Unisar BitDefender Antivirus Scanner for Unices User Manual

antivirus
antivirus
User's Guide
Copyright © 2006 SOFTWIN
BitDefender Antivirus Scanner for Unices
BitDefender Antivirus Scanner for Unices
User's Guide
SOFTWIN
Published 2006.04.27 Version 1.24.1867
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of SOFTWIN. The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparation of this document, the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of SOFTWIN, therefore SOFTWIN is not responsible for the content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk. SOFTWIN provides these links only as a convenience, and the inclusion of the link does not imply that SOFTWIN endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document are the sole property of their respective owners, and are respectfully acknowledged.
BitDefender Antivirus Scanner for Unices
As every cat owner knows, nobody owns a cat.
BitDefender Antivirus Scanner for Unices
BitDefender Antivirus Scanner for Unices

Table of Contents

End User Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . ix
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
1. Conventions used in this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
1.1. Typographical conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
2. The book structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Description and features . . . .. . .. . . . . . . . . . .. . . . . . . . . . .. . . . . 17
1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.1. Why BitDefender? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.2. Data Security Division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.3. SOFTWIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2. Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.1. BitDefender Antivirus Scanner for Unices . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.2. Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3. The scanning mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Installation . . . .. . .. . . . . . . . . . .. . . . . . . . . . .. . . . . . . . . . .. . . . . . . . . 27
4. Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.1. System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.1.1. Hardware system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.1.2. Software system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2. Package naming convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2.1. Linux convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2.2. FreeBSD convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5. Package installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5.1. Getting BitDefender Antivirus Scanner for Unices . . . . . . . . . . . . . . . . . . . . 33
5.2. Test the package for integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5.2.1. Test the rpm and deb packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5.2.2. Test the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5.2.3. Test the FreeBSD tbz package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5.3. Install the package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.3.1. Install the rpm package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.3.2. Install the deb package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
v
BitDefender Antivirus Scanner for Unices
5.3.3. Install the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.3.4. Install the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5.4. The installer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
6. Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.1. Uninstall the rpm package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.2. Uninstall the deb package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.3. Uninstall using the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.4. Uninstall the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
6.4.1. Uninstall a package downloaded locally . . . . . . . . . . . . . . . . . . . . . . . 40
6.4.2. Uninstall from the ports collection . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Using BitDefender .. .. . . . . . . . . . .. . . . . . . . . . .. . . . . . . . . . .. . .. . 41
7. The configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8. Testing BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
8.1. Scan an executable file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
8.2. Scan an archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
8.3. Scan a mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9. Real life usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.1. Virus scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.1.1. Scan a regular file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
9.1.2. Scan a directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
9.1.3. Scan the entire system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
9.1.4. Scan the archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
9.1.5. Scan the mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
9.2. Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.2.1. Using the log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
9.2.2. Get more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.2.3. Display the virus list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
9.2.4. Display the product version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
9.3. Virus submission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
10. BitDefender integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
10.1. Desktop integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
10.1.1. Midnight Commander . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
10.1.2. KDE Konqueror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
10.1.3. Krusader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
10.1.4. ROX-Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
10.1.5. Pine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
10.1.6. Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
10.1.7. KMail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
10.2. Server integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
10.2.1. Qmail-Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
10.2.2. MailScanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
vi
BitDefender Antivirus Scanner for Unices
10.2.3. Amavisd-new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
11. Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
11.1. Triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
11.1.1. Run the triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
11.1.2. Regular updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
11.1.3. HTTP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
11.2. Manual update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
12. Product registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
12.1. Trial License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
12.2. License for home or personal use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
12.3. License for commercial use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
13. Best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Getting help . . .. . .. . . . . . . . . . .. . . . . . . . . . .. . . . . . . . . . .. . . . . . . . 81
14. Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
15. Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
15.1. Support department . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
15.2. BitDefender Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
15.3. Contact information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
15.3.1. Web addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
15.3.2. Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Manual Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
bdscan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
vii
BitDefender Antivirus Scanner for Unices
viii

End User Software License Agreement

End User Software License Agreement
IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL THE SOFTWARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY INSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATING YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF THIS AGREEMENT.
These Terms cover the home-user or corporate BitDefender Solutions and Services licensed to you, including the related documentation and any update and upgrade of the applications delivered to you under the purchased license or under any related service agreement, as defined in the documentation, as well as any copy thereof.
This License Agreement is a legal agreement between you (either an individual or a legal person) and SOFTWIN for the use of the SOFTWIN software product identified above, which includes computer software and services, and may include the associated media, printed materials, and "online" or electronic documentation (hereinafter referred to as "BitDefender"), all of which are protected by international copyright laws and international treaties. By installing, copying or using BitDefender, you agree to be bound by the terms of this agreement.
If you do not agree to the terms of this agreement, do not install or use BitDefender. BitDefender License. BitDefender is protected by copyright laws and international
copyright treaties, as well as other intellectual property laws and treaties. BitDefender is licensed, not sold.
GRANT OF LICENSE. SOFTWIN hereby grants you and only you the following non-exclusive, limited, non-transferable and royalty-bearing license to use BitDefender.
The BitDefender Antivirus Scanner for Unices ("BitDefender") is subject to 3 types of license:
1. Trial License. The product is distributed with a trial key which grants the user a 30 day trial period as of install time, under the terms of the license agreement. At the end of the trial period, all scan- based product features (disinfect, delete) will be disabled and the user will have to either go online to www.bitdefender.com and register for a personal license or purchase a commercial license from any BitDefender reseller.
2. Home or Personal Use License. This license is free of charge and it can be retrieved from the BitDefender website after filling in a short form. It only allows the
ix
End User Software License Agreement
product to be used for personal purposes, with no commercial implications whatsoever, under the terms of the EULA. For example, under the Personal License, you are allowed to scan your personal laptop or desktop computer but YOU ARE NOT ALLOWED TO USE THE PRODUCT IN A BUSINESS ENVIRONMENT SUCH AS AN OFFICE COMPUTER OR A COMPANY SERVER.
3. Commercial Use License. If you intend to use BitDefender with your own integration system or pre-designed scripts, you must purchase the Commercial License. The commercial license allows for the product to be used in any environment whatsoever throughout the licensing period, under the terms of the EULA. Commercial Licenses are granted on an individual user basis, which simply means that the cost depends on how many users benefit from the features of the product.
LICENSE TERM. The license hereunder is granted as of the date BitDefender has been purchased and until the end of the period for which such license has been purchased.
UPGRADES. If BitDefender is upgrade labeled, in order to use it, you must hold a SOFTWIN license allowing you to use products identified by such company as eligible for upgrade. An upgrade labeled BitDefender product shall replace and/or supplement the product based on which your were eligibile for such upgrade. You may use the resulting upgraded product only in accordance with the terms of this License Agreement. If BitDefender is an upgrade of a software package component which was licensed to you as a single product, BitDefender may only be used and transferred as part of that single product package and it may not be separated so as to be used by more than the total number of licensed users. The terms and conditions of this license shall replace and supersede any previous agreements that may have existed between you and SOFTWIN regarding the original product or the resulting upgraded product.
COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyrights in and to BitDefender (including but not limited to any images, photographs, logos, animations, video, audio, music, text, and "applets" incorporated into BitDefender), the accompanying printed materials, and any copies of BitDefender are property of SOFTWIN. BitDefender is protected by copyright laws and international treaty provisions. Therefore, BitDefender must be treated as any other copyrighted material. The printed materials accompanying BitDefender shall not be copied. All copyright notices shall be reproduced and included, in their original form, in all of the BitDefender copies created, irrespective of the media or form in which BitDefender exists. The BitDefender license shall not be sub-licensed, rented, sold, leased or shared. The BitDefender source code shall not be reverse engineered, recompiled, disassembled, no derivative works shall be created based on it, it shall not be modified, translated and no attempts to discover it shall be made.
x
End User Software License Agreement
LIMITED WARRANTY. SOFTWIN warrants a 30 day fault free period for the media on which BitDefender is distributed as of the date BitDefender has been delivered to you. Any breach of this warranty shall only result in SOFTWIN replacing the faulty media, at its sole discretion, upon receipt of the said media, or refunding the BitDefender price. SOFTWIN does not warrant either the uninterrupted or error free operation of BitDefender or the correction of possible errors. SOFTWIN does not warrant that BitDefender will meet your requirements.
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT,SOFTWIN DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE PRODUCTS, ENHANCEMENTS, MAINTENANCE THEREOF OR SUPPORT RELATED THERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE) OR SERVICES THAT IT HAS SUPPLIED. SOFTWIN HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INTERFERENCE, ACCURACY OF DATA, ACCURACY OF INFORMATIONAL CONTENT, SYSTEM INTEGRATION, AND NON-INFRINGEMENT OF THIRD PARTY RIGHTS BY FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY'S SOFTWARE, SPYWARE, ADWARE, COOKIES, EMAILS, DOCUMENTS, ADVERTISEMENTS OR THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING, CUSTOM AND PRACTICE, OR TRADE USAGE.
DISCLAIMER OF DAMAGES. Anyone using, testing, or evaluating BitDefender shall bears all risks as to the quality and performance of BitDefender. Under no circumstances shall SOFTWIN be liable for any damages of any kind, including, without limitation, direct or indirect damages arising out of the use, performance, or delivery of BitDefender, even if SOFTWIN has been advised of the existence or possibility of such damages.
SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
UNDER NO CIRCUMSTANCES SHALL SOFTWIN'S LIABILITY EXCEED THE PURCHASE PRICE PAID BY YOU FOR BITDEFENDER. The disclaimers and limitations set forth above shall apply regardless of whether you accept to use, evaluate, or test BitDefender.
IMPORTANT NOTICE TO USERS. THIS SOFTWARE IS NOT FAULT-TOLERANT AND IT IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. THIS SOFTWARE IS NOT INTENDED FOR USE IN THE OPERATION OF AIRCRAFT
xi
End User Software License Agreement
NAVIGATION, NUCLEAR FACILITIES,OR COMMUNICATION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICATION OR INSTALLATION WHERE FAILURE COULD RESULT IN DEATH, SEVERE PHYSICAL INJURY OR DAMAGE TO PROPERTY.
GENERAL. This Agreement shall be governed by the Romanian law and by the international copyright regulations and treaties. The courts of Romania shall have exclusive jurisdiction and venue to adjudicate any dispute arising from these License Terms.
BitDefender prices, costs and use fees are subject to change without prior notice to you.
In the event of invalidity of any provision of this Agreement, the invalidity shall not affect the validity of the remaining portions of this Agreement.
BitDefender and the BitDefender logos are trademarks of SOFTWIN. All other trademarks used in the product or in associated materials are property of their respective owners.
Any breach of these terms and conditions shall result in the immediate termination of this license, without any notice. You shall not be entitled to a refund from SOFTWIN or any resellers of BitDefender as a result of such termination. Confidentiality terms and conditions and restrictions on use shall remain in force even after termination.
SOFTWIN may revise these Terms at any time and the revised terms shall automatically apply to the corresponding versions of the Software distributed under such terms. None of these Terms being found to be void and unenforceable shall affect the validity of rest of the Terms, which shall remain valid and enforceable.
In case of controversy or inconsistency between the translations of these Terms into other languages, the English version issued by SOFTWIN shall prevail.
Contact SOFTWIN, at 5, Fabrica de Glucoza street, 72322-Sector 2, Bucharest, Romania, or at Tel No: 40-21-2330780 or Fax:40-21-2330763, e-mail address:
<office@bitdefender.com>
xii

Preface

Preface
This User's Guide is intended to all who have chosen BitDefender Antivirus Scanner for Unices as security solution for their systems. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to do administrative tasks on a Linux box.
This book will describe for you BitDefender Antivirus Scanner for Unices, the Company and the team who built it, will guide you through the installation process, will teach you how to configure it at the very detail. You will find how to use BitDefender Antivirus Scanner for Unices, how to update, interrogate, test and customize it. You will learn how to integrate it with various software and how to get the best from BitDefender.
We wish you a pleasant and useful lecture.

1. Conventions used in this book

1.1. Typographical conventions

Several text styles are used in the book for an improved readability. Their aspect and meaning are presented in the table below.
DescriptionAppearance
variable
http://www.bitdefender.com
<support@bitdefender.com>
Chapter 5 “Package installation” (p.
33)
filename
Variables and some numerical data are printed with monospaced characters.
The URL links is pointing to some external location, on http or ftp servers.
Emails are inserted in the text for contact information.
This is an internal link, towards some location inside the document.
File and directories are printed using monospaced font.
xiii
ENV_VAR
emphasized
command
# command -parameter
Preface
DescriptionAppearance
The environment variables are MONOSPACED
CAPITALS.
The emphasized text is specially marked to require your attention.
The quoted text is provided as reference.“quoted text” Inline commands are printed using strong
characters. Command examples are printed with strong
monospaced characters in specially marked environment. The prompt can be one of the following.
# The root prompt. You should be root in
order to run this command.
$ The normal user prompt. You do not need
special privileges to run the command.
screen output
The screen output and code listings are printed with monospaced characters in specially marked environment.

1.2. Admonitions

The admonitions are in-text notes, graphically marked, offering to your attention additional information related to the current paragraph.
Note
The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic.
Important
This requires your attention and is not recommended to skip over it. Usually, it provides non-critical but significant information.
xiv
Preface
Warning
This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications. You should read and understand it, because it describes something extremely risky.

2. The book structure

The book consists of four parts, containing the major topics: Description and features, Installation, Usage and Getting help. Moreover, a glossary and UNIX manual pages are provided to clarify some different aspects of BitDefender, which could issue technical problems.
Description and features. A short introduction to BitDefender. It explains who is
BitDefender, who is SOFTWIN and Data Security Division. You are presented BitDefender Antivirus Scanner for Unices, its features, the product components and the basics of the integration and the filtering mechanism.
Installation. Step by step instructions for installing BitDefender on a system. Starting
with the prerequisites for a successfully installation, you are conducted through the whole installation process. Finally, the uninstall procedure is described in case you need to uninstall BitDefender.
Using BitDefender. Description of basic administration and maintenance of
BitDefender. You are presented the BitDefender configuration file, how to get run-time information, how to test the antivirus efficiency, how to perform the updates and how to register the product. You are also presented real life usage scenarios, covering various aspects of using BitDefender to detect malware on your system, and several desktop and server integration procedures, to have the antivirus scanning the files directly from the file manager or the emails passing your local email server.
Getting help. Where to look and where to ask for help if something goes not so right.
You are guided to the Knowledge Base and offered the BitDefender and BitDefender partners contact information to call, if needed.
Manual pages. The manual pages of BitDefender Antivirus Scanner for Unices are
included for a quick and convenient reference. Whenever you will find examples of BitDefender commands, the manual pages will provide you a valuable help to understand all the options and actions.
Glossary. The Glossary tries to explain some technical and uncommon terms you
will find in the pages of this book.
xv
Preface

3. Request for Comments

We invite you to help us improve the book. We have tested and verified all of the information to the best of our ability, but you may find that features have changed (or even that we have made mistakes). Please write to tell us about any flaws you find in this book or how you think it could be improved, to help us provide you the best documentation possible.
Let us know by sending an email to <documentation@bitdefender.com>.
xvi

Description and features

Description and features
Description and features
Overview
Description and features

Chapter 1. Overview

BitDefender provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management for over 41 million home and corporate users in more than 100 countries.
Designed to provide full protection for corporate network and systems, the BitDefender solution range comprises, beside antivirus protection, antispam, personal firewall and security management solutions. BitDefender also specializes in providing assistance with designing and establishing content security policies for corporate networks.
BitDefender Professional was the third product of its kind in the world to receive ICSA certification for Windows XP and the first to be awarded for groundbreaking innovation by the European Commission and Academies. BitDefender Antivirus is certified by all the major reviewers in the antivirus field - ICSA Labs, CheckMark, CheckVir, TÜV and Virus Bulletin.
BitDefender is headquartered in Bucharest, Romania and has offices in Tettnang, Germany, Barcelona, Spain and Florida, US. Website: http://www.bitdefender.com
01

1.1. Why BitDefender?

Proven. Most reactive antivirus producer. BitDefender fast reactivity in case of computer virus epidemic was confirmed beginning with the last outbreaks of CodeRed, Nimda and Sircam, as well as Badtrans.B or other dangerous, fast-spreading malicious codes. BitDefender was the first to provide antidotes against these codes and to make them freely available on the Internet for all affected people. Now, with the continuous expansion of the Klez virus - in various versions immediate antivirus protection has become once more a critical need for any computer system.
Innovative. Awarded for innovation by the European Commission and EuroCase.
BitDefender has been proclaimed a winner of the European IST-Prize, awarded by the European Commission and by representatives of 18 academies in Europe. Now in its eighth year, the European IST Prize is a reward for groundbreaking products that represent the best of European innovation in information technology.
Comprehensive. Covers every single point of your network, providing complete security. BitDefender security solutions for the corporate environment satisfy the
protection requirements of today's business environment, enabling management of
19
01
Description and
Overview
features
all complex threats that endanger a network, from a small local area to large multi-server, multi-platform WAN's.
Your Ultimate Protection. The final frontier for any possible threat to your computer system. As virus detection based on code analysis has not always offered
good results, BitDefender has implemented behavior-based protection, providing security against born-new malware. MIDAS (Malware Intrusion Detection Advanced System), featuring three levels of security, guarantees your serenity even after the fastest epidemics.
These are the costs that organizations want to avoid and what the security products are designed to prevent:
Worm attacks
Communication loss because of infected e-mails
E-mail breakdown
Cleaning and recovering systems
Lost productivity experienced by end users because systems are not available
Hacking, and unauthorized access that causes damage
Some simultaneously developments and benefits can be accomplished by using the BitDefender security suite:
Increase network availability by stopping the spread of malicious code attacks (i.e.,
Nimda, Trojan horses, DDoS).
Protect remote users from attacks.
Reduce administrative costs and deploys rapidly with BitDefender Enterprise
management capabilities.
Stop the spreading of malware through e-mail, using a BitDefender e-mail protection
at the company's gateway. Temporarily or permanently block unauthorized, vulnerable, and expensive application connections.

1.2. Data Security Division

Ever since the beginning, SOFTWIN's Data Security Division approached data protection in a specific manner, with the first intelligent update, requiring no user intervention, the first remote antivirus management through WAP technology or the first Personal Firewall to be integrated within an antivirus engines to provide complete response to today's complex security threats.
Born to provide full data security at all critical levels in today's business environment, Data Security Division aims to ensure the protection of systems against computer
20
Overview
Description and features
viruses, to do antivirus research, to develop new technologies for monitoring all possible ways to infect a system and, last but not least, to educate the IT&C public on the danger of computer viruses.
BitDefender security solutions satisfy the protection requirements of today's business environment, enabling management of all complex threats that endanger a network, from a small local area to large multi-server, multi-platform WAN's.

1.3. SOFTWIN

Bucharest-based SOFTWIN is the leading provider of complex software solutions and services in Romania.
SOFTWIN focuses on providing software solutions and services that enable fast growing companies to solve critical business challenges and to capitalize on new business opportunities.
SOFTWIN enables companies to focus on their core business and expand to new markets, by outsourcing non-core activities.
SOFTWIN employs over 500 highly qualified professionals experienced in developing customized solutions and services.
Since its establishment in 1990, SOFTWIN's average annual revenue has increased by +30%.
SOFTWIN has 4 divisions, which also define the company's main business lines:
01
Customer Relationship Management
Business Information Solutions
eContent Solutions
Data Security Solutions
SOFTWIN provides services and solutions to customers worldwide. Over 90% of the company's turnover is achieved from exports to the US and European Union.
Using cutting edge technologies, SOFTWIN successfully developed over 500 software development projects, over 3,500 content structuring projects for international partners, having over 43 million data security solutions users in 80 countries worldwide and more than 1,500,000 client calls handled annually for CRM services.
21
01
Description and
features
Overview
22
Product features
Description and features

Chapter 2. Product features

The acquisition and installation of an antivirus product for the personal or company's systems is the most efficient way of preventing the infection of a computer and the spreading of viruses inside the company, and outside the company as well.

2.1. BitDefender Antivirus Scanner for Unices

BitDefender Antivirus Scanner for Unices is the solution SOFTWIN offers for the antivirus protection of individual Linux systems. It uses the most advanced multi-platform virus inspection technology which scans for viruses and other malware on your personal system.
The on-demand scanner, for command line or shell scripts, features manual scan of individual files or entire file systems, malicious code detection and removal. After each scan, the program displays a detailed report on positive virus detections. Thanks to BitDefender scan engines advanced features, new, undiscovered threats can be detected and immediately eliminated from the system.
All the files specified in the command line are scanned using the BitDefender scan engines. This technology detects all the viruses from common files, archives or mailboxes. BitDefender features built-in support for more than 80 packed files formats, including RAR, ZIP, ARJ, LZH, LHA, ACE, GZIP, TARGZ, JAR, UUE, MIME or CAB archives, no matter how they were created (self-extractable, multivolume, etc).
In case an infection is found, the file will be treated corresponding to the selected option (disinfection, deletion, isolation in the quarantine area or just reporting) and notifications will be sent to console, as well as to the log file.
For ensuring a superior and efficient antivirus protection, BitDefender Antivirus Scanner for Unices was designed with built-in update function.
02
23
02
Description and

2.2. Key Features

Antivirus protection for the file system.
Automatic and incremental update of virus definitions and scanning engines directly
from BitDefender servers.
Ability to isolate the infected files in the quarantine zone.
Detailed statistics and reports regarding the number of scanned files, the infected
files, the deleted and disinfected files.
Product features
features
24
The scanning mechanism
Description and features

Chapter 3. The scanning mechanism

The central part of BitDefender Antivirus Scanner for Unices consists of the BitDefender architecture-independent scanning engines. These are specialized data analysis routines and malware signature definitions, since many viruses can be identified upon a distinctive code pattern. The BitDefender Antivirus engine database includes over 250000 different malware signatures, at the moment of this writing, and the number constantly increases every few hours.
For identifying the unknown viruses, the engines can perform the heuristic analysis, searching for several features characterizing the viruses.
The objects to be scanned can be directories or regular files, provided as command line parameters. After the object is eventually deployed in a temporary file, the engines are asked to start the scanning process.
Using the powerful engines, the object is unpacked, if needed, and scanned. The scanning result is sent back to bdscan, which will further notify the user and will try to apply the desired action. The action can be one of the following, triggered with
--action command line option.
03
Disinfect. BitDefender will try to disinfect the object, by removing the infected or
suspected part. The action can fail sometimes.
Quarantine. The object will be moved from its original location to a secured directory,
the quarantine.
Delete. The object will be simply removed from the filesystem.
Ignore. Even if infected objects are found, BitDefender will just report them and no
action will be performed.
By default, bdscan will scan inside archives, inside mail boxes and inside packed programs. If this behavior is not desirable, there are command line options to disable them selectively --no-archive, --no-mail and --no-pack, respectively.
If the scanning path is a directory, bdscan will descend recursively in sub-directories and scan the files found. The recursion depth can be specified in command line or can be entirely disabled.
More in the manual page
You can find more about the supported command line options in bdscan(8) manual page.
25
03
Description and
features
The scanning mechanism
26

Installation

Installation
Installation
Prerequisites
Installation

Chapter 4. Prerequisites

BitDefender Antivirus Scanner for Unices can be installed on package based Linux distributions (rpm or deb) and tbz based FreeBSD versions, but also all the other distributions are supported, using a pseudo-package system, with the same functionality of the others. These packages are built as bzip2 compressed tars and include all the necessary pre-install, post-install, pre-remove and post-remove scripts. The adequate package type should be installed according to the distribution.

4.1. System requirements

Before installing BitDefender Antivirus Scanner for Unices, you must verify that your system meets the following system requirements.
4.1.1. Hardware system requirements
04
Processor type
x86 compatible, minimum 166 MHz, but do not expect a great performance in this case. An i686 generation processor, at 300MHz, would make a better choice.
Memory
The minimum accepted value is 32MB, recommended is 64MB, for a better performance.
Free disk space
The minimum free disk space to install and run BitDefender Antivirus Scanner for Unices is 4MB. But the log and the quarantine directory could require more space.
Internet connection
Although BitDefender Antivirus Scanner for Unices will run with no Internet connection, the update procedure will require an active HTTP link, even through some proxy server. Therefore, for an up to date protection, the Internet connection is a MUST.
29
04
Installation
4.1.2. Software system requirements
Linux requirements
The Linux kernel should be 2.2, 2.4 or 2.6, the recommended one is 2.6, with support for a fast file system, which works well with multiple small files, such as ext3 or reiserfs.
BitDefender requires glibc version 2.3, at least, and libstdc++ from gcc 3.x series.
FreeBSD requirements
The supported FreeBSD versions are 5.3-RELEASE and greater and
6.0-RELEASE and greater. FreeBSD 4 is no longer supported.

4.2. Package naming convention

BitDefender Antivirus Scanner for Unices package is named considering the following scheme.
Prerequisites
4.2.1. Linux convention
BitDefender-scanner-{ver}.{os}.{arch}.{pkg}
{ver}
{arch}
{pkg}
30
DescriptionVariable
This is the package version. For example, 7.5-3 is version 7, subversion 5, package build 3.
The operating system is Linux.{os} The architecture contains the processor class and gcc compiler
version. i586 is the current development version. This refers to the package management tool used to install the
files. This is one of rpm, deb or run. rpm uses the Red Hat Package Manager, deb uses the Debian package system and
run is a self-extractable archive, the most portable method.
Please install the appropriate package for your system, as described in the next chapters.
Loading...
+ 72 hidden pages