voidinput_event(structinput_dev* dev, unsigned int type, unsigned int code, int value) report new input event Parameters structinput_dev*devdevice that generated the eventunsignedinttypetype of the eventunsignedintcodeevent codeintvaluevalue of the event
Description This function should be used by drivers implementing various input devices to report input events. See alsoinput_inject_event(). NOTE input_event()may be safely used right after input device was allocated withinput_allocate_device(), even before it is registered withinput_register_device(), but the event will not reach any of the input handlers. Such early invocation ofinput_event()may be used to ‘seed’ initial state of a switch or initial position of absolute axis, etc.
$ sudo apt-cache search clamav amavisd-new - MTA와 바이러스 검사 프로그램 간 인터페이스/내용 필터 clamav - 유닉스용 안티 바이러스 유틸리티 - 명령행 인터페이스 clamav-base - anti-virus utility for Unix - base package clamav-daemon - anti-virus utility for Unix - scanner daemon clamav-freshclam - anti-virus utility for Unix - virus database update utility clamdscan - anti-virus utility for Unix - scanner client libclamav-dev - anti-virus utility for Unix - development files libclamav9 - anti-virus utility for Unix - library clamsmtp - 바이러스 스캐닝 SMTP 프락시 clamtk - ClamAV용 그래픽 프런트엔드 courier-filter-perl - Courier MTA용 순수 펄기반 메일 필터 프레임워크 amavisd-new-postfix - part of Ubuntu mail stack provided by Ubuntu server team clamassassin - email virus filter wrapper for ClamAV clamav-cvdupdate - ClamAV Private Database Mirror Updater Tool clamav-milter - anti-virus utility for Unix - sendmail integration clamav-testfiles - anti-virus utility for Unix - test files clamav-unofficial-sigs - update script for 3rd-party clamav signatures clamfs - user-space anti-virus protected file system clamtk-gnome - GNOME (Nautilus) MenuProvider extension for ClamTk claws-mail-clamd-plugin - ClamAV socket-based plugin for Claws Mail havp - HTTP Anti Virus Proxy libc-icap-mod-virus-scan - Antivirus Service for c-icap libclamav-client-perl - Perl client for the ClamAV virus scanner daemon monitoring-plugins-contrib - Plugins for nagios compatible monitoring systems postgresql-14-snakeoil - PostgreSQL anti-virus scanner based on ClamAV proftpd-mod-clamav - ProFTPD module mod_clamav python3-pyclamd - Python 3 interface to the ClamAV daemon libclamunrar9 - anti-virus utility for Unix - unrar support clamav-doc - anti-virus utility for Unix - documentation clamav-docs - anti-virus utility for Unix - documentation libclamav12 - anti-virus utility for Unix - library clamav-testfiles-rar - anti-virus utility for Unix - test files libclamunrar - anti-virus utility for Unix - unrar support libclamunrar12 - anti-virus utility for Unix - unrar support
깔면 알아서 업데이트용 프로그램과 함께 설치된다.
$ sudo apt-get install clamav 패키지 목록을 읽는 중입니다... 완료 의존성 트리를 만드는 중입니다... 완료 상태 정보를 읽는 중입니다... 완료 다음의 추가 패키지가 설치될 것입니다 : clamav-base clamav-freshclam libclamav12 libmspack0 제안하는 패키지: libclamunrar clamav-doc libclamunrar11 다음 새 패키지를 설치할 것입니다: clamav clamav-base clamav-freshclam libclamav12 libmspack0 0개 업그레이드, 5개 새로 설치, 0개 제거 및 0개 업그레이드 안 함. 6,682 k바이트 아카이브를 받아야 합니다. 이 작업 후 31.4 M바이트의 디스크 공간을 더 사용하게 됩니다. 계속 하시겠습니까? [Y/n]
freshclam은 이미 백그라운드로 돌고 있어서 굳이 수동으로 할 필요는 없어 보인다.
$ sudo freshclam ERROR: Failed to lock the log file /var/log/clamav/freshclam.log: Resource temporarily unavailable ERROR: Problem with internal logger (UpdateLogFile = /var/log/clamav/freshclam.log). ERROR: initialize: libfreshclam init failed. ERROR: Initialization error!
--help -h Show this help --version -V Print version number --verbose -v Be verbose --archive-verbose -a Show filenames inside scanned archives --debug Enable libclamav's debug messages --quiet Only output error messages --stdout Write to stdout instead of stderr. Does not affect 'debug' messages. --no-summary Disable summary at end of scanning --infected -i Only print infected files --suppress-ok-results -o Skip printing OK files --bell Sound bell on virus detection
--tempdir=DIRECTORY Create temporary files in DIRECTORY --leave-temps[=yes/no(*)] Do not remove temporary files --force-to-disk[=yes/no(*)] Create temporary files for nested file scans that would otherwise be in-memory only --gen-json[=yes/no(*)] Generate JSON metadata for the scanned file(s). For testing & development use ONLY. JSON will be printed if --debug is enabled. A JSON file will dropped to the temp directory if --leave-temps is enabled. --database=FILE/DIR -d FILE/DIR Load virus database from FILE or load all supported db files from DIR --official-db-only[=yes/no(*)] Only load official signatures --fail-if-cvd-older-than=days Return with a nonzero error code if virus database outdated. --log=FILE -l FILE Save scan report to FILE --recursive[=yes/no(*)] -r Scan subdirectories recursively --allmatch[=yes/no(*)] -z Continue scanning within file after finding a match --cross-fs[=yes(*)/no] Scan files and directories on other filesystems --follow-dir-symlinks[=0/1(*)/2] Follow directory symlinks (0 = never, 1 = direct, 2 = always) --follow-file-symlinks[=0/1(*)/2] Follow file symlinks (0 = never, 1 = direct, 2 = always) --file-list=FILE -f FILE Scan files from FILE --remove[=yes/no(*)] Remove infected files. Be careful! --move=DIRECTORY Move infected files into DIRECTORY --copy=DIRECTORY Copy infected files into DIRECTORY --exclude=REGEX Don't scan file names matching REGEX --exclude-dir=REGEX Don't scan directories matching REGEX --include=REGEX Only scan file names matching REGEX --include-dir=REGEX Only scan directories matching REGEX
--bytecode[=yes(*)/no] Load bytecode from the database --bytecode-unsigned[=yes/no(*)] Load unsigned bytecode **Caution**: You should NEVER run bytecode signatures from untrusted sources. Doing so may result in arbitrary code execution. --bytecode-timeout=N Set bytecode timeout (in milliseconds) --statistics[=none(*)/bytecode/pcre] Collect and print execution statistics --detect-pua[=yes/no(*)] Detect Possibly Unwanted Applications --exclude-pua=CAT Skip PUA sigs of category CAT --include-pua=CAT Load PUA sigs of category CAT --detect-structured[=yes/no(*)] Detect structured data (SSN, Credit Card) --structured-ssn-format=X SSN format (0=normal,1=stripped,2=both) --structured-ssn-count=N Min SSN count to generate a detect --structured-cc-count=N Min CC count to generate a detect --structured-cc-mode=X CC mode (0=credit debit and private label, 1=credit cards only --scan-mail[=yes(*)/no] Scan mail files --phishing-sigs[=yes(*)/no] Enable email signature-based phishing detection --phishing-scan-urls[=yes(*)/no] Enable URL signature-based phishing detection --heuristic-alerts[=yes(*)/no] Heuristic alerts --heuristic-scan-precedence[=yes/no(*)] Stop scanning as soon as a heuristic match is found --normalize[=yes(*)/no] Normalize html, script, and text files. Use normalize=no for yara compatibility --scan-pe[=yes(*)/no] Scan PE files --scan-elf[=yes(*)/no] Scan ELF files --scan-ole2[=yes(*)/no] Scan OLE2 containers --scan-pdf[=yes(*)/no] Scan PDF files --scan-swf[=yes(*)/no] Scan SWF files --scan-html[=yes(*)/no] Scan HTML files --scan-xmldocs[=yes(*)/no] Scan xml-based document files --scan-hwp3[=yes(*)/no] Scan HWP3 files --scan-onenote[=yes(*)/no] Scan OneNote files --scan-archive[=yes(*)/no] Scan archive files (supported by libclamav) --scan-image[=yes(*)/no] Scan image (graphics) files --scan-image-fuzzy-hash[=yes(*)/no] Detect files by calculating image (graphics) fuzzy hashes --alert-broken[=yes/no(*)] Alert on broken executable files (PE & ELF) --alert-broken-media[=yes/no(*)] Alert on broken graphics files (JPEG, TIFF, PNG, GIF) --alert-encrypted[=yes/no(*)] Alert on encrypted archives and documents --alert-encrypted-archive[=yes/no(*)] Alert on encrypted archives --alert-encrypted-doc[=yes/no(*)] Alert on encrypted documents --alert-macros[=yes/no(*)] Alert on OLE2 files containing VBA macros --alert-exceeds-max[=yes/no(*)] Alert on files that exceed max file size, max scan size, or max recursion limit --alert-phishing-ssl[=yes/no(*)] Alert on emails containing SSL mismatches in URLs --alert-phishing-cloak[=yes/no(*)] Alert on emails containing cloaked URLs --alert-partition-intersection[=yes/no(*)] Alert on raw DMG image files containing partition intersections --nocerts Disable authenticode certificate chain verification in PE files --dumpcerts Dump authenticode certificate chain in PE files
--max-scantime=#n Scan time longer than this will be skipped and assumed clean (milliseconds) --max-filesize=#n Files larger than this will be skipped and assumed clean --max-scansize=#n The maximum amount of data to scan for each container file (**) --max-files=#n The maximum number of files to scan for each container file (**) --max-recursion=#n Maximum archive recursion level for container file (**) --max-dir-recursion=#n Maximum directory recursion level --max-embeddedpe=#n Maximum size file to check for embedded PE --max-htmlnormalize=#n Maximum size of HTML file to normalize --max-htmlnotags=#n Maximum size of normalized HTML file to scan --max-scriptnormalize=#n Maximum size of script file to normalize --max-ziptypercg=#n Maximum size zip to type reanalyze --max-partitions=#n Maximum number of partitions in disk image to be scanned --max-iconspe=#n Maximum number of icons in PE file to be scanned --max-rechwp3=#n Maximum recursive calls to HWP3 parsing function --pcre-match-limit=#n Maximum calls to the PCRE match function. --pcre-recmatch-limit=#n Maximum recursive calls to the PCRE match function. --pcre-max-filesize=#n Maximum size file to perform PCRE subsig matching. --disable-cache Disable caching and cache checks for hash sums of scanned files.
Pass in - as the filename for stdin.
(*) Default scan settings (**) Certain files (e.g. documents, archives, etc.) may in turn contain other files inside. The above options ensure safe processing of this kind of data.