update, requiring no user intervention, the first remote antivirus management through WAP technology or the first Personal Firewall to be integrated within an antivirus engines to provide complete response to today's complex security threats.

Born to provide full data security at all critical levels in today's business environment, Data Security Division aims to ensure the protection of systems against computer

20

Overview

Description and

01

features

 

viruses,todoantivirusresearch,todevelopnewtechnologiesformonitoringallpossible ways to infect a system and, last but not least, to educate the IT&C public on the danger of computer viruses.

BitDefender security solutions satisfy the protection requirements of today's business environment, enabling management of all complex threats that endanger a network, from a small local area to large multi-server, multi-platform WAN's.

1.3. SOFTWIN

Bucharest-basedSOFTWINistheleadingproviderofcomplexsoftwaresolutionsand services in Romania.

SOFTWIN focuses on providing software solutions and services that enable fast growing companies to solve critical business challenges and to capitalize on new business opportunities.

SOFTWIN enables companies to focus on their core business and expand to new markets, by outsourcing non-core activities.

SOFTWINemploysover500highlyqualifiedprofessionalsexperiencedindeveloping customized solutions and services.

Since its establishment in 1990, SOFTWIN's average annual revenue has increased by +30%.

SOFTWIN has 4 divisions, which also define the company's main business lines:

Customer Relationship Management

Business Information Solutions

eContent Solutions

Data Security Solutions

SOFTWIN provides services and solutions to customers worldwide. Over 90% of the company's turnover is achieved from exports to the US and European Union.

Usingcuttingedgetechnologies,SOFTWINsuccessfullydevelopedover500software

developmentprojects,over3,500contentstructuringprojectsforinternationalpartners, having over 43 million data security solutions users in 80 countries worldwide and more than 1,500,000 client calls handled annually for CRM services.

21

01

Description and

Overview

features

 

22

Product features

Description and

02

features

Chapter 2. Product features

The acquisition and installation of an antivirus product for the personal or company's systems is the most efficient way of preventing the infection of a computer and the spreading of viruses inside the company, and outside the company as well.

2.1. BitDefender Antivirus Scanner for Unices

BitDefender Antivirus Scanner for Unices is the solution SOFTWIN offers for the antivirus protection of individual Linux systems. It uses the most advanced multi-platform virus inspection technology which scans for viruses and other malware on your personal system.

The on-demand scanner, for command line or shell scripts, features manual scan of individual files or entire file systems, malicious code detection and removal. After each scan, the program displays a detailed report on positive virus detections. Thanks to BitDefender scan engines advanced features, new, undiscovered threats can be detected and immediately eliminated from the system.

All the files specified in the command line are scanned using the BitDefender scan engines. This technology detects all the viruses from common files, archives or mailboxes. BitDefenderfeaturesbuilt-insupportformorethan80packedfilesformats, including RAR, ZIP, ARJ, LZH, LHA, ACE, GZIP, TARGZ, JAR, UUE, MIME or CAB archives, no matter how they were created (self-extractable, multivolume, etc).

In case an infection is found, the file will be treated corresponding to the selected option (disinfection, deletion, isolation in the quarantine area or just reporting) and notifications will be sent to console, as well as to the log file.

Forensuringasuperiorandefficientantivirusprotection,BitDefenderAntivirusScanner for Unices was designed with built-in update function.

23

02

Description and

features

Product features

2.2.Key Features

Antivirus protection for the file system.

Automaticandincrementalupdateofvirusdefinitionsandscanningenginesdirectly from BitDefender servers.

Ability to isolate the infected files in the quarantine zone.

Detailed statistics and reports regarding the number of scanned files, the infected files, the deleted and disinfected files.

24

The scanning mechanism

Description and

03

features

Chapter 3. The scanning mechanism

ThecentralpartofBitDefenderAntivirusScannerforUnicesconsistsoftheBitDefender architecture-independent scanning engines. These are specialized data analysis routinesandmalwaresignaturedefinitions,sincemanyvirusescanbeidentifiedupon a distinctive code pattern. The BitDefender Antivirus engine database includes over 250000 different malware signatures, at the moment of this writing, and the number constantly increases every few hours.

For identifying the unknown viruses, the engines can perform the heuristic analysis, searching for several features characterizing the viruses.

The objects to be scanned can be directories or regular files, provided as command lineparameters. Aftertheobjectiseventuallydeployedinatemporaryfile,theengines are asked to start the scanning process.

Using the powerful engines, the object is unpacked, if needed, and scanned. The scanning result is sent back to bdscan, which will further notify the user and will try to apply the desired action. The action can be one of the following, triggered with --action command line option.

Disinfect. BitDefender will try to disinfect the object, by removing the infected or suspected part. The action can fail sometimes.

Quarantine. Theobjectwillbemovedfromitsoriginallocationtoasecureddirectory, the quarantine.

Delete. The object will be simply removed from the filesystem.

Ignore. Even if infected objects are found, BitDefender will just report them and no action will be performed.

By default, bdscan will scan inside archives, inside mail boxes and inside packed programs. If this behavior is not desirable, there are command line options to disable them selectively --no-archive, --no-mail and --no-pack, respectively.

If the scanning path is a directory, bdscan will descend recursively in sub-directories and scan the files found. The recursion depth can be specified in command line or can be entirely disabled.

More in the manual page

Youcanfindmoreaboutthesupportedcommandlineoptionsin bdscan(8) manualpage.

25

03

Description and

features

The scanning mechanism

26

Installation

Installation

Installation

Prerequisites

Installation

04

 

 

 

Chapter 4. Prerequisites

BitDefender Antivirus Scanner for Unices can be installed on package based Linux distributions (rpm or deb) and tbz based FreeBSD versions, but also all the other distributionsaresupported,usingapseudo-packagesystem,withthesamefunctionality of the others. These packages are built as bzip2 compressed tars and include all the necessarypre-install,post-install,pre-removeandpost-removescripts. Theadequate package type should be installed according to the distribution.

4.1. System requirements

Before installing BitDefender Antivirus Scanner for Unices, you must verify that your system meets the following system requirements.

4.1.1. Hardware system requirements

Processor type

x86 compatible, minimum 166 MHz, but do not expect a great performance in this case. An i686 generation processor, at 300MHz, would make a better choice.

Memory

The minimum accepted value is 32MB, recommended is 64MB, for a better performance.

Free disk space

The minimum free disk space to install and run BitDefender Antivirus Scanner for Unices is 4MB. But the log and the quarantine directory could require more space.

Internet connection

Although BitDefender Antivirus Scanner for Unices will run with no Internet connection, the update procedure will require an active HTTP link, even through someproxyserver. Therefore,foranuptodateprotection,theInternetconnection is a MUST.

29

04

Installation

Prerequisites

 

 

 

4.1.2. Software system requirements

Linux requirements

The Linux kernel should be 2.2, 2.4 or 2.6, the recommended one is 2.6, with support for a fast file system, which works well with multiple small files, such as ext3 or reiserfs.

BitDefender requires glibc version 2.3, at least, and libstdc++ from gcc 3.x series.

FreeBSD requirements

The supported FreeBSD versions are 5.3-RELEASE and greater and 6.0-RELEASE and greater.

FreeBSD 4 is no longer supported.

4.2. Package naming convention

BitDefenderAntivirusScannerforUnicespackageisnamedconsideringthefollowing scheme.

4.2.1. Linux convention

BitDefender-scanner-{ver}.{os}.{arch}.{pkg}

Variable

Description

{ver}

This is the package version. For example, 7.5-3 is version 7,

 

subversion 5, package build 3.

{os}

The operating system is Linux.

{arch}

Thearchitecturecontainstheprocessorclassandgcccompiler

 

version. i586 is the current development version.

{pkg}

This refers to the package management tool used to install the

 

files. This is one of rpm, deb or run. rpm uses the Red Hat

 

Package Manager, deb uses the Debian package system and

 

run is a self-extractable archive, the most portable method.

 

Please install the appropriate package for your system, as

 

described in the next chapters.

30

Prerequisites

Installation

04

 

 

 

4.2.2. FreeBSD convention

bitdefender-scanner-{ver}.tbz

Where {ver} is the package version. For example, 7.5_3 is version 7, subversion 5, package build 3.

31

+ 71 hidden pages