uvscan在linux下可以实现实时杀毒吗?

发布于 2022-09-26 10:46:59 字数 29391 浏览 9 评论 0

本人有台网站服务器,已经安装上了uvscan并可以正常杀毒,请问可以运行在后台进行实时杀毒吗?

[pat@localhost uvscan]$ uvscan -h
Usage:
  uvscan [--afc] [--allole] [--analyse | --analyze]
         [-c | --clean] [--cleandocall] [--config file]
         [--dam] [-d | --dat | --data-directory] [--delete]
         [--exclude file] [-e | --exit-on-error] [--extlist]
         [--extensions EXT1[,EXT2...]] [--extra file]
         [--fam] [-f | --file file] [--floppya] [--floppyb]
         [-h | --help] [--ignore-compressed] [--ignore-links] [--load file]
         [--mailbox] [--manalyse | --manalyze | --macro-heuristics]
         [--maxfilesize XXX] [--mime] [-m | --move directory]
         [--noboot] [--nocomp] [--nodecrypt] [--nodoc] [--noexpire]
         [--norename] [--one-file-system]
         [--panalyse | --panalyze] [-p | --atime-preserve | --plad]
         [--program] [-r | --recursive | --sub]
         [--secure] [-s | --selected] [--summary]
         [-u | --unzip] [-v | --verbose] [--version] [--virus-list]
         [-] {file / directory}

[pat@localhost uvscan]$ man uvscan
XXX
XXX WARNING: old character encoding and/or character set
XXX
UVSCAN(1)                                                                                                               UVSCAN(1)

NAME
       uvscan  - detects and cleans computer viruses and other potentially harmful software

SYNOPSIS
       uvscan
         [--afc size] [--allole] [--analyze | --analyse]
         [-c |--clean] [--cleandocall] [--config file]
         [--dam] [-d | --dat | --data-directory directory] [--delete]
         [--exclude file] [-e |--exit-on-error]
         [--extensions EXT1,[EXT2]] [--extlist] [--extra file]
         [--fam] [-f | --file file] [--floppya] [--floppyb]
         [-h | --help] [--ignore-compressed] [--ignore-links] [--load file]
         [--mailbox] [--manalyze | --manalyse | --macro-heuristics]
         [--maxfilesize size]   [--mime] [-m | --move directory]
         [--noboot] [--nocomp] [--nodecrypt] [--nodoc] [--noexpire]
         [--nojokes] [--norename] [--noscript] [--one-file-system]
         [--panalyze | --panalyse] [-p | --atime-preserve | --plad]
         [--program] [-r | --recursive | --sub]
         [--secure] [-s | --selected] [--showcomp] [--summary]
         [--timeout seconds]
         [-u | --unzip] [-v | --verbose] [--version] [--virus-list]
         [-] [file | directory]

DESCRIPTION
       This  program  scans  directories  and  individual  files (including some types of compressed files) for viruses and other
       potentially harmful software.  In addition, the Intel-based FreeBSD and  Linux  distributions  can  scan  for  boot-sector
       viruses.

       The program options allow you to determine:
           how and where to look for infected files.
           how to respond to any infected files.
           how to report its scanning activities.

       When  run without options, the program simply displays a brief summary of its options. When run with only a directory name
       specified, the program scans every file in that directory only, and issues a message if any infected file is found.

       Many extra options are available, as described next.

OPTIONS
       -      Denote the end of options in the command line. Anything after this is a file or directory to scan.

              Alternatively, this option denotes that the following file is prefixed with "-".  This  option  therefore  prevents
              any confusion between file names and options.

       --afc size
              Specify  the  file cache size. By default, the cache size is 12MB. A larger cache size can improve scanning perfor-
              mance in some cases, unless the computer has low memory.  The range of sizes allowed is 8Mb to 512Mb.  Specify  the
              size in megabytes. For example, --afc 64 specifies 64Mb of cache.

       --allole
              Check every file for OLE objects.

       --analyze, --analyse
              Use  heuristic analysis to find potential viruses in program files and in macros that otherwise appear to be clean.
              This analysis occurs after the program has checked the file for other viruses.

       -c, --clean
              Automatically remove any viruses from infected files.  (By default, the program states only  that  infections  were
              found but does not try to clean the infected file.)

              If the program cannot clean the file, it tries to rename the file, and displays a warning message.

       --cleandocall, --dam
              Delete all macros in a file if an infected macro is found.  Use this option with caution with the --fam option.

       --config file, --load file
              Run the options specified in the file.  You may not nest configuration files within other configuration files.

       -d directory, --dat directory, --data-directory directory
              Specify  the location of the DAT files. If you do not specify this option in the command line, the program looks in
              the same directory from where it is executed. If the program cannot find these data files, it issues exit  code  6.

       --delete
              Automatically delete any infected files that are found.

       -e, --exit-on-error
              Quit  and display an error message if an error occurs.  The error message indicates the severity of the error.  See
              "DIAGNOSTICS" for an explanation of exit codes.

       --exclude file
              Exclude the directories or files from the scan as specified in the file.

       --extensions EXT1[,EXT2,...]
              Examine files that have the specified extensions.  Separate each extension name with a comma, but without a  space.
              By default, the program scans all files. If you choose this option, the program scans only susceptible files, files
              with execute permission, and those you specify here.  To see the list  of  susceptible  files,  use  the  --extlist
              option.

       --extlist
              Display  a  list of all file extensions that are susceptible to infection.  These are scanned when -s or --selected
              is set.

       --extra file
              Specify the full path and file name of any extra.dat file.  If you do not specify this option in the command  line,
              the program looks in the same directory from where it was executed. If it cannot find this file, the program issues
              exit code 6.

       -f file, --file file
              Scan the directories or files as specified in the file.

       --fam
              Find all files that have macros, not just macros suspected as being infected.  Take care if  you  use  this  option
              with the --cleandocall, --dam options.

       --floppya, --floppyb
              Scan  the boot sector of the floppy disk in drive A or B.  This option is for Intel-based UNIX systems only, namely
              FreeBSD and Linux.

       -h, --help
              Display a list of all options.

       --ignore-compressed, --nocomp
              Ignore compressed files. By default, the program scans files  saved  in  these  compression  formats:  ICE,  LZEXE,
              PKLITE,  Cryptcom,  COM2EXE,  Diet,  Teledisk, Microsoft Expand and GZIP. This option reduces the scanning time but
              increases the threat because many file types are not scanned.

       --ignore-links
              Do not resolve any symbolic links and do not scan the link targets.    Normally the program 鈥檉ollows鈥?each symbolic
              link and scans the linked file.

       -m directory, --move directory
              Move  any infected files to a quarantine location as specified.  When the program moves an infected file, it repli-
              cates the full directory path of the infected file inside the quarantine directory so you can determine the  origi-
              nal  location  of  the  infected file.  If you use this option with -c or --clean , the program copies the infected
              files to a quarantine location and tries to clean the original.  If the  program  cannot  clean  the  original,  it
              deletes the file.

       --mailbox
              Scan plain-text mailboxes such as Eudora, PINE, and Netscape.  Most mailboxes will be in MIME format, and therefore
              the --mime option is also required.  This option does not clean or rename  infected  mail  items;  you  must  first
              extract them from the mailbox.

       --manalyze, --manalyse, --macro-heuristics
              Use heuristic analysis to find potential macro viruses.  This option is a subset of --analyze, --analyse

       --maxfilesize size
              Examine only those files that are smaller than the specified file size (measured in Megabytes). For example, --max-
              filesize 5 means files smaller than 5 Megabytes.

       --mime
              Scan MIME-encoded files.  This type of file is not scanned by default.

       --noboot
              Do not scan the boot sector.

       --nodecrypt
              Do not decrypt Microsoft Office compound documents that are password-protected.  By default,  macros  inside  pass-
              word-protected compound documents are scanned by employing "password cracking" techniques. If, for reasons of secu-
              rity, you do not require these techniques, use this option. Password cracking does not render the file readable.

       --nodoc
              Do not scan Microsoft Office document files.

       --noexpire
              Do not issue a warning if the DAT files are out of date.

       --nojokes
              Do not report any joke programs.

       --norename
              Do not rename an infected file that cannot be repaired.

       --noscript
              Do not scan files that contain HTML, JavaScript, Visual Basic, or Script Component Type Libraries.   This  type  of
              file is normally scanned by default. Stand-alone JavaScript and Visual Basic Script files will still be scanned.

       --one-file-system
              Scan an entire directory tree without scanning mounted file systems, if you use this option in conjunction with the
              -r, --recursive, --sub option.  Normally, the program treats a mount point as a subdirectory and  scans  that  file
              system.  This  option  prevents  the scan from running in subdirectories that are on a different file system to the
              original directory.

       -p, --atime-preserve, --plad
              Preserve the last-accessed time and date for files that are scanned.  This is important for use  with  some  backup
              software.

       --panalyze, --panalyse
              Use heuristic detection to identify potential program viruses.  This is a subset of --analyze, --analyse

       --program
              Scan for potentially harmful applications such as password crackers.

       -r, --recursive, --sub
              Examine any subdirectories in addition to the specified target directory.

       -s, --selected
              Look  for  infections in any file that has execute permissions, and in all files that are susceptible to infection.
              By default, all files are scanned.  By scanning only files that are susceptible to infection, the program can  scan
              faster.  To see the list of susceptible files, use the --extlist option.

       --secure
              Examine all files, unzip archive files and use heuristic analysis.  This option activates the --analyze and --unzip
              options. If the --selected or --extensions options are in the command line, they are ignored.

       --showcomp
              Report any files that are packaged.

       --summary
              Produce a summary of the scan, which includes:

                 How many files were examined.
                 How many infected files were found.
                 How many infections were removed.

       --timeout seconds
              Set the maximum time (in seconds) to scan any one file.

       -u, --unzip
              Scan inside archive files, such as those saved in ZIP, LHA, PKarc, ARJ, TAR, CHM and RAR formats. By  default,  the
              program does not examine archive files.

              If  used  with  -c  or  --clean  ,  this option tries to clean non-compressed files inside ZIP files only. No other
              archive formats can be cleaned.  The option -c or --clean does not delete or rename infected files within ZIPs.  It
              does  not  rename the ZIP file itself.  The program cannot clean infected files found within other archive formats;
              you must first extract them from the archive file in order to clean them.

       -v, --verbose
              Display a progress summary during the scan.

       --version
              Display the program鈥檚 version number.

       --virus-list
              Display the name of each infection that the program can detect.

FILES
       The following program files reside in the installation directory of each distribution of the software.

          uninstall-uvscan     Uninstallation file
          uvscan               Executable file
          uvscan_secure        Script, uses --secure option

          license.dat          License file
          messages.dat         Messages file

          *.dat                 Files containing definitions
                               of potentially harmful software

       Your installation also includes one of the following shared libraries:

          AIX               libaixfv.a
          FreeBSD           libbsdfv.so.4
          HP-UX             libhpxfv.4
          Linux (Intel)     liblnxfv.so.4
          Sun Solaris       libsunfv.so.4

DIAGNOSTICS
       The program returns a code when it exits.  These codes identify any potentially harmful  software  or  problems  that  are
       found during a scan.

        Code    Description

         0      The program found no potentially harmful software
                and returned no errors.

         2      The integrity check for a DAT file failed.

         6      A general problem has occurred.

         8      The program could not find a DAT file.

        12      The program tried to clean a file, and
                that clean failed for some reason, and
                the file is still infected.

        13      The scanner found one or more viruses or hostile
                objects (such as a Trojan horse, joke program,
                or a test file).

        15      The programs self-check failed; the program
                might be infected or damaged.

        19      The program succeeded in cleaning all
                infected files.

       102      The program quit because the user included the
                --exit-on-error option. The program returns
                this code when an unexpected condition occurs;
                for example, the program cannot open a file
                or runs out of available memory. The program
                exits immediately and does not finish the scan.
                This code occurs only if you specified the
                --exit-on-error option when you started the
                program. If you did not specify that option,
                the program returns exit code 6.

NOTES
       To  perform  a scan after the installation is complete, you might need to include the name of, and path to, your installa-
       tion directory in a variable:

          AIX                  LIBPATH
          FreeBSD              LD_LIBRARY_PATH
          HP-UX                SHLIB_PATH
          Linux                LD_LIBRARY_PATH
          Sun Solaris          LD_LIBRARY_PATH

       It is important to use the most recent versions of the DAT files.  Hundreds of new viruses appear each month. Often, older
       DAT files cannot assist the scanning software in detecting these new variations.  The DAT files with your original copy of
       the program might not detect potentially harmful software that was discovered after you bought the product.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文