Unisar Sander 1241867 User Manual

User's Guide  
antivirus  
Download from Www.Somanuals.com. All Manuals Search And Download.  
BitDefender Antivirus Scanner for Unices  
As every cat owner knows, nobody owns a cat.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
BitDefender Antivirus Scanner for Unices  
Download from Www.Somanuals.com. All Manuals Search And Download.  
BitDefender Antivirus Scanner for Unices  
Table of Contents  
End User Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . ix  
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii  
1. Conventions used in this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii  
1.1. Typographical conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii  
1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv  
2. The book structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv  
3. Request for Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi  
Description and features .................................. 17  
1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19  
1.1. Why BitDefender? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19  
1.2. Data Security Division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20  
1.3. SOFTWIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21  
2. Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23  
2.1. BitDefender Antivirus Scanner for Unices . . . . . . . . . . . . . . . . . . . . . . . . . 23  
2.2. Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24  
3. The scanning mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25  
Installation ................................................. 27  
4. Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29  
4.1. System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29  
4.1.1. Hardware system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29  
4.1.2. Software system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30  
4.2. Package naming convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30  
4.2.1. Linux convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30  
4.2.2. FreeBSD convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31  
5. Package installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33  
5.1. Getting BitDefender Antivirus Scanner for Unices . . . . . . . . . . . . . . . . . . . . 33  
5.2. Test the package for integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33  
5.2.1. Test the rpm and deb packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33  
5.2.2. Test the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34  
5.2.3. Test the FreeBSD tbz package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34  
5.3. Install the package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35  
5.3.1. Install the rpm package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35  
5.3.2. Install the deb package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35  
v
Download from Www.Somanuals.com. All Manuals Search And Download.  
BitDefender Antivirus Scanner for Unices  
5.3.3. Install the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . . . 35  
5.3.4. Install the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37  
5.4. The installer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37  
6. Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39  
6.1. Uninstall the rpm package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39  
6.2. Uninstall the deb package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39  
6.3. Uninstall using the self-extractable archive . . . . . . . . . . . . . . . . . . . . . . . . . 39  
6.4. Uninstall the FreeBSD package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40  
6.4.1. Uninstall a package downloaded locally . . . . . . . . . . . . . . . . . . . . . . . 40  
6.4.2. Uninstall from the ports collection . . . . . . . . . . . . . . . . . . . . . . . . . . . 40  
Using BitDefender ......................................... 41  
7. The configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43  
8. Testing BitDefender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47  
8.1. Scan an executable file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47  
8.2. Scan an archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48  
8.3. Scan a mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49  
9. Real life usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51  
9.1. Virus scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51  
9.1.1. Scan a regular file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51  
9.1.2. Scan a directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52  
9.1.3. Scan the entire system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53  
9.1.4. Scan the archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54  
9.1.5. Scan the mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55  
9.2. Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56  
9.2.1. Using the log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56  
9.2.2. Get more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57  
9.2.3. Display the virus list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57  
9.2.4. Display the product version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58  
9.3. Virus submission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58  
10. BitDefender integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59  
10.1. Desktop integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59  
10.1.1. Midnight Commander . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59  
10.1.2. KDE Konqueror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60  
10.1.3. Krusader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61  
10.1.4. ROX-Filer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62  
10.1.5. Pine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63  
10.1.6. Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66  
10.1.7. KMail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67  
10.2. Server integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68  
10.2.1. Qmail-Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69  
10.2.2. MailScanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69  
vi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
BitDefender Antivirus Scanner for Unices  
10.2.3. Amavisd-new . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70  
11. Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73  
11.1. Triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73  
11.1.1. Run the triggered update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73  
11.1.2. Regular updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73  
11.1.3. HTTP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75  
11.2. Manual update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75  
12. Product registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77  
12.1. Trial License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77  
12.2. License for home or personal use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77  
12.3. License for commercial use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78  
13. Best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79  
Getting help ............................................... 81  
14. Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83  
15. Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85  
15.1. Support department . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85  
15.2. BitDefender Knowledge Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85  
15.3. Contact information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86  
15.3.1. Web addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86  
15.3.2. Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86  
Manual Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89  
bdscan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91  
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97  
vii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
BitDefender Antivirus Scanner for Unices  
viii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
End User Software License Agreement  
End User Software License Agreement  
IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS DO NOT INSTALL  
THE SOFTWARE. BY SELECTING "I ACCEPT", "OK", "CONTINUE", "YES" OR BY  
INSTALLING OR USING THE SOFTWARE IN ANY WAY, YOU ARE INDICATING  
YOUR COMPLETE UNDERSTANDING AND ACCEPTANCE OF THE TERMS OF  
THIS AGREEMENT.  
These Terms cover the home-user or corporate BitDefender Solutions and Services  
licensed to you, including the related documentation and any update and upgrade of  
the applications delivered to you under the purchased license or under any related  
service agreement, as defined in the documentation, as well as any copy thereof.  
This License Agreement is a legal agreement between you (either an individual or a  
legal person) and SOFTWIN for the use of the SOFTWIN software product identified  
above, which includes computer software and services, and may include the associated  
media, printed materials, and "online" or electronic documentation (hereinafter referred  
to as "BitDefender"), all of which are protected by international copyright laws and  
international treaties. By installing, copying or using BitDefender, you agree to be  
bound by the terms of this agreement.  
If you do not agree to the terms of this agreement, do not install or use BitDefender.  
BitDefender License. BitDefender is protected by copyright laws and international  
copyright treaties, as well as other intellectual property laws and treaties. BitDefender  
is licensed, not sold.  
GRANT OF LICENSE. SOFTWIN hereby grants you and only you the following  
non-exclusive, limited, non-transferable and royalty-bearing license to use BitDefender.  
The BitDefender Antivirus Scanner for Unices ("BitDefender") is subject to 3 types of  
license:  
1. Trial License. The product is distributed with a trial key which grants the user a  
30 day trial period as of install time, under the terms of the license agreement. At the  
end of the trial period, all scan- based product features (disinfect, delete) will be  
disabled and the user will have to either go online to www.bitdefender.com and register  
for a personal license or purchase a commercial license from any BitDefender reseller.  
2. Home or Personal Use License. This license is free of charge and it can be  
retrieved from the BitDefender website after filling in a short form. It only allows the  
ix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
End User Software License Agreement  
product to be used for personal purposes, with no commercial implications whatsoever,  
under the terms of the EULA. For example, under the Personal License, you are  
allowed to scan your personal laptop or desktop computer but YOU ARE NOT  
ALLOWED TO USE THE PRODUCT IN A BUSINESS ENVIRONMENT SUCH AS  
AN OFFICE COMPUTER OR A COMPANY SERVER.  
3. Commercial Use License. If you intend to use BitDefender with your own  
integration system or pre-designed scripts, you must purchase the Commercial License.  
The commercial license allows for the product to be used in any environment  
whatsoever throughout the licensing period, under the terms of the EULA. Commercial  
Licenses are granted on an individual user basis, which simply means that the cost  
depends on how many users benefit from the features of the product.  
LICENSE TERM. The license hereunder is granted as of the date BitDefender has  
been purchased and until the end of the period for which such license has been  
purchased.  
UPGRADES. If BitDefender is upgrade labeled, in order to use it, you must hold a  
SOFTWIN license allowing you to use products identified by such company as eligible  
for upgrade. An upgrade labeled BitDefender product shall replace and/or supplement  
the product based on which your were eligibile for such upgrade. You may use the  
resulting upgraded product only in accordance with the terms of this License  
Agreement. If BitDefender is an upgrade of a software package component which was  
licensed to you as a single product, BitDefender may only be used and transferred as  
part of that single product package and it may not be separated so as to be used by  
more than the total number of licensed users. The terms and conditions of this license  
shall replace and supersede any previous agreements that may have existed between  
you and SOFTWIN regarding the original product or the resulting upgraded product.  
COPYRIGHT. All rights, titles and interest in and to BitDefender and all copyrights in  
and to BitDefender (including but not limited to any images, photographs, logos,  
animations, video, audio, music, text, and "applets" incorporated into BitDefender),  
the accompanying printed materials, and any copies of BitDefender are property of  
SOFTWIN. BitDefender is protected by copyright laws and international treaty  
provisions. Therefore, BitDefender must be treated as any other copyrighted material.  
The printed materials accompanying BitDefender shall not be copied. All copyright  
notices shall be reproduced and included, in their original form, in all of the BitDefender  
copies created, irrespective of the media or form in which BitDefender exists. The  
BitDefender license shall not be sub-licensed, rented, sold, leased or shared. The  
BitDefender source code shall not be reverse engineered, recompiled, disassembled,  
no derivative works shall be created based on it, it shall not be modified, translated  
and no attempts to discover it shall be made.  
x
Download from Www.Somanuals.com. All Manuals Search And Download.  
End User Software License Agreement  
LIMITED WARRANTY. SOFTWIN warrants a 30 day fault free period for the media  
on which BitDefender is distributed as of the date BitDefender has been delivered to  
you. Any breach of this warranty shall only result in SOFTWIN replacing the faulty  
media, at its sole discretion, upon receipt of the said media, or refunding the  
BitDefender price. SOFTWIN does not warrant either the uninterrupted or error free  
operation of BitDefender or the correction of possible errors. SOFTWIN does not  
warrant that BitDefender will meet your requirements.  
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, SOFTWIN DISCLAIMS  
ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE  
PRODUCTS, ENHANCEMENTS, MAINTENANCE THEREOF OR SUPPORT  
RELATED THERETO, OR ANY OTHER MATERIALS (TANGIBLE OR INTANGIBLE)  
OR SERVICES THAT IT HAS SUPPLIED. SOFTWIN HEREBY EXPRESSLY  
DISCLAIMS ANY IMPLIED WARRANTIES AND CONDITIONS, INCLUDING,  
WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY,  
FITNESS FOR  
A
PARTICULAR PURPOSE, TITLE, NON-INTERFERENCE,  
ACCURACY OF DATA, ACCURACY OF INFORMATIONAL CONTENT, SYSTEM  
INTEGRATION, AND NON-INFRINGEMENT OF THIRD PARTY RIGHTS BY  
FILTERING, DISABLING, OR REMOVING SUCH THIRD PARTY'S SOFTWARE,  
SPYWARE, ADWARE, COOKIES, EMAILS, DOCUMENTS, ADVERTISEMENTS OR  
THE LIKE, WHETHER ARISING BY STATUTE, LAW, COURSE OF DEALING,  
CUSTOM AND PRACTICE, OR TRADE USAGE.  
DISCLAIMER OF DAMAGES. Anyone using, testing, or evaluating BitDefender shall  
bears all risks as to the quality and performance of BitDefender. Under no  
circumstances shall SOFTWIN be liable for any damages of any kind, including, without  
limitation, direct or indirect damages arising out of the use, performance, or delivery  
of BitDefender, even if SOFTWIN has been advised of the existence or possibility of  
such damages.  
SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY  
FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION  
OR EXCLUSION MAY NOT APPLY TO YOU.  
UNDER NO CIRCUMSTANCES SHALL SOFTWIN'S LIABILITY EXCEED THE  
PURCHASE PRICE PAID BY YOU FOR BITDEFENDER. The disclaimers and  
limitations set forth above shall apply regardless of whether you accept to use, evaluate,  
or test BitDefender.  
IMPORTANT NOTICE TO USERS. THIS SOFTWARE IS NOT FAULT-TOLERANT  
AND IT IS NOT DESIGNED OR INTENDED FOR USE IN ANY HAZARDOUS  
ENVIRONMENT REQUIRING FAIL-SAFE PERFORMANCE OR OPERATION. THIS  
SOFTWARE IS NOT INTENDED FOR USE IN THE OPERATION OF AIRCRAFT  
xi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
End User Software License Agreement  
NAVIGATION, NUCLEAR FACILITIES, OR COMMUNICATION SYSTEMS, WEAPONS  
SYSTEMS, DIRECT OR INDIRECT LIFE-SUPPORT SYSTEMS, AIR TRAFFIC  
CONTROL, OR ANY APPLICATION OR INSTALLATION WHERE FAILURE COULD  
RESULT IN DEATH, SEVERE PHYSICAL INJURY OR DAMAGE TO PROPERTY.  
GENERAL. This Agreement shall be governed by the Romanian law and by the  
international copyright regulations and treaties. The courts of Romania shall have  
exclusive jurisdiction and venue to adjudicate any dispute arising from these License  
Terms.  
BitDefender prices, costs and use fees are subject to change without prior notice to  
you.  
In the event of invalidity of any provision of this Agreement, the invalidity shall not  
affect the validity of the remaining portions of this Agreement.  
BitDefender and the BitDefender logos are trademarks of SOFTWIN. All other  
trademarks used in the product or in associated materials are property of their  
respective owners.  
Any breach of these terms and conditions shall result in the immediate termination of  
this license, without any notice. You shall not be entitled to a refund from SOFTWIN  
or any resellers of BitDefender as a result of such termination. Confidentiality terms  
and conditions and restrictions on use shall remain in force even after termination.  
SOFTWIN may revise these Terms at any time and the revised terms shall  
automatically apply to the corresponding versions of the Software distributed under  
such terms. None of these Terms being found to be void and unenforceable shall  
affect the validity of rest of the Terms, which shall remain valid and enforceable.  
In case of controversy or inconsistency between the translations of these Terms into  
other languages, the English version issued by SOFTWIN shall prevail.  
Contact SOFTWIN, at 5, Fabrica de Glucoza street, 72322-Sector 2, Bucharest,  
Romania, or at Tel No: 40-21-2330780 or Fax:40-21-2330763, e-mail address:  
xii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Preface  
Preface  
This User's Guide is intended to all who have chosen BitDefender Antivirus Scanner  
for Unices as security solution for their systems. The information presented in this  
book is suitable not only for computer literates, it is accessible to everyone who is able  
to do administrative tasks on a Linux box.  
This book will describe for you BitDefender Antivirus Scanner for Unices, the Company  
and the team who built it, will guide you through the installation process, will teach  
you how to configure it at the very detail. You will find how to use BitDefender Antivirus  
Scanner for Unices, how to update, interrogate, test and customize it. You will learn  
how to integrate it with various software and how to get the best from BitDefender.  
We wish you a pleasant and useful lecture.  
1. Conventions used in this book  
1.1. Typographical conventions  
Several text styles are used in the book for an improved readability. Their aspect and  
meaning are presented in the table below.  
Appearance  
Description  
variable  
Variables and some numerical data are printed  
with monospaced characters.  
The URL links is pointing to some external  
location, on http or ftp servers.  
Emails are inserted in the text for contact  
information.  
Chapter 5 “Package installation” (p. This is an internal link, towards some location  
inside the document.  
filename  
File and directories are printed using monospaced  
font.  
xiii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Preface  
Appearance  
Description  
ENV_VAR  
The environment variables are MONOSPACED  
CAPITALS.  
emphasized  
The emphasized text is specially marked to  
require your attention.  
“quoted text”  
The quoted text is provided as reference.  
command  
Inline commands are printed using strong  
characters.  
Command examples are printed with strong  
monospaced characters in specially marked  
environment. The prompt can be one of the  
following.  
# command -parameter  
#
The root prompt. You should be root in  
order to run this command.  
$
The normal user prompt. You do not need  
special privileges to run the command.  
The screen output and code listings are printed  
with monospaced characters in specially marked  
environment.  
screen output  
1.2. Admonitions  
The admonitions are in-text notes, graphically marked, offering to your attention  
additional information related to the current paragraph.  
Note  
The note is just a short observation. Although you can omit it, the notes can provide  
valuable information, such as specific feature or a link to some related topic.  
Important  
This requires your attention and is not recommended to skip over it. Usually, it provides  
non-critical but significant information.  
xiv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Preface  
Warning  
This is critical information you should treat with increased caution. Nothing bad will  
happen if you follow the indications. You should read and understand it, because it  
describes something extremely risky.  
2. The book structure  
The book consists of four parts, containing the major topics: Description and features,  
Installation, Usage and Getting help. Moreover, a glossary and UNIX manual pages  
are provided to clarify some different aspects of BitDefender, which could issue  
technical problems.  
Description and features. A short introduction to BitDefender. It explains who is  
BitDefender, who is SOFTWIN and Data Security Division. You are presented  
BitDefender Antivirus Scanner for Unices, its features, the product components and  
the basics of the integration and the filtering mechanism.  
Installation. Step by step instructions for installing BitDefender on a system. Starting  
with the prerequisites for a successfully installation, you are conducted through the  
whole installation process. Finally, the uninstall procedure is described in case you  
need to uninstall BitDefender.  
Using BitDefender. Description of basic administration and maintenance of  
BitDefender. You are presented the BitDefender configuration file, how to get run-time  
information, how to test the antivirus efficiency, how to perform the updates and how  
to register the product. You are also presented real life usage scenarios, covering  
various aspects of using BitDefender to detect malware on your system, and several  
desktop and server integration procedures, to have the antivirus scanning the files  
directly from the file manager or the emails passing your local email server.  
Getting help. Where to look and where to ask for help if something goes not so right.  
You are guided to the Knowledge Base and offered the BitDefender and BitDefender  
partners contact information to call, if needed.  
Manual pages. The manual pages of BitDefender Antivirus Scanner for Unices are  
included for a quick and convenient reference. Whenever you will find examples of  
BitDefender commands, the manual pages will provide you a valuable help to  
understand all the options and actions.  
Glossary. The Glossary tries to explain some technical and uncommon terms you  
will find in the pages of this book.  
xv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Preface  
3. Request for Comments  
We invite you to help us improve the book. We have tested and verified all of the  
information to the best of our ability, but you may find that features have changed (or  
even that we have made mistakes). Please write to tell us about any flaws you find in  
this book or how you think it could be improved, to help us provide you the best  
documentation possible.  
Let us know by sending an email to <[email protected]>.  
xvi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Description and features  
Description and features  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Description and features  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Description and  
features  
Overview  
01  
Chapter 1. Overview  
BitDefender provides security solutions to satisfy the protection requirements of today's  
computing environment, delivering effective threat management for over 41 million  
home and corporate users in more than 100 countries.  
Designed to provide full protection for corporate network and systems, the BitDefender  
solution range comprises, beside antivirus protection, antispam, personal firewall and  
security management solutions. BitDefender also specializes in providing assistance  
with designing and establishing content security policies for corporate networks.  
BitDefender Professional was the third product of its kind in the world to receive ICSA  
certification for Windows XP and the first to be awarded for groundbreaking innovation  
by the European Commission and Academies. BitDefender Antivirus is certified by all  
the major reviewers in the antivirus field - ICSA Labs, CheckMark, CheckVir, TÜV and  
Virus Bulletin.  
BitDefender is headquartered in Bucharest, Romania and has offices in Tettnang,  
Germany, Barcelona, Spain and Florida, US. Website: http://www.bitdefender.com  
1.1. Why BitDefender?  
Proven. Most reactive antivirus producer. BitDefender fast reactivity in case of  
computer virus epidemic was confirmed beginning with the last outbreaks of CodeRed,  
Nimda and Sircam, as well as Badtrans.B or other dangerous, fast-spreading malicious  
codes. BitDefender was the first to provide antidotes against these codes and to make  
them freely available on the Internet for all affected people. Now, with the continuous  
expansion of the Klez virus - in various versions immediate antivirus protection has  
become once more a critical need for any computer system.  
Innovative. Awarded for innovation by the European Commission and EuroCase.  
BitDefender has been proclaimed a winner of the European IST-Prize, awarded by  
the European Commission and by representatives of 18 academies in Europe. Now  
in its eighth year, the European IST Prize is a reward for groundbreaking products  
that represent the best of European innovation in information technology.  
Comprehensive. Covers every single point of your network, providing complete  
security. BitDefender security solutions for the corporate environment satisfy the  
protection requirements of today's business environment, enabling management of  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Description and  
features  
Overview  
01  
all complex threats that endanger a network, from a small local area to large  
multi-server, multi-platform WAN's.  
Your Ultimate Protection. The final frontier for any possible threat to your  
computer system. As virus detection based on code analysis has not always offered  
good results, BitDefender has implemented behavior-based protection, providing  
security against born-new malware. MIDAS (Malware Intrusion Detection Advanced  
System), featuring three levels of security, guarantees your serenity even after the  
fastest epidemics.  
These are the costs that organizations want to avoid and what the security products  
are designed to prevent:  
Worm attacks  
Communication loss because of infected e-mails  
E-mail breakdown  
Cleaning and recovering systems  
Lost productivity experienced by end users because systems are not available  
Hacking, and unauthorized access that causes damage  
Some simultaneously developments and benefits can be accomplished by using  
the BitDefender security suite:  
Increase network availability by stopping the spread of malicious code attacks (i.e.,  
Nimda, Trojan horses, DDoS).  
Protect remote users from attacks.  
Reduce administrative costs and deploys rapidly with BitDefender Enterprise  
management capabilities.  
Stop the spreading of malware through e-mail, using a BitDefender e-mail protection  
at the company's gateway. Temporarily or permanently block unauthorized,  
vulnerable, and expensive application connections.  
1.2. Data Security Division  
Ever since the beginning, SOFTWIN's Data Security Division approached data  
protection in a specific manner, with the first intelligent update, requiring no user  
intervention, the first remote antivirus management through WAP technology or the  
first Personal Firewall to be integrated within an antivirus engines to provide complete  
response to today's complex security threats.  
Born to provide full data security at all critical levels in today's business environment,  
Data Security Division aims to ensure the protection of systems against computer  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Description and  
features  
Overview  
01  
viruses, to do antivirus research, to develop new technologies for monitoring all possible  
ways to infect a system and, last but not least, to educate the IT&C public on the  
danger of computer viruses.  
BitDefender security solutions satisfy the protection requirements of today's business  
environment, enabling management of all complex threats that endanger a network,  
from a small local area to large multi-server, multi-platform WAN's.  
1.3. SOFTWIN  
Bucharest-based SOFTWIN is the leading provider of complex software solutions and  
services in Romania.  
SOFTWIN focuses on providing software solutions and services that enable fast  
growing companies to solve critical business challenges and to capitalize on new  
business opportunities.  
SOFTWIN enables companies to focus on their core business and expand to new  
markets, by outsourcing non-core activities.  
SOFTWIN employs over 500 highly qualified professionals experienced in developing  
customized solutions and services.  
Since its establishment in 1990, SOFTWIN's average annual revenue has increased  
by +30%.  
SOFTWIN has 4 divisions, which also define the company's main business lines:  
SOFTWIN provides services and solutions to customers worldwide. Over 90% of the  
company's turnover is achieved from exports to the US and European Union.  
Using cutting edge technologies, SOFTWIN successfully developed over 500 software  
development projects, over 3,500 content structuring projects for international partners,  
having over 43 million data security solutions users in 80 countries worldwide and  
more than 1,500,000 client calls handled annually for CRM services.  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Description and  
features  
Overview  
01  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Description and  
features  
Product features  
02  
Chapter 2. Product features  
The acquisition and installation of an antivirus product for the personal or company's  
systems is the most efficient way of preventing the infection of a computer and the  
spreading of viruses inside the company, and outside the company as well.  
2.1. BitDefender Antivirus Scanner for Unices  
BitDefender Antivirus Scanner for Unices is the solution SOFTWIN offers for the  
antivirus protection of individual Linux systems. It uses the most advanced  
multi-platform virus inspection technology which scans for viruses and other malware  
on your personal system.  
The on-demand scanner, for command line or shell scripts, features manual scan of  
individual files or entire file systems, malicious code detection and removal. After each  
scan, the program displays a detailed report on positive virus detections. Thanks to  
BitDefender scan engines advanced features, new, undiscovered threats can be  
detected and immediately eliminated from the system.  
All the files specified in the command line are scanned using the BitDefender scan  
engines. This technology detects all the viruses from common files, archives or  
mailboxes. BitDefender features built-in support for more than 80 packed files formats,  
including RAR, ZIP, ARJ, LZH, LHA, ACE, GZIP, TARGZ, JAR, UUE, MIME or CAB  
archives, no matter how they were created (self-extractable, multivolume, etc).  
In case an infection is found, the file will be treated corresponding to the selected  
option (disinfection, deletion, isolation in the quarantine area or just reporting) and  
notifications will be sent to console, as well as to the log file.  
For ensuring a superior and efficient antivirus protection, BitDefender Antivirus Scanner  
for Unices was designed with built-in update function.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Description and  
features  
Product features  
02  
2.2. Key Features  
Antivirus protection for the file system.  
Automatic and incremental update of virus definitions and scanning engines directly  
from BitDefender servers.  
Ability to isolate the infected files in the quarantine zone.  
Detailed statistics and reports regarding the number of scanned files, the infected  
files, the deleted and disinfected files.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Description and  
features  
The scanning mechanism  
03  
Chapter 3. The scanning mechanism  
The central part of BitDefender Antivirus Scanner for Unices consists of the BitDefender  
architecture-independent scanning engines. These are specialized data analysis  
routines and malware signature definitions, since many viruses can be identified upon  
a distinctive code pattern. The BitDefender Antivirus engine database includes over  
250000 different malware signatures, at the moment of this writing, and the number  
constantly increases every few hours.  
For identifying the unknown viruses, the engines can perform the heuristic analysis,  
searching for several features characterizing the viruses.  
The objects to be scanned can be directories or regular files, provided as command  
line parameters. After the object is eventually deployed in a temporary file, the engines  
are asked to start the scanning process.  
Using the powerful engines, the object is unpacked, if needed, and scanned. The  
scanning result is sent back to bdscan, which will further notify the user and will try  
to apply the desired action. The action can be one of the following, triggered with  
--action command line option.  
Disinfect. BitDefender will try to disinfect the object, by removing the infected or  
suspected part. The action can fail sometimes.  
Quarantine. The object will be moved from its original location to a secured directory,  
the quarantine.  
Delete. The object will be simply removed from the filesystem.  
Ignore. Even if infected objects are found, BitDefender will just report them and no  
action will be performed.  
By default, bdscan will scan inside archives, inside mail boxes and inside packed  
programs. If this behavior is not desirable, there are command line options to disable  
them selectively --no-archive, --no-mail and --no-pack, respectively.  
If the scanning path is a directory, bdscan will descend recursively in sub-directories  
and scan the files found. The recursion depth can be specified in command line or  
can be entirely disabled.  
More in the manual page  
You can find more about the supported command line options in bdscan(8) manual page.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Description and  
features  
The scanning mechanism  
03  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installation  
Installation  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Installation  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installation  
Prerequisites  
04  
Chapter 4. Prerequisites  
BitDefender Antivirus Scanner for Unices can be installed on package based Linux  
distributions (rpm or deb) and tbz based FreeBSD versions, but also all the other  
distributions are supported, using a pseudo-package system, with the same functionality  
of the others. These packages are built as bzip2 compressed tars and include all the  
necessary pre-install, post-install, pre-remove and post-remove scripts. The adequate  
package type should be installed according to the distribution.  
4.1. System requirements  
Before installing BitDefender Antivirus Scanner for Unices, you must verify that your  
system meets the following system requirements.  
4.1.1. Hardware system requirements  
Processor type  
x86 compatible, minimum 166 MHz, but do not expect a great performance in  
this case. An i686 generation processor, at 300MHz, would make a better choice.  
Memory  
The minimum accepted value is 32MB, recommended is 64MB, for a better  
performance.  
Free disk space  
The minimum free disk space to install and run BitDefender Antivirus Scanner  
for Unices is 4MB. But the log and the quarantine directory could require more  
space.  
Internet connection  
Although BitDefender Antivirus Scanner for Unices will run with no Internet  
connection, the update procedure will require an active HTTP link, even through  
some proxy server. Therefore, for an up to date protection, the Internet connection  
is a MUST.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Installation  
Prerequisites  
04  
4.1.2. Software system requirements  
Linux requirements  
The Linux kernel should be 2.2, 2.4 or 2.6, the recommended one is 2.6, with  
support for a fast file system, which works well with multiple small files, such as  
ext3 or reiserfs.  
BitDefender requires glibc version 2.3, at least, and libstdc++ from gcc 3.x  
series.  
FreeBSD requirements  
The supported FreeBSD versions are 5.3-RELEASE and greater and  
6.0-RELEASE and greater.  
FreeBSD 4 is no longer supported.  
4.2. Package naming convention  
BitDefender Antivirus Scanner for Unices package is named considering the following  
scheme.  
4.2.1. Linux convention  
BitDefender-scanner-{ver}.{os}.{arch}.{pkg}  
Variable  
Description  
{ver}  
This is the package version. For example, 7.5-3 is version 7,  
subversion 5, package build 3.  
{os}  
The operating system is Linux.  
{arch}  
The architecture contains the processor class and gcc compiler  
version. i586 is the current development version.  
{pkg}  
This refers to the package management tool used to install the  
files. This is one of rpm, deb or run. rpm uses the Red Hat  
Package Manager, deb uses the Debian package system and  
run is a self-extractable archive, the most portable method.  
Please install the appropriate package for your system, as  
described in the next chapters.  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Installation  
Prerequisites  
04  
4.2.2. FreeBSD convention  
bitdefender-scanner-{ver}.tbz  
Where {ver} is the package version. For example, 7.5_3 is version 7, subversion 5,  
package build 3.  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Installation  
Prerequisites  
04  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installation  
Package installation  
05  
Chapter 5. Package installation  
This chapter will explain you how to install BitDefender on a Unix-like system, such  
as Linux or FreeBSD. This is pretty straightforward: get the desired package, test it  
for integrity, then install it.  
5.1. Getting BitDefender Antivirus Scanner for Unices  
The package can be downloaded from BitDefender servers or it can be found on  
different distribution media, such as CD-ROM. When downloading for the BitDefender  
servers, you will be asked to fill in a form and you will receive an email to the address  
you have provided in this form. The email contains the download location.  
The Linux package come in three flavours.  
rpm for distributions using the RedHat Linux package management  
deb for distributions using Debian Linux packaging system  
run, a self-extractable archive, suited for any other distribution  
The FreeBSD package is a tbz (.tar.bz) compressed archive, adequate for the versions  
5 and 6.  
5.2. Test the package for integrity  
Before you begin the installation process we recommend you to check the installation  
kit is not corrupted (this can happen sometimes, especially if you downloaded it).  
5.2.1. Test the rpm and deb packages  
For an increased security, the rpm and deb packages are GPG signed. To test the  
packages integrity, you can verify their signature.  
First, you need to fetch the BitDefender Packages GPG key (key id: 0x0EC4FE05)  
from a key server, running the following command.  
# gpg --recv 0x0EC4FE05 --keyserver http://pgp.mit.edu  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Installation  
Package installation  
05  
Then, export the key to a local file:  
# gpg --armor --export 0x0EC4FE05 > bd-pack.key  
For the rpm packages, you have to import the key into rpm key ring, using the next  
command.  
# rpm --import bd-pack.key  
When you wish to check a rpm package, just issue a command similar to the following.  
You should get no error.  
# rpm --checksig BitDefender-*.rpm  
In case you are using the deb packages, you have to run only one command over the  
deb files.  
# dpkg-sig --verify BitDefender-*.deb  
5.2.2. Test the self-extractable archive  
To check the integrity of the self-extractable archive, you need to run the following  
command and get the corresponding answer.  
# ./BitDefender-scanner-{ver}.{os}.{arch}.run --check  
Verifying archive integrity... MD5 checksums are OK. All good.  
If you get a different answer, an error, please download the package again.  
5.2.3. Test the FreeBSD tbz package  
When installing the package downloaded from the BitDefender servers, you shoud  
run md5sum on the package and compare the output with the value from the md5sums  
file. This file is located in the same directory you have downloaded the package from.  
When installing from the ports collection, the integrity is automatically checked.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Installation  
Package installation  
05  
5.3. Install the package  
The installation process depends on the package type. There are different methods  
for rpm, deb and self-extractable archive, as well as a typical method for FreeBSD.  
5.3.1. Install the rpm package  
To install BitDefender Antivirus Scanner for Unices on a RedHat based distribution,  
using the RedHat package manager, you have to run the following command.  
# rpm -i BitDefender-scanner-{ver}.{os}.{arch}.rpm  
5.3.2. Install the deb package  
To install BitDefender Antivirus Scanner for Unices on a Debian based distribution,  
using dpkg, you have to run the following command.  
# dpkg -i BitDefender-scanner-{ver}.{os}.{arch}.deb  
5.3.3. Install the self-extractable archive  
The self-extractable archive is a package containing all the required files for the  
installation. It acts as a shell script (you can open it with a text editor) and can be given  
several parameters in the command line. Usually, for a normal installation, there are  
no parameters required, simply run the script.  
Run the self-extractable archive  
This package should be installed using the following command.  
# ./BitDefender-scanner-{ver}.{os}.{arch}.run  
This will unpack the BitDefender files (engines, core, etc.), the install and uninstall  
scripts, and will launch the installer, which, in turn, will install all the provided  
BitDefender components, as described in the next section.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Installation  
Package installation  
05  
Additional parameters  
For the not-so-inpatient user, the self-extractable archive supports few command line  
parameters, described in the following table.  
Parameter  
--help  
--info  
Description  
Prints the short help messages.  
This will print archive information, such as the title, the default target  
directory, the embedded script to be run after unpacking, the  
compression method used, the uncompressed size, the date of  
packaging.  
--list  
This option will print the content of the embedded archive. The listed  
files are the engines, the program binaries, the embedded  
documentation, the install and uninstall script along with their size and  
permissions.  
--check  
This is one of the most useful options, because it enables the user to  
verify the package integrity, as stated above. The integrity is checked  
comparing the embedded md5 checksum (generated during packaging)  
with the one computed the moment of checking. If they match, the  
output will be the following:  
MD5 checksums are OK. All good.  
If not, an error message will be shown, displaying the unequal stored  
and computed checksums, such as  
Error in MD5 checksums: X is different from Y  
--confirm  
--keep  
The user will be asked to confirm every step of the install process.  
By default, the archive content is extracted to a temporary directory,  
which will be removed after the embedded installer exits. Passing this  
parameter to the script will not remove the directory.  
- - t a r g e t You can specify another directory to extract the archive to, if you don't  
directory  
want to use the default name. Note that this target directory will not be  
removed.  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installation  
Package installation  
Parameter  
05  
Description  
--uninstall Run the embedded uninstaller script instead of the normal installer.  
For uninstalling, please read more in Chapter 6 “Uninstall” (p. 39).  
5.3.4. Install the FreeBSD package  
To install BitDefender Antivirus Scanner for Unices on a FreeBSD machine, you have  
two methods: you can install the package you have downloaded from the BitDefender  
servers or you can install from the ports collection.  
Install a locally downloaded package  
To install a local downloaded package, run the next command in its directory.  
# pkg_add bitdefender-scanner-{ver}.tbz  
Install from the ports collection  
To install from the ports collection, you have to run the following commands.  
# cd /usr/ports/security/bitdefender-bdscan  
# make install clean  
5.4. The installer  
After unpacking the archive, the installer is launched. This is a text based installer,  
created to run on very different configurations. It's purpose is to install the extracted  
packages to their locations and to make the first configuration of BitDefender Antivirus  
Scanner for Unices, asking you few questions. To accept the defaults the installer  
offers (which is recommended), you only have to press the ENTER key.  
First, the License Agreement is displayed. You are invited to read the full content by  
pressing the SPACE bar to advance one page or ENTER for one line a time. In order to  
continue the installation process, you must read and agree this License Agreement,  
by literally typing the word accept when prompted. Note that typing anything else or  
nothing at all means you do not agree the License Agreement and the installation  
process will stop.  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Installation  
Package installation  
05  
Next, the Installation directory is asked, if you have installed BitDefender Antivirus  
Scanner for Unices on Linux, using the self-extracting archive. The default is /opt  
and we will assume you go for it. The installer will create the directory  
/opt/BitDefender-scanner, which will be the top-level directory on BitDefender  
Antivirus Scanner for Unices, containing several sub-directories, such as doc, man,  
var, Plugins (which is the location of the engines) and program binaries and the  
configuration file. If the above-mentioned directory does not exist, you are asked  
whether the installer should create it, assuming the default yes. If you do not agree  
the directory to be created, the installer will stop.  
From this moment, the installer has acquired all the necessary information and will  
begin the install process. Basically, it will install the engines, the binaries and the  
documentation and will make the post-install configuration. This is a short list of its  
actions on your system.  
installs the manpages and configures the MANPATH accordingly  
creates a symbolic link to bdscan command in /usr/bin/bdscan for Linux and  
/usr/local/bin/bdscan for FreeBSD  
configures the quarantine directory  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installation  
Uninstall  
06  
Chapter 6. Uninstall  
If you ever need to remove BitDefender Antivirus Scanner for Unices, there are several  
methods to do it, depending on the package type.  
6.1. Uninstall the rpm package  
To uninstall BitDefender Antivirus Scanner for Unices on a RedHat based distribution,  
using the RedHat package manager, you have to run the following command.  
# rpm -e BitDefender-scanner  
6.2. Uninstall the deb package  
To uninstall BitDefender Antivirus Scanner for Unices on a Debian based distribution,  
using dpkg, you have to run the following command.  
# dpkg -r BitDefender-scanner  
6.3. Uninstall using the self-extractable archive  
To proceed, you need the original self-extractable install archive and use the method  
described below. This is necessary since the program will automatically undo all the  
settings used for integration with the system.  
All you have to do is to run the following command.  
# ./BitDefender-scanner-{ver}.{os}.{arch}.run --uninstall  
First, the installation directory is requested from you. By default, it should be /opt,  
but if you have selected another one during the installation, you have to specify it  
when asked. The uninstall program will check whether the directory is correct, by  
verifying whether bdscan file exists inside of it. If there is something wrong, the uninstall  
will quit.  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Installation  
Uninstall  
06  
Next, the uninstall procedure begins by removing installation directory,  
/opt/BitDefender-scanner. The MANPATH environment variable is restored to its  
previous value. Finally, the /usr/bin/bdscan symlink is deleted. At this moment, the  
system should be left in the same condition as found before installing.  
6.4. Uninstall the FreeBSD package  
To uninstall the FreeBSD package, you have two methods, according to the installation  
way.  
6.4.1. Uninstall a package downloaded locally  
To uninstall a package you have installed form a local download, run the next  
command.  
# pkg_delete bitdefender-scanner  
6.4.2. Uninstall from the ports collection  
To uninstall the package installed from the ports collection, you can use the previos  
method or run the following commands.  
# cd /usr/ports/security/bitdefender-bdscan  
# make deinstall clean  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Using BitDefender  
Using BitDefender  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using BitDefender  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
The configuration file  
07  
Chapter 7. The configuration file  
The system-wide configuration of BitDefender Antivirus Scanner for Unices is stored  
inside a file located at /etc/BitDefender-scanner/bdscan.conf on Linux systems  
and at /usr/local/etc/bitdefender/bdscan.conf on FreeBSD systems. There is  
another configuration file, located inside the user's home directory, at  
~/.BitDefender/bdscan.conf, which is loaded after the system configuration.  
Therefore, the user can specify settings to override partially or even totally the system  
settings.  
System versus User configuration  
In this book we will talk about changing the system-wide configuration file, but remember  
that you can modify the user's own configuration, with the same effect from his point of  
view.  
The files are standard UNIX-style configuration files, based on pairs key=value, each  
pair on a single line.  
A typical file on a Linux machine could be the following.  
# An unpriviledged user can copy this file to the home directory, in  
# ~/.BitDefender/bdscan.conf and change the settings to suit their  
# need. Any setting found in the home directory will overwrite the  
# global one.  
#
# Check the bdscan.conf(5) man page for more details.  
# Where the product is installed  
InstallPath = /opt/BitDefender-scanner  
# In which directory should files be copied/moved if the action is  
# "quarantine"  
QuarantinePath = /opt/BitDefender-scanner/var/quarantine  
# This file will be used by default for logging if the "--log"  
# argument is used  
LogName = /opt/BitDefender/var/log/bdscan.log  
# By default bdscan scans all the files, but giving the "--ext"  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
The configuration file  
07  
# argument only files having the following extensions are scanned  
Extensions = 386:asp:bas:bin:chm:cla:class:cmd:com:bat:csc:dat:dll:  
doc:dot:exe:bat:hlp:hta:htm:html:ini:js:lnk:mdb:msi:nws:ocx:ole:  
ovl:pfd:php:pif:pot:ppa:ppt:prc:rtf:scr:shs:smm:sys:url:vbe:vbs:  
vxd:wbk:wdm:wiz:xla:xls:xlt:xml:xtp:  
# The update location. Change this if you want to use an alternate  
# update server.  
UpdateHttpLocation = http://upgrade.bitdefender.com/update71  
# If you use an HTTP proxy, uncomment the following line and specify  
# the [[DOMAIN\]USERNAME[:PASSWRD]@]SERVER[:PORT] of the proxy  
# server.  
# e.g.: HttpProxy = myuser:[email protected]:8080  
#HttpProxy =  
# Uncomment the following line after you insert your license key  
#Key = enter_your_key_here  
The available keys, their default values and description are presented in the table  
below. Some keys could not be present at a certain moment, since their default values,  
defined internally, may need no change.  
Key  
Description  
InstallPath  
This is the path to installation directory, which is set up  
during the installation process.  
UpdateHttpLocation  
The update location is the URL of the BitDefender  
update server, used when performing the triggered  
update.  
Default: http://upgrade.bitdefender.com/update71  
HttpProxy  
If a proxy server is required for Internet connection  
during updates, set this key accordingly. There is no  
default value.  
More about triggered update  
more information about updates and proxy  
configuration.  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
The configuration file  
07  
Key  
Description  
QuarantinePath  
This is the location of the quarantine directory, where  
the infected files are stored when quarantine actions are  
invoked.  
The quarantine directory can be specified at run-time  
using the --quarantine=path option.  
The default quarantine path is located at  
/opt/BitDefender-scanner/var/quarantine.  
Regular users and quarantine  
If the user has not the right to put files into the  
quarantine directory, the program will exit with error  
and no scan will be performed. Therefore you have to  
make sure you have the proper rights when using the  
quarantine action.  
LogName  
The log file contains all the output messages sent  
normally to STDOUT. The new log will be appended to  
the end of the last one on new scan. If you want to clear  
the log file before scanning, you have to use  
--log-overwrite command line option.  
The log file can be also specified at run-time, using the  
--log=logfile option.  
The  
default  
log  
file  
is  
located  
at  
/opt/BitDefender-scanner/var/log/bdscan.log. If  
the user has not the right to write it, the location becomes  
~/.BitDefender/bdscan.log.  
Extensions  
The extensions list, with colon-separated items, specifies  
the file types to scan, identified by their extensions, when  
using the --ext command-line parameter.  
The list can be specified at run-time using the  
--ext=ext1:ext2 option.  
ExcludeExtensions  
This list, with colon-separated items, specifies the file  
types to exclude from scanning, identified by their  
extensions.  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
The configuration file  
07  
Key  
Description  
The list can be specified at run-time using the  
--exclude-ext=ext1:ext2 option.  
Key  
This is the license key, necessary for product activation.  
Product registration  
more information about license keys.  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
Testing BitDefender  
08  
Chapter 8. Testing BitDefender  
You can verify that BitDefender Antivirus component works properly with the help of  
a special test file, known as EICAR Standard Anti-virus Test file. EICAR stands for  
the European Institute of Computer Anti-virus Research. This is a dummy file, detected  
by antivirus products.  
There is no reason to worry, because this file is not a real virus. All that EICAR.COM  
does when executed is to display the text EICAR-STANDARD-ANTIVIRUS-TEST-FILE  
and exit.  
The reason we do not include the file within the package is that we want to avoid  
generating any false alarms for those who use BitDefender or any other virus scanner.  
However, the file can be created using any text editor, provided the file is saved in  
standard MS-DOS ASCII format and is 68 bytes long. It might also be 70 bytes if the  
editor puts a CR/LF at the end. The file must contain the following single line:  
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*  
Copy this line and save the file with any name and .COM extension, for example  
EICAR.COM. You can keep the EICAR.COM in a safe place and test periodically the  
system protection.  
EICAR online resources  
You can visit the EICAR website at http://eicar.com/, read the documentation and  
download the file from one of the locations on the web page  
8.1. Scan an executable file  
Open a new terminal and enter the directory EICAR.COM file resides. Type the following  
command.  
# bdscan EICAR.COM  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Using  
BitDefender  
Testing BitDefender  
08  
You will be told one file has been scanned, found infected and the virus identified.  
You will see the virus name: EICAR-Test-File (not a virus). Since no action was  
specified, the file EICAR.COM still lays on your hard disk.  
The command output will be the following.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
Default action upon detecting an infected file: ignore action  
Default action upon detecting a suspected file: ignore action  
/tmp/EICAR.COM infected: EICAR-Test-File (not a virus)  
Results:  
Folders  
Files  
Packed  
Archives  
Infected files  
Suspect files  
Warnings  
:0  
:1  
:0  
:0  
:1  
:0  
:0  
Identified viruses:1  
I/O errors :0  
8.2. Scan an archive  
Next, you could archive or compress the file and run bdscan over it. BitDefender will  
scan inside the archive.  
First, let's use the gzip command to create the compressed file. Of course, you can  
use several other tools, such as zip, rar, arj and so on.  
# gzip -9 EICAR.COM  
Now you can run bdscan over this compressed file.  
# bdscan EICAR.COM.gz  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
Testing BitDefender  
08  
BitDefender will unpack the archive and scan the content. This will be the command  
output.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
Default action upon detecting an infected file: ignore action  
Default action upon detecting a suspected file: ignore action  
/tmp/EICAR.COM.gz ok  
/tmp/EICAR ... >EICAR.COM infected: EICAR-Test-File (not a virus)  
Results:  
Folders  
Files  
Packed  
Archives  
Infected files  
Suspect files  
Warnings  
:0  
:2  
:0  
:2  
:1  
:0  
:0  
Identified viruses:1  
I/O errors :0  
8.3. Scan a mailbox  
BitDefender Antivirus Scanner for Unices can also unpack and scan mailboxes. If you  
wish to periodically scan your local mailbox, you can proceed as shown in the next  
example.  
# bdscan mail.mbox  
The email messages from the mailbox are read one by one, the attachments are  
unpacked, the contents are extracted and finally scanned. BitDefender will display the  
subject of the infected email, its date and the infected attachments.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
Testing BitDefender  
08  
Default action upon detecting an infected file: ignore action  
Default action upon detecting a suspected file: ignore action  
/tmp/mail.mbox ok  
/tmp/mail.mbox=>(message 0) ok  
/tmp/mail.mbox=>(message 1) ok  
/tmp/mail.mbox=>(message 1)=> ... 34 +0300 (EEST)]=>(MIME part) ok  
/tmp/mail.mbox=>(message 1)=> ... =>(MIME part)=>(message body) ok  
/tmp/mail.mbox=>(message 1)=> ... 34 +0300 (EEST)]=>(MIME part) ok  
/tmp/mail.mbox=>(message 1)=> ... )]=>(MIME part)=>EICAR.COM.gz ok  
/tmp/mail. ... >EICAR.COM infected: EICAR-Test-File (not a virus)  
/tmp/mail.mbox=>(message 1)=> ... 34 +0300 (EEST)]=>(MIME part) ok  
Results:  
Folders  
Files  
Packed  
Archives  
Infected files  
Suspect files  
Warnings  
:0  
:9  
:0  
:6  
:1  
:0  
:0  
Identified viruses:1  
I/O errors :0  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
Real life usage  
09  
Chapter 9. Real life usage  
These are some real-life usage examples of BitDefender. Use them as guidelines for  
improving your system protection and, if you have found a different way to use  
BitDefender Antivirus Scanner for Unices, do not hesitate to contact us and share  
your experience. You can write us at <[email protected]>.  
9.1. Virus scanning  
BitDefender Antivirus Scanner for Unices knows the best how to perform an antivirus  
scan on files and directories located on some filesystem. Here are some basic usage  
examples.  
9.1.1. Scan a regular file  
If you just want to scan a simple file, you can run bdscan specifying the path to the  
file.  
# bdscan --action=quarantine --verbose file.exe  
As you can see below, one file was scanned and found infected, the virus was identified  
and the file was moved to quarantine directory. Since verbose messages were asked,  
the name of the plugins used are also displayed.  
You could use another action, such as disinfect, to try to disinfect the file first. Since  
not all files can be disinfected, you could try next to quarantine or even delete it.  
Of course, you can use the ignore action (which is equivalent to not specifying an  
action at all) and you will only be prompted when viruses are found. This behavior is  
extremely useful on read-only filesystems, such as optical disks (CD-ROM, DVD) or  
network filesystems mounted read-only.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Using  
BitDefender  
Real life usage  
09  
Default action upon detecting an infected file: ignore action  
Default action upon detecting a suspected file: ignore action  
/t ... xe infected: EICAR-Test-File (not a virus) <- cevakrnl.xmd  
Results:  
Folders  
Files  
Packed  
Archives  
Infected files  
Suspect files  
Warnings  
:0  
:1  
:0  
:0  
:1  
:0  
:0  
Identified viruses:1  
I/O errors :0  
9.1.2. Scan a directory  
The path to scan can be not only a path towards some file, but to any directory.  
BitDefender Antivirus Scanner for Unices can scan recursively a directories tree, with  
unlimited recursive level. You can change this, by setting a fixed depth level or by  
disabling the recursion at all.  
Let's suppose we have the following tree structure, with one file and two sub-directories,  
each sub-directory containing some other files.  
top_dir  
|-- documents  
|
|
|-- document1.doc  
`-- document2.doc  
|-- programs  
|
|
|-- program1.exe  
`-- program2.exe  
`-- file.exe  
We want to scan the downloaded_files directory, but not the sub-directories, therefore  
the recursion level is 1. We also want to quarantine the infected files, to study them  
later.  
# bdscan --action=quarantine --recursive-level=1 top_dir  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
Real life usage  
09  
The next screen output shows the files scanned, found infected and finally quarantined.  
You can notice the two sub-directories were not scanned.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
Default action upon detecting an infected file: ignore action  
Default action upon detecting a suspected file: ignore action  
/tmp/top_dir/file.exe infected: EICAR-Test-File (not a virus)  
/tmp/top_d ... ument1.doc infected: EICAR-Test-File (not a virus)  
/tmp/top_d ... ument2.doc infected: EICAR-Test-File (not a virus)  
/tmp/top_d ... ogram1.exe infected: EICAR-Test-File (not a virus)  
/tmp/top_d ... ogram2.exe infected: EICAR-Test-File (not a virus)  
Results:  
Folders  
Files  
Packed  
Archives  
Infected files  
Suspect files  
Warnings  
:3  
:5  
:0  
:0  
:5  
:0  
:0  
Identified viruses:1  
I/O errors :0  
9.1.3. Scan the entire system  
You could wish to scan the entire system, not only some parts of it. Since bdscan  
does not scan symlinks, block and character devices, you can include safely /dev  
directory in your path.  
The only problem is the number of files to be scanned and the time to scan them,  
which could be very long, depending on your system's performance and filesystem's  
capacity. Therefore you could use a log file (to analyze after the scanning process  
has finished) and to reduce the screen output, displaying only the infected and the  
suspected files.  
# bdscan --log=/tmp/bdscan.log --no-list /  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
Real life usage  
09  
Only the found malware will be displayed on the screen, but the log file will contain  
one line about every file scanned and its status. You can easily grep for “infected”  
and “suspected” keywords to see the report regarding them.  
This is the beginning of the log file.  
//  
// BitDefender scan report  
//  
// Time: Fri Jan 27 15:24:03 2006  
// Command line: --log=/tmp/bdscan.log --no-list /  
// Core: AVCORE v1.0 (build 2266) (i386) (Mar 1 2005 19:34:16)  
// Engines: scan: 13, unpack: 4, archive: 39, mail: 6  
// Total signatures: 266776  
//  
/bin/dd ok  
/bin/cp ok  
/bin/df ok  
/bin/ed ok  
/bin/du ok  
/bin/ln ok  
/bin/ls ok  
...  
9.1.4. Scan the archives  
BitDefender Antivirus Scanner for Unices can unpack and scan inside archives. There  
is a limit of archive recursion depth, to prevent several exploits such as the zip-bomb.  
You should be suspicious of every file archived recursively too many times.  
Actions on archives  
You should be aware of the fact that some actions, such as disinfect, are possible  
to fail when scanning archives. The reason is BitDefender will not try or will not succeed  
to recreate the archive, removing some objects from inside. Several closed-source  
compression algorithms are free only to uncompress and require a valid license and  
registration for compression, therefore BitDefender can only unpack such an archive.  
Let's suppose you have a many-times-archived file: file.exe.tar.gz.bz2.zip.rar.  
You can scan it, setting a maximum recursive level, with the next command.  
# bdscan --verbose --archive-level=10 file.exe.tar.gz.bz2.zip.rar  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
Real life usage  
09  
As you can see, BitDefender reports to have scanned more files. This happens because  
each archive should be unpacked separately. You can see also which engine process  
each step of unpacking and scanning.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
Default action upon detecting an infected file: ignore action  
Default action upon detecting a suspected file: ignore action  
/tmp/file.exe.tar.gz.bz2.zip.rar ok  
/tmp/file.exe.tar.gz.bz ... file.exe.tar.gz.bz2.zip ok <- rar.xmd  
/tmp/file.exe.tar.gz.bz ... ip=>file.exe.tar.gz.bz2 ok <- zip.xmd  
/tmp/file.exe.tar.gz.b ... tar.gz.bz2=>(bz2_data) ok <- bzip2.xmd  
/tmp/file.exe.tar.gz.bz ... bz2_data)=>file.exe.tar ok <- gzip.xmd  
/t ... xe infected: EICAR-Test-File (not a virus) <- cevakrnl.xmd  
Results:  
Folders  
Files  
Packed  
Archives  
Infected files  
Suspect files  
Warnings  
:0  
:6  
:1  
:4  
:1  
:0  
:0  
Identified viruses:1  
I/O errors :0  
9.1.5. Scan the mailbox  
If you want to scan your mailbox, or just some emails, you can run BitDefender Antivirus  
Scanner for Unices on them. Each email from a mailbox will be treated separately,  
the attachments will be extracted and scanned. The list of scanned objects can get  
very large, so you could use the logfile facility.  
# bdscan --verbose mail.mbox  
This example shows how an email message from a mailbox, containing a compressed  
attachment, is scanned and the attached file is found infected.  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
Real life usage  
09  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
Default action upon detecting an infected file: ignore action  
Default action upon detecting a suspected file: ignore action  
/tmp/mail.mbox ok  
/tmp/mail.mbox=>(message 0) ok <- mbox.xmd  
/tmp/mail.mbox=>(message 1) ok <- mbox.xmd  
/tmp/mail.mbox=>(messag ... 00 (EEST)]=>(MIME part) ok <- mime.xmd  
/tmp/mail.mbox=>(messag ... E part)=>(message body) ok <- mime.xmd  
/tmp/mail.mbox=>(messag ... 00 (EEST)]=>(MIME part) ok <- mime.xmd  
/tmp/mail.mbox=>(messag ... IME part)=>EICAR.COM.gz ok <- mime.xmd  
/t ... OM infected: EICAR-Test-File (not a virus) <- cevakrnl.xmd  
/tmp/mail.mbox=>(messag ... 00 (EEST)]=>(MIME part) ok <- mime.xmd  
Results:  
Folders  
Files  
Packed  
Archives  
Infected files  
Suspect files  
Warnings  
:0  
:9  
:0  
:6  
:1  
:0  
:0  
Identified viruses:1  
I/O errors :0  
9.2. Report  
You can ask BitDefender to show various kind of information regarding its activity,  
status, known viruses or version.  
9.2.1. Using the log file  
BitDefender can run in background with no user intervention, can display an enormous  
quantity of information or you would like to keep its activity reports for a later use. In  
these cases, the best way is to use the log facility.  
To specify some name for the log file, you have to pass the --log=logfile.log  
command line option. If the file already exists, it will be appended. You may use  
--log-overwrite option to replace the old log file.  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Using  
BitDefender  
Real life usage  
09  
# bdscan --log=/tmp/antivirus_scan.log --log-overwrite file.exe  
9.2.2. Get more information  
BitDefender can offer some information about scanning engines, last update, key  
validity, etc. when called with --info command line option.  
# bdscan --info  
You will get the next screen output.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
Engine signatures: 266776  
Scan engines: 13  
Archive engines: 39  
Unpack engines: 4  
Mail engines: 6  
System engines: 0  
Update time GMT: Fri Jan 27 06:03:59 2006  
Version: 7.05450  
License expire date: Aug 26 2006  
9.2.3. Display the virus list  
BitDefender can send to STDOUT its virus list, which is really big. To study it, you have  
to save it in a file on your local filesystem or send it to the pager, which will display it  
screen by screen.  
# bdscan --virus-list | more  
Now, you can navigate inside the list or search for some virus name, using the pager's  
facilities.  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Using  
BitDefender  
Real life usage  
09  
9.2.4. Display the product version  
Maybe you will need just to find the version of your installed BitDefender Antivirus  
Scanner for Unices.  
# bdscan --version  
BitDefender will display the product name, version and build number, architecture and  
copyright information.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
9.3. Virus submission  
Sometimes, BitDefender will not present files as infected, but suspected. The suspected  
files have not matched any signature, but the heuristic analysis marked them as  
possibly infected. Usually, they should be moved to quarantine directory and submitted  
to BitDefender Antivirus Lab at <[email protected]> for a deeper  
analysis.  
These emails can trigger some antiviruses on email servers in their way to BitDefender  
Antivirus Lab, therefore you have to compress them in an encrypted zip archive and  
send both the archive and the password in the same email.  
For example, you can use the command below.  
# zip -e suspected.zip suspected_file  
You will be prompted twice for a password. Pick a simple one, as the encryption is  
only used for scrambling the file, not for protecting it.  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Using  
BitDefender  
BitDefender integration  
10  
Chapter 10. BitDefender integration  
BitDefender Antivirus Scanner for Unices is a versatile antivirus scanning solution,  
that could be easily integrated in desktop and server software to perform an instant  
target scan.  
10.1. Desktop integration  
You can configure your favorite file manager, email or news client to use BitDefender  
Antivirus Scanner for Unices for an instant scan of some file or some email. In some  
cases this is as simple as a mouse click, key-shortcut or menu selection.  
These are only few examples of how to run an antivirus scan from desktop applications.  
10.1.1. Midnight Commander  
GNU Midnight Commander is a directory browser and file  
manager for Unix-like operating systems.  
—The Midnight Commander manual page  
The user menu, invoked with F2 key, represents an easy way to provide users a menu  
to add extra features to the Midnight Commander. This can be edited by selecting  
from the menus Command Menu file edit. You will be asked whether to edit the  
Local or the Home menu; select to edit the Home menu, for changes to be available  
in any directory.  
The menu file is opened in an editor. Go to the end of the file and append the following  
lines. The care to respect the white spaces from the beginning of the lines.  
+ t rd & x /opt/BitDefender-scanner/bin/bdscan  
s
Scan with BitDefender  
bdscan --no-list %s  
echo -n "Press ENTER to continue..."  
read  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Using  
BitDefender  
BitDefender integration  
10  
Different installation path  
If you have used another installation path and not the default one, please change the  
first line accordingly. That condition is used not to show the menu item if BitDefender  
Antivirus Scanner for Unices is not installed.  
From now on, when you press the F2 key  
on top of some tagged or not tagged files  
and directories, the User menu pops-up  
and by pressing the S key you will perform  
an antivirus scan of the target.  
When scanning, you will not see the usual  
Midnight Commander interface, but the  
output screen. At the end, you have to  
press the ENTER key to return to the  
commander.  
Figure 10.1. The User Menu of mc  
10.1.2. KDE Konqueror  
Konqueror is the file manager for the K Desktop Environment. Using a special crafted  
.desktop file, you can send any file or directory to BitDefender Antivirus Scanner for  
Unices for scanning. The output is displayed in a terminal emulator.  
Copy the following file to ~/.kde/share/apps/konqueror/servicemenus/, under the  
name bitdefender.desktop. You should also copy the bitdefender.png icon from  
the installation package to your icons directory.  
Do not break the last line  
The Exec=... line of this file has been broken for typographical reasons. When creating  
the file, remember to write it as a single line, since line breaking is not supported.  
[Desktop Entry]  
Name=BitDefender  
Encoding=UTF-8  
ServiceTypes=all/allfiles,inode/directory  
TryExec=bdscan  
Terminal=false  
TerminalOptions=  
Type=Application  
Actions=Scan_With_BitDefender;  
Icon=bitdefender  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
BitDefender integration  
10  
[Desktop Action Scan_With_BitDefender]  
Name=Scan with BitDefender  
Comment=Perform an AntiVirus scan with BitDefender  
Icon=bitdefender  
Exec=konsole -T "BitDefender Antivirus Scanner" --noclose \  
--nomenubar --notoolbar --icon bitdefender --vt_sz 80x25 \  
-e bdscan --no-list %f  
You may now open Konqueror,  
right-click a file or directory and  
from the context menu select  
Actions  
Scan  
with  
BitDefender.  
A
terminal window will open,  
displaying all the infected or  
suspected files found. At the end,  
a short summary will appear and  
the window will remain open until  
you will close it.  
Figure 10.2. Action on file in Konqueror  
10.1.3. Krusader  
Krusader is an advanced twin panel (commander style) file  
manager for KDE, similar to Midnight or Total Commander  
(formerly Windows Commander), with many extras. It provides  
all the file-management features you could possibly want.  
—Krusader home page  
When using Krusader, you can right-click a file or directory and select from the context  
menu Konqueror menu Actions Scan with BitDefender. This will work if you  
have followed the instructions from Section KDE Konqueror (page 60).  
If not, Krusader offers its own way, called Useractions. You can add a new user action  
from the menu Settings Configure Krusader, then in the tab User Actions press  
New Action and make the following changes.  
Distinct name. Set Scan with BitDefender.  
Title. Set Scan with BitDefender.  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
BitDefender integration  
10  
Tooltip. Set Perform an AntiVirus scan with BitDefender.  
Command line. Set bdscan --no-list %aCurrent%.  
Then check Execution mode Run in terminal checkbox.  
Press the Ok button and close the  
window.  
Now, in the Useractions menu  
there will be a new item, Scan  
with BitDefender. Select it to  
start scanning the targeted files  
and directories.  
The program output will be  
displayed in a console window,  
that will not close when the  
scanning process finishes. You  
will have to close it manually, after  
reading the messages.  
Figure 10.3. Krusader's User Actions  
10.1.4. ROX-Filer  
ROX is a fast, user friendly desktop which makes extensive use  
of drag-and-drop. The interface revolves around the file manager,  
or filer, following the traditional Unix view that 'everything is a  
file' rather than trying to hide the filesystem beneath start menus,  
wizards, or druids.  
—ROX-Wiki  
ROX-Filer provides a SendTo context menu, to open the selected file with the desired  
program. In this case, the program will be a shell script, wrapping BitDefender and  
displaying its output in a terminal window.  
Copy the following shell script, name it BitDefender and save it in the directory  
~/.rox_choices/SendTo/.  
#!/bin/sh  
# BitDefender ROX-Filer integration script  
# Copyright (C) 1996-2006 SOFTWIN SRL. All rights reserved.  
# Place this script in your home directory, at the next location:  
# ~/.rox_choices/SendTo  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
BitDefender integration  
10  
# Now let's run the scan process  
xterm -e "bdscan --no-list $*; \  
echo -n 'Press ENTER to continue...'; \  
read"  
# End of the script  
Do not forget to give it executable rights.  
# chmod 755 ~/.rox_choices/SendTo/BitDefender  
You can right-click a file or a directory, select Send to BitDefender menu and the  
scanning process will start. When finished, you will need to close the window, after  
reading the output messages.  
10.1.5. Pine  
Pine® - a Program for Internet News & Email - is a tool for  
reading, sending, and managing electronic messages.  
—Pine Information Center  
To scan an email from some mail user agent, you have to save the message on the  
filesystem and scan that file. Fortunately, these actions can be automated, by using  
a shell script. Save the following file to some convenient location, such as the  
BitDefender installation directory, /opt/BitDefender-scanner. Name it bdscanpipe  
and remember the full path to it: /opt/BitDefender-scanner/bin/bdscanpipe.  
#!/bin/sh  
# BitDefender STDIN scanner integration script  
# Copyright (C) 1996-2006 SOFTWIN SRL. All rights reserved.  
# Place this script in your BitDefender installation directory  
# and name it bdscanpipe, such as:  
#
/opt/BitDefender-scanner/bin/bdscanpipe  
# Set some parameters  
BDSCAN=bdscan  
TMPFILE=/tmp/bdscanpipe_$$  
# Save the standard-input to a temporary file  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
BitDefender integration  
10  
cat > $TMPFILE  
# Scan it with BitDefender and remember the exitcode  
$BDSCAN $TMPFILE  
EXIT=$?  
# Remove the temporary file and return the exitcode  
rm -f $TMPFILE  
exit $EXIT  
# End of the script  
What to do with infected emails  
You will not be able to disinfect the message, the only action that can be done is ignore,  
therefore it's up to you to delete or move the email if BitDefender has found it infected  
or, better, instruct the email client to do so.  
If you want to be able to scan emails from Pine using BitDefender, you have to change  
your Pine settings to enable Unix pipe commands. Follow these steps.  
Start Pine and type S (for Setup), then C (for Config). Use the down-arrow key to find  
and highlight enable-unix-pipe-cmd (somewhere under Advanced Command  
Preferences) and enable this preference by typing X. Type E (for Exit Setup) and Y  
when asked to Save Changes.  
Now, in the Index screen and when displaying the email, there is one more command:  
| Pipe, ready to be tested.  
1. When displaying a message or in the Index screen, press the | Pipe key (Shift+\).  
2. The entire message has to be sent to the filter, so press Control+W (Raw text).  
The status line should display the message: Pipe RAW message X to :.  
3. Type the full path to the filter, not only the script name, for example  
/opt/BitDefender-scanner/bin/bdscanpipe, and press ENTER.  
This is how the screen should look like.  
Pipe RAW message 299 to : /opt/BitDefender-scanner/bin/bdscanpipe  
^G Help  
^W Shown Text ^R With Delimiter  
^C Cancel Ret Accept ^Y Free Output  
The full email will be piped to BitDefender filter, which will save it temporary on the  
filesystem and scan this file with bdscan. After the scan, the output results are  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
BitDefender integration  
10  
displayed by Pine. You should notice whether the email was infected or not. When  
finished reading the messages, press E to Exit the viewer.  
As stated before, it would be better to tell Pine to automatically scan the messages  
and what to do when some infected email is found. This way, every new message will  
be scanned and treated accordingly, meaning that the message displaying will slow  
down a bit.  
Possible actions to do on infected email could be the following.  
Set a keyword (let's say Infected) and add an IndexColor rule to highlight the  
message with this keyword.  
Move the email to some safe location, to study it carefully.  
Remove the email.  
We will discuss how to create a filter rule to move the infected email to another mailbox.  
Type S (for Setup), then R (for Rules) and F (for Filters). Then press A (Add) to add  
a new rule. First, give it a name, such as BitDefender Antivirus Scan, then check  
Current Folder Type Email to apply the rule on all email folders. Furthermore,  
you can also check Message is New (Unseen)? Yes, to scan only new emails,  
increasing the speed.  
Scroll down to External Categorizer Commands and set the following values.  
Command: /opt/BitDefender-scanner/bin/bdscanpipe  
Exit Status Interval: (1,254)  
Scroll down to Filter Action and select Move. You have to specify the folder to move  
the infected email to.  
Finally, check Set New Status  
Clear this state and Features  
dont-stop-even-if-rule-matches. Type E (for Exit) and Y when asked to Save  
Changes.  
From now on, when a new email is received, it will piped to BitDefender filter and,  
depending on the exit status, it will be moved to some safe location if found infected.  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
BitDefender integration  
10  
10.1.6. Evolution  
Evolution makes the tasks of storing, organizing, and retrieving  
your personal information easy, so you can work and  
communicate more effectively with others. It's a highly evolved  
groupware program, an integral part of the Internet-connected  
desktop.  
—Evolution User Guide  
Making Evolution scan emails through BitDefender can be accomplished by using the  
email Filters. This way, when you download any new message, it will be sent to  
scanning.  
BitDefender pipe: bdscanpipe  
Evolution needs a filter to pipe the messages into. Please review the Section Pine (page  
63) and use the provided script.  
Start by adding a new filter rule: Tools Filters..., then press Add. Name the rule  
Scan with BitDefender and add to If panel the rule Pipe to Program. Fill the program  
name, /opt/BitDefender-scanner/bin/bdscanpipe, set the condition returns  
greater than and value 0.  
Next, in the Then panel, you will  
set the action to do on infected  
email. For example, you could  
move it to some special folder  
(name it Infected), you could set  
some color or just delete the  
message.  
From now on, any new email will  
be piped into the scanning filter. If  
you want to scan only some  
Figure 10.4. Evolution filter configuration  
emails, add corresponding rules to  
If panel. For manually scanning some highlighted message, press Control+Y keys.  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
BitDefender integration  
10  
10.1.7. KMail  
KMail is a fully-featured email client that fits nicely into the K  
Desktop Environment, KDE. It has features such as support for  
IMAP, POP3, multiple accounts, powerful filters, PGP/GnuPG  
privacy, inline attachments, and much more.  
—KMail website  
KMail integration can be done using the wizard from Tools Anti-virus Wizard...  
menu. This will autodetect BitDefender and will automatically configure the filters to  
pipe any message through a script that will add a header to the message,  
X-Virus-Flag with values Yes or No, depending on the email is infected or not.  
If you do not like to use the wizard,  
you can add manually the filter rule.  
Start from Settings Configure  
filters.... Add a new filter and name  
it BitDefender Anti-Virus Check. In  
the Filter Criteria panel add a rule  
to select which messages to scan,  
for example a rule that will scan all  
messages. In the Filter Actions  
panel select Pipe Through and fill  
i n  
t h e  
t e x t b o x  
Then  
kmail_bitdefender.sh.  
Figure 10.5. KMail filter configuration  
check the boxes Apply to  
incoming message and Apply on  
manual filtering. Save the new rule by pressing the OK button.  
Copy the following script, name it kmail_bitdefender.sh and save it somewhere in  
your path.  
#!/bin/sh  
# BitDefender KMail integration script  
# Copyright (C) 1996-2006 SOFTWIN SRL. All rights reserved.  
# Place this script in your PATH and name it  
# kmail_bitdefender.sh, such as: ~/bin/kmail_bitdefender.sh  
# Set some parameters  
BDSCAN=bdscan  
TMPFILE=/tmp/bdkmail_$$  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
BitDefender integration  
10  
# Save the standard-input to a temporay file  
cat > $TMPFILE  
# Scan it with BitDefender, filter the output and echo the header  
if $BDSCAN $TMPFILE | grep -q infected; then  
echo "X-Virus-Flag: yes"  
else  
echo "X-Virus-Flag: no"  
fi  
# Output the email and remove the temporary file  
cat $TMPFILE  
rm $TMPFILE  
# End of the script  
Even more, you can customize by yourself this filter. You can add a convenient button  
on the toolbar, to call the filter on the highlighted message.  
Filter actions in KMail  
Due to the current KMail structure, the script is called in the Actions section on the filter.  
That means the only action the filter can do is to add a header stating the message is  
infected or not. It is up to you to add another filter to check for this header and to perform  
any desired action.  
10.2. Server integration  
BitDefender Antivirus Scanner for Unices can also be used to scan the email traffic  
passing through an email server. There are additional tools to integrate the server and  
the antivirus. These are just few examples of how to make a low-budget email scanner  
using BitDefender Antivirus Scanner for Unices.  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
BitDefender integration  
10  
10.2.1. Qmail-Scanner  
Qmail-Scanner is an add-on that enables a Qmail e-mail server  
to scan all gateway-ed e-mail for certain characteristics (i.e. a  
content scanner).  
—Qmail-Scanner website  
Qmail-Scanner supports BitDefender Antivirus Scanner for Unices out of package.  
To use it, you can just proceed to normal installation, since the configuration script  
will automatically detect BitDefender. Alternately, you can pass some option to the  
script, such as specifying the antivirus to use.  
Qmail-Scanner installation  
Qmail-Scanner supports many installation options, for a fine-grained qmail integration.  
Please see the documentation for further instructions.  
Enter the directory where you have unpacked the Qmail-Scanner archive, and run the  
following command.  
# ./configure --scanners bitdefender  
Once configured, you can install Qmail-Scanner by running the next command.  
# ./configure --install  
Having this done, you can start testing Qmail-Scanner by sending test emails to some  
local account. You should watch the logs for possible errors.  
10.2.2. MailScanner  
A Free Anti-Virus and Anti-Spam Filter.  
—MailScanner website  
MailScanner integration of BitDefender is a very simple process. Since BitDefender  
Antivirus Scanner for Unices is supported by default by MailScanner, all you need to  
have is a functional installation of MailScanner and one line to modify.  
MailScanner installation  
Please refer to on-line or printed MailScanner documentation for a detailed view of  
installation, since this is out of the subjects covered by this book.  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Using  
BitDefender  
BitDefender integration  
10  
Once you have a working MailScanner installed on your server, open its configuration  
file /opt/MailScanner/etc/MailScanner.conf (for a default location) and find the  
next line.  
Virus Scanners = none  
Change it to the following form.  
Virus Scanners = bitdefender  
If you need to further customize the command-line options passed to BitDefender,  
open the file /opt/MailScanner/lib/bitdefender-wrapper and change the  
corresponding line, located by the end of the file.  
10.2.3. Amavisd-new  
amavisd-new is a high-performance interface between mailer  
(MTA) and content checkers: virus scanners, and/or  
SpamAssassin.  
—amavisd-new website  
Amavisd-new supports by default BitDefender for email scanning. All you have to do  
is to make sure to install all the prerequisites (mainly additional perl modules), then  
install amavisd-new according to the instructions from documentation.  
Before real usage, it would be better to check BitDefender was properly detected.  
Therefore, run the next command and watch for the line saying bdscan has been  
found.  
# amavisd-new debug  
Somewhere in the output, you will see the next line.  
Found primary av scanner BitDefender at /usr/bin/bdscan  
This is all you have to do. You can now test the mail server integration using EICAR  
emails.  
70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
BitDefender integration  
10  
amavisd-new installation  
Please refer to amavisd-new documentation for a detailed description of installation and  
configuration.  
71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
BitDefender integration  
10  
72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
Updates  
11  
Chapter 11. Updates  
BitDefender Antivirus Scanner for Unices was designed with capabilities for triggered  
update. At the present time, the risk of getting infected is high, both because new  
viruses appear and the existing ones keep on spreading. This is why your antivirus  
must be kept up-to-date, by periodically checking the BitDefender servers for new  
updates.  
11.1. Triggered update  
11.1.1. Run the triggered update  
BitDefender Antivirus Scanner for Unices is configured to update automatically, when  
triggered, using the following command:  
# bdscan --update  
The output should be the following.  
BitDefender Antivirus Scanner v7.60124 Linux-i686  
Copyright (C) 1996-2006 Softwin SRL. All rights reserved.  
This program is licensed for commercial use.  
/opt/BitDefender-scanner/var/lib/scan/Plugins/emalware.ivd ........  
...................................................... updated  
/opt/BitDefender/var/lib/scan/Plugins/update.txt updated  
Update succeeded.  
11.1.2. Regular updates  
If you wish bdscan to get virus definitions and signatures on a regular basis, you may  
use the cron service, which is installed by default on most Linux distributions.  
73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Using  
BitDefender  
Updates  
11  
Edit the cron table  
The first method is to edit the cron tables, using the crontab tool. For example, if you  
want to run a daily update, run the following as root:  
# crontab -e  
Then add the next line:  
00 02 * * * /opt/BitDefender-scanner/bin/bdscan --update  
All you have to do now is to signal the cron daemon to reload the crontables. Run the  
next command and look for the process-id of crond, located in the second column.  
# ps aux | grep crond  
With the process-id (PID) in mind, issue the following command to signal the crond  
daemon. Replace PID with the corresponding process-id value.  
# kill -HUP PID  
This way, you will run the update every night at 2:00 AM.  
Use cron.* scheduling facility  
Depending on you Linux distribution, there could be another method for regular updates.  
Most of the major distributions use cron to run some scripts located in several  
directories, on a hourly, daily, weekly and monthly basis. Although not very accurate,  
this method provides a very simple way to add cron new job or to remove it.  
First, you should look for several directories, such as /etc/cron.hourly,  
/etc/cron.daily, /etc/cron.weekly and /etc/cron.monthly. For this example  
you could use the cron.daily or even cron.hourly directories.  
Create the following file, name it bdscan-update and place it in the selected directory.  
Do not forget to change the INSTALL_PATH according to your installation, if you have  
not installed under default location.  
74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
Updates  
11  
#!/bin/sh  
# BitDefender update script, using cron service  
# Copyright (C) 1996-2005 SOFTWIN SRL. All rights reserved.  
# Place this script under one of the following directories for daily  
# or even hourly updates (find their equivalents on your system if  
# they do not exactly match):  
# /etc/cron.daily  
# /etc/cron.hourly  
# IMPORTANT: change this parameter according to your installation  
BDSCAN=/opt/BitDefender-scanner/bin/bdscan  
# Now let's run the update process  
$BDSCAN --update  
# End of the update script  
Finally, make the script executable with the next command.  
# chmod 755 bdscan-update  
You can even try to manually run the script, to test it works properly.  
11.1.3. HTTP proxy  
You may use a HTTP proxy server to connect to Internet. In this case, the triggered  
update may fail, since the BitDefender update server can not be reached.  
To specify a proxy server to be used when updating, you have to open the configuration  
file, usually located at /etc/BitDefender-scanner/bdscan.conf, and add the  
following line. You should replace the sample values according to your conditions.  
HttpProxy = your.proxy.server:port  
11.2. Manual update  
If you have no Internet access, meaning that bdscan can not check and download  
the updates, you can perform a manual update. Basically, there are two zip archives  
75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Using  
BitDefender  
Updates  
11  
on the update server, containing the updates of the scanning engines and virus  
signatures: cumulative.zip and daily.zip.  
cumulative.zip is released every week on Monday and it includes all the virus  
definitions and scan engines updates up to the release date.  
daily.zip is released each day and it includes all the virus definitions and scan  
engines updates since the last cumulative and up to the current date.  
In order to update the product manually, you should follow the next steps.  
1. Download the updates files. If it is Monday, please download the cumulative.zip  
and save it somewhere on your disk when prompted. Otherwise please download  
the daily.zip and save it on your disk. If this is the first time you update using the  
manual updates, please download the both archives.  
2. Extract the updates.  
Extract the contents of the zip files to  
/opt/BitDefender-scanner/var/lib/scan/Plugins/ directory, overwriting the  
existing files with the newer ones if necessary.  
The order to extract the updates  
If you are using both update files, you will have to extract the content of the  
cumulative.zip first, then the contents of daily.zip.  
3. Set files owner and permissions. After extracting the zip archives, you must set  
the proper owner and permissions, by running the following commands.  
# chown root:root /opt/BitDefender-scanner/var/lib/scan/Plugins/*  
# chmod 644 /opt/BitDefender-scanner/var/lib/scan/Plugins/*  
76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using  
BitDefender  
Product registration  
12  
Chapter 12. Product registration  
The product is delivered with a trial registration key valid for thirty days. At the end of  
the trial period, if you want to continue using the program, you have to provide a new  
license key.  
When you have the new key, open the configuration file from  
/etc/BitDefender-scanner/bdscan.conf (for a default Linux installation) or from  
/usr/local/etc/bitdefender/bdscan.conf on FreeBSD systems and find the line  
similar to this one.  
Key = 00112233445566778899  
Simply replace the old key value with the new one and save the file.  
Check the expiration date  
If you want to check the key expiration date, you have to run the following command and  
watch the output.  
# bdscan --info  
12.1. Trial License  
The product comes by default with a trial key which allows the user to use it in any  
way or any environment whatsoever for 30 days from the install time. When the trial  
period expires, all product features regarding scan actions (disinfect, delete) will be  
disabled and the user will have to either go online to www.bitdefender.com and register  
for a personal license or purchase a commercial one from the nearest BitDefender  
dealer.  
12.2. License for home or personal use  
This license is free and can be retrieved from the BitDefender website after filling a  
short form. It allows the user to use the product only for personal use with no  
77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Using  
BitDefender  
Product registration  
12  
commercial implications whatsoever. For example, using the Personal License, you  
are allowed to scan your personal laptop or desktop computer but YOU ARE NOT  
ALLOWED TO USE IT IN A PRODUCTION ENVIRONMENT LIKE AN OFFICE  
COMPUTER OR COMPANY SERVER.  
12.3. License for commercial use  
If you plan on using BitDefender Antivirus Scanner for Unices with your own integration  
system or pre-designed scripts, then you must purchase the Commercial License.  
The commercial license allows unlimited and unrestricted usage of the product in any  
environment whatsoever. The Commercial License is sold per user, depending on  
how many users benefit from the product's features.  
78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
Best practices  
13  
Chapter 13. Best practices  
These are some steps you should follow to ensure a system free from viruses.  
1. After installing BitDefender Antivirus Scanner for Unices, perform a triggered update  
to have the latest virus signatures and engines, as described in Section Triggered  
2. Perform a full system scan to find any already infected objects. Use the guidelines  
3. Make sure the license key has not expired and get a new one before the expiring  
date. Read more about license keys in Chapter Product registration (page 77).  
4. If you use cron or something else to do regular updates, make sure the job  
scheduler really works and you have always the latest updates.  
5. When using the quarantine action, so the infected objects are moved to quarantine  
directory, keep one eye on it. Check periodically the directory size, since it can grow  
rapidly and you could run out of disk space, and take a look at the files BitDefender  
has found infected. You could simply remove them if you are sure they are infected,  
you can double check them (the suspected objects can be false positive alarms)  
and you can send them to BitDefender Antivirus Lab as described below, for in-depth  
analysis.  
6. Use BitDefender Antivirus Scanner for Unices to scan all the files you have from  
untrusted sources, such as the Internet, by web browsing or email. Scan the  
documents, archives, programs and anything else that could contain malicious  
code. Periodically, perform a full system scan.  
7. Send  
to  
BitDefender  
Antivirus  
Lab  
at  
email  
address  
<[email protected]> all suspected objects for a prompt response  
to malware threats. To not be filtered by antivirus protected email servers, you can  
archive the suspected object, encrypt the archive and send both the archive and  
the key.  
79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Using  
BitDefender  
Best practices  
13  
80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Getting help  
Getting help  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Getting help  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Getting help  
Frequently Asked Questions  
14  
Chapter 14. Frequently Asked Questions  
1. Installation  
1.  
What are the system requirements?  
Please consult Section 4.1 “System requirements” (p. 29) for an up to date  
system requirements.  
2.  
Does BitDefender alter my system configuration?  
Yes, BitDefender Antivirus Scanner for Unices will touch several system files  
(man.config and manpath.config) if found on the system, for manpage  
integration. It will also create certain symlinks in /etc and /usr/bin directories  
for Linux and in /usr/local/etc and /usr/local/bin directories for FreeBSD.  
2. Usage  
1.  
My bdscan program has found a virus in a file, but it does not disinfect it, though  
I know that the file can be disinfected. Why does not it disinfect the file?  
The --action command line option, with value ignore by default, can be used  
to specify what to do when a virus is found. Possible values are disinfect,  
delete, quarantine or ignore.  
Also, note that there are lots of viruses, so called malware, which can not be  
disinfected, because of their internal structure and behavior, so if bdscan finds  
such a malware, it is recommended to delete the infected file.  
2.  
How can I tell the virus signatures database is up to date?  
Run the following command and look for the line displaying the time of the last  
update.  
# bdscan --info  
83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Getting help  
Frequently Asked Questions  
14  
If you have BitDefender Antivirus Scanner for Unices performing a regular update,  
this time should be recent enough. If not, this is a good moment to update you  
antivirus.  
3.  
When I try to update the virus definitions/scanning engines, I always get this “No  
update available” message. Why?  
Make sure you are not running the update as an unprivileged user, (a.k.a. not  
root), because, if this is the case, you do not have write rights in the Plugins  
directory. This is a normal and secure behavior.  
There is really no update available at that time, especially if you are running the  
update very, very often.  
4.  
5.  
How often the updates are released and how can I have always the latest  
updates? How do I know when updates are released?  
New updates are released as soon as new malwares are identified, which  
happens every few hours. BitDefender Antivirus Scanner for Unices can be  
configured to check for updates every few hours, using the cron daemon.  
When I try move infected or suspected files to quarantine zone, I get a “move  
failed” in the log file. Why?  
Make sure you have the proper rights on the quarantine directories, i.e. the  
directories must be writable for the users who want to use the quarantine facility.  
The default install creates the quarantine directories with rwx access rights for  
all users. If you are an admin of the Linux system, and use the quarantine facility,  
make sure to check from time to time those directories, and delete all unneeded  
files, to free up disk space.  
6.  
Why bdscan does not scan symbolic links?  
bdscan does not follow the symbolic links, neither for files, nor for directories.  
This behavior avoids unauthorized disk access and also the recursive loops,  
especially for /dev and /proc directories.  
84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Getting help  
Support  
15  
Chapter 15. Support  
15.1. Support department  
As a valued provider, SOFTWIN strives to provide its customers with an unparallel  
level of fast and accurate support. The Support Center listed below is continually being  
updated with the newest virus descriptions and answers to common questions, so  
that you obtain the necessary information in a timely manner.  
At SOFTWIN, dedication to saving its customers time and money by providing the  
most advanced products at the fairest prices has always been a top priority. Moreover,  
we think that a successful business is based on a good communication and a  
commitment to excellence in customer support.  
You are welcome to ask for support at <[email protected]> any time. For a  
prompt response, please include in your email as many details as you can about your  
BitDefender, about your system and describe the problem as accurate as possible.  
15.2. BitDefender Knowledge Base  
The BitDefender Knowledge Base is an online repository of information about  
BitDefender products. It stores, in an easily accessible format reports on the results  
of the ongoing technical support and bugfixing activities of the BitDefender support  
and development teams, along with more general articles about virus prevention, the  
management of BitDefender solutions and detailed explanations, and many other  
articles.  
The BitDefender Knowledge Base is open to the public and freely searchable. This  
welth of information is yet another way to provide BitDefender customers with the  
technical knowledge and insight they need. All valid requests for information or bug  
reports coming from BitDefender clients eventually find their way into the BitDefender  
Knowledge Base, as bugfix reports, workaround cheatsheets or informational articles  
to supplement product helpfiles.  
The BitDefender Knowledge Base is available any time at http://kb.bitdefender.com.  
85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Getting help  
Support  
15  
15.3. Contact information  
Efficient communication is the key to a successful business. For the past 10 years  
SOFTWIN has established an indisputable reputation in exceeding the expectations  
of clients and partners, by constantly striving for better communications. Please do  
not hesitate to contact us regarding any issues or questions you might have  
15.3.1. Web addresses  
Sales department: <[email protected]>  
Technical support: <[email protected]>  
Documentation: <[email protected]>  
Security reports: <[email protected]>  
BitDefender Knowledge Base: http://kb.bitdefender.com  
15.3.2. Address  
The BitDefender offices are ready to respond to any inquiries regarding their areas of  
operations, in matters both commercial and general. Their respective adresses and  
contacts are listed below.  
Germany  
Softwin GmbH  
Karlsdorfer Straße 56 88069  
Tettnang  
Technischer Support: <[email protected]>  
Vertrieb: <[email protected]>  
Phone: 07542/94 44 44  
Fax: 07542/94 44 99  
Spain  
Constelación Negocial, S.L  
C/ Balmes 195, 2ª planta, 08006  
Barcelona  
86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Getting help  
Support  
15  
Soporte técnico: <[email protected]>  
Ventas: <[email protected]>  
Phone: +34 932189615  
Fax: +34 932179128  
Sitio web del producto: http://www.bitdefender-es.com  
U.S.A  
BitDefender LLC  
6301 NW 5th Way, Suite 3500  
Fort Lauderdale, Florida 33308  
Technical support: <[email protected]>  
Sales: <[email protected]>  
Phone: 954 776 62 62, 800 388 80 62  
Fax: 954 776 64 62, 800 388 80 64  
Romania  
SOFTWIN  
5th Fabrica de Glucoza St.  
PO BOX 52-93  
Bucharest  
Technical support: <[email protected]>  
Sales: <[email protected]>  
Phone: +40 21 2330780  
Fax: +40 21 2330763  
87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Getting help  
Support  
15  
88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Manual Pages  
Manual Pages  
89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Manual Pages  
90  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Manual Pages  
bdscan  
bdscan  
bdscan — BitDefender Antivirus Scanner for Unices  
Synopsis  
bdscan [ --action= disinfect | quarantine | delete | ignore ] [--no-archive] [--no-mail]  
[--no-pack] [--no-recursive] [--recursive-level=level] [--archive-level=level]  
[--ext[=ext1:ext2]] [--exclude-ext[=ext1:ext2]] [--suspect-copy] [--suspect-move]  
[--quarantine=quarantine_path] [--conf-file=conf_file] [--log[=file.log]]  
[--log-overwrite] [--no-list] [--no-warnings] [--verbose] [--update] [--virus-list] [--info]  
[--version] [--help] path-to-scan  
Description  
bdscan is BitDefender console virus scanner for Unices. It may come as a standalone  
package, as well as integrated in BitDefender mail or file server antivirus suite.  
BitDefender Antivirus Scanner for Unices is mainly used to do file scanning, in order  
to find any kind of viruses, trojans, worms or malwares. It uses the most advanced  
scanning engine technology to provide high rates of detection, reliability and speed.  
The user can choose to move the infected and suspected files to quarantine directories,  
disinfect or delete the files. bdscan has also the capacity to scan inside mailboxes  
for infected attachments.  
Options  
path-to-scan  
The path to scan can be a list of files and directories, separated by white spaces.  
--action  
Specifies the action to be performed when an infected object is found. See the  
Actions section for action details.  
--no-archive  
Specifies that bdscan should not scan inside archives.  
--no-mail  
Specifies that bdscan should not scan inside mailboxes.  
91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Manual Pages  
bdscan  
--no-pack  
Specifies that bdscan should not scan inside packed programs.  
--no-recursive  
Specifies that bdscan should not enter sub-directories for scanning. If you select  
this option only the first level directories will be scanned.  
--recursive-level=level  
Set the maximum recursive level to level. The default is 0, meaning no limitation.  
--archive-level=level  
Set the maximum archive depth level to level. The default is 12.  
--ext[=ext1:ext2]  
Specifies that bdscan should scan only the files with extensions specified in the  
list or in the configuration file, under the Extensions keyword.  
--exclude-ext[=ext1:ext2]  
Specifies that bdscan should exclude from scanning the files with extensions  
specified in the list. If the list is empty, the extensions from the configuration files  
are to be used.  
--suspect-copy  
Specifies that bdscan should copy the suspected files to quarantine.  
--suspect-move  
Specifies that bdscan should move the suspected files to quarantine.  
--quarantine=path  
Set the quarantine directory, where the infected files are stored when the action  
is quarantine. If the user can not write into the quarantine directory, bdscan will  
exit with error when quarantine action is invoked.  
--conf-file=file  
Set the alternate location of the configuration file. If this file is not valid, valid,  
bdscan will exit with an error message. By default, the configuration is read from  
/ e t c / B i t D e f e n d e r - s c a n n e r / b d s c a n . c o n f  
/usr/local/etc/bitdefender/bdscan.conf and ~/.BitDefender/bdscan.conf,  
the user file overrides partially or entirely the system-wide configuration.  
92  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Manual Pages  
bdscan  
--log[=file.log]  
Specifies that bdscan should log its activity to the mentioned file. If the user has  
no right to write this file, an error message will be output and the default one will  
be used. The default is ~/.BitDefender/bdscan.log.  
--log-overwrite  
Specifies that bdscan should not append the new output to the existing log file.  
The old log file content will be replaced by the new one.  
--no-list  
Specifies that bdscan should not list all the scanned files. This option can speed  
up the scanning process.  
--no-warnings  
Specifies that bdscan should not display warnings. The warnings are displayed  
in case a part of a virus signature has been found.  
--verbose  
Specifies that bdscan should output detailed messages.  
--update  
Specifies that bdscan should automatically update the virus signatures.  
--virus-list  
Display the virus list. This could lead to lot of information to be displayed.  
--info  
Print information about version, the current number of virus signatures, the moment  
of the last update, the number of scan engines, archive engines, unpack engines,  
mail engines and system engines.  
--version  
Display a short message containing the version information and the copyright  
note.  
--help  
Display the help message.  
Actions  
When an infected object is found, bdscan can be instructed to perform a specific  
action. These actions are the following.  
93  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Manual Pages  
bdscan  
disinfect  
BitDefender will try to disinfect the object, by removing the infected or suspected  
part. The action can fail sometimes.  
quarantine  
The object will be moved from its original location to a secured directory, the  
quarantine.  
delete  
The object will be simply removed from the filesystem  
ignore  
Even if infected objects are found, BitDefender will just report them and no action  
will be performed. This is the default action.  
Examples  
# bdscan --no-archive --verbose --action=disinfect /var/tmp  
In the command line above, bdscan is instructed to scan /var/tmp directory, excluding  
archives, to display detailed messages and to try to disinfect the files.  
# bdscan --no-mail --log=/tmp/bdscan.log --action=quarantine /var/tmp  
In the command line above, bdscan is instructed to scan /var/tmp directory, excluding  
mailboxes, log its activity to /tmp/bdscan.log file and quarantine the infected files.  
Files  
/etc/BitDefender-scanner/bdscan.conf ,  
/usr/local/etc/bitdefender/bdscan.conf ,  
~/.BitDefender/bdscan.conf  
The configuration files of bdscan. The system-wide configuration is overridden  
by the user configuration.  
94  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Manual Pages  
bdscan  
Bugs  
Sometimes, bdscan may hang while scanning directories containing pipes or UNIX  
socket files. To avoid this behavior, try to use it exclusively for regular files.  
Also, there may be rare cases when bdscan crashes while doing file scan. If this is  
the case, you should update the scan engines and virus signatures and definitions.  
See also  
Please also refer to the printed and on-line BitDefender documentation at  
95  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Manual Pages  
bdscan  
96  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Glossary  
ActiveX  
ActiveX is a model for writing programs so that other programs and the operating  
system can call them. ActiveX technology is used with Microsoft Internet Explorer  
to make interactive Web pages that look and behave like computer programs,  
rather than static pages. With ActiveX, users can ask or answer questions, use  
push buttons, and interact in other ways with the Web page. ActiveX controls are  
often written using Visual Basic.  
Active X is notable for a complete lack of security controls; computer security  
experts discourage its use over the Internet.  
Archive  
A disk, tape, or directory that contains files that have been backed up.  
A file that contains one or more files in a compressed format.  
Backdoor  
A hole in the security of a system deliberately left in place by designers or  
maintainers. The motivation for such holes is not always sinister; some operating  
systems, for example, come out of the box with privileged accounts intended for  
use by field service technicians or the vendor's maintenance programmers.  
Boot sector  
A sector at the beginning of each disk that identifies the disk's architecture (sector  
size, cluster size, and so on). For startup disks, the boot sector also contains a  
program that loads the operating system.  
Boot virus  
A virus that infects the boot sector of a fixed or floppy disk. An attempt to boot  
from a diskette infected with a boot sector virus will cause the virus to become  
active in memory. Every time you boot your system from that point on, you will  
have the virus active in memory.  
Browser  
Short for Web browser, a software application used to locate and display Web  
pages. The two most popular browsers are Netscape Navigator and Microsoft  
97  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Glossary  
Internet Explorer. Both of these are graphical browsers, which means that they  
can display graphics as well as text. In addition, most modern browsers can  
present multimedia information, including sound and video, though they require  
plug-ins for some formats.  
Command line  
In a command line interface, the user types commands in the space provided  
directly on the screen using command language  
Cookie  
Within the Internet industry, cookies are described as small files containing  
information about individual computers that can be analyzed and used by  
advertisers to track your online interests and tastes. In this realm, cookie  
technology is still being developed and the intention is to target ads directly to  
what you've said your interests are. It's a double-edge sword for many people  
because on one hand, it's efficient and pertinent as you only see ads about what  
you're interested in. On the other hand, it involves actually "tracking" and  
"following" where you go and what you click. Understandably so, there is a debate  
over privacy and many people feel offended by the notion that they are viewed  
as a "SKU number" (you know, the bar code on the back of packages that gets  
scanned at the grocery check-out line). While this viewpoint may be extreme, in  
some cases it is accurate.  
Disk drive  
It's a machine that reads data from and writes data onto a disk.  
A hard disk drive reads and writes hard disks.  
A floppy drive accesses floppy disks.  
Disk drives can be either internal (housed within a computer) or external (housed  
in a separate box that connects to the computer).  
Download  
To copy data (usually an entire file) from a main source to a peripheral device.  
The term is often used to describe the process of copying a file from an online  
service to one's own computer. Downloading can also refer to copying a file from  
a network file server to a computer on the network.  
E-mail  
Electronic mail. A service that sends messages on computers via local or global  
networks.  
98  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Events  
An action or occurrence detected by a program. Events can be user actions, such  
as clicking a mouse button or pressing a key, or system occurrences, such as  
running out of memory.  
False positive  
Occurs when a scanner identifies a file as infected when in fact it is not.  
Filename extension  
The portion of a filename, following the final point, which indicates the kind of  
data stored in the file.  
Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS.  
They are usually from one to three letters (some sad old OSes support no more  
than three). Examples include "c" for C source code, "ps" for PostScript, "txt" for  
arbitrary text.  
Heuristic  
A rule-based method of identifying new viruses. This method of scanning does  
not rely on specific virus signatures. The advantage of the heuristic scan is that  
it is not fooled by a new variant of an existing virus. However, it might occasionally  
report suspicious code in normal programs, generating the so-called "false  
positive".  
IP  
Internet Protocol - A routable protocol in the TCP/IP protocol suite that is  
responsible for IP addressing, routing, and the fragmentation and reassembly of  
IP packets.  
Java applet  
A Java program which is designed to run only on a web page. To use an applet  
on a web page, you would specify the name of the applet and the size (length  
and width--in pixels) that the applet can utilize. When the web page is accessed,  
the browser downloads the applet from a server and runs it on the user's machine  
(the client). Applets differ from applications in that they are governed by a strict  
security protocol.  
For example, even though applets run on the client, they cannot read or write  
data onto the client's machine. Additionally, applets are further restricted so that  
they can only read and write data from the same domain that they are served  
from.  
99  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Macro virus  
A type of computer virus that is encoded as a macro embedded in a document.  
Many applications, such as Microsoft Word and Excel, support powerful macro  
languages.  
These applications allow you to embed a macro in a document, and have the  
macro execute each time the document is opened.  
Mail client  
An e-mail client is an application that enables you to send and receive e-mail.  
Memory  
Internal storage areas in the computer. The term memory identifies data storage  
that comes in the form of chips, and the word storage is used for memory that  
exists on tapes or disks. Every computer comes with a certain amount of physical  
memory, usually referred to as main memory or RAM.  
Non-heuristic  
This method of scanning relies on specific virus signatures. The advantage of the  
non-heuristic scan is that it is not fooled by what might seem to be a virus, and  
does not generate false alarms.  
Packed programs  
A file in a compression format. Many operating systems and applications contain  
commands that enable you to pack a file so that it takes up less memory. For  
example, suppose you have a text file containing ten consecutive space  
characters. Normally, this would require ten bytes of storage.  
However, a program that packs files would replace the space characters by a  
special space-series character followed by the number of spaces being replaced.  
In this case, the ten spaces would require only two bytes. This is just one packing  
technique - there are many more.  
Path  
The exact directions to a file on a computer. These directions are usually described  
by means of the hierarchical filing system from the top down.  
The route between any two points, such as the communications channel between  
two computers.  
Polymorphic virus  
A virus that changes its form with each file it infects. Since they have no consistent  
binary pattern, such viruses are hard to identify.  
100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Port  
An interface on a computer to which you can connect a device. Personal  
computers have various types of ports. Internally, there are several ports for  
connecting disk drives, display screens, and keyboards. Externally, personal  
computers have ports for connecting modems, printers, mice, and other peripheral  
devices.  
In TCP/IP and UDP networks, an endpoint to a logical connection. The port number  
identifies what type of port it is. For example, port 80 is used for HTTP traffic.  
Report file  
A file that lists actions that have occurred. BitDefender maintains a report file  
listing the path scanned, the folders, the number of archives and files scanned,  
how many infected and suspicious files were found.  
Script  
Another term for macro or batch file, a script is a list of commands that can be  
executed without user interaction.  
Startup items  
Any files placed in this folder will open when the computer starts. For example,  
a startup screen, a sound file to be played when the computer first starts, a  
reminder calendar, or application programs can be startup items. Normally, an  
alias of a file is placed in this folder rather than the file itself.  
TCP/IP  
Transmission Control Protocol/Internet Protocol - A set of networking protocols  
widely used on the Internet that provides communications across interconnected  
networks of computers with diverse hardware architectures and various operating  
systems. TCP/IP includes standards for how computers communicate and  
conventions for connecting networks and routing traffic.  
Trojan  
A destructive program that masquerades as a benign application. Unlike viruses,  
Trojan horses do not replicate themselves but they can be just as destructive.  
One of the most insidious types of Trojan horse is a program that claims to rid  
your computer of viruses but instead introduces viruses onto your computer.  
The term comes from a story in Homer's Iliad, in which the Greeks give a giant  
wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after  
the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the  
101  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
horse's hollow belly and open the city gates, allowing their compatriots to pour in  
and capture Troy.  
Update  
A new version of a software or hardware product designed to replace an older  
version of the same product. In addition, the installation routines for updates often  
check to make sure that an older version is already installed on your computer;  
if not, you cannot install the update.  
BitDefender has it's own update module that allows you to manually check for  
updates, or let it automatically update the product.  
Virus  
A program or piece of code that is loaded onto your computer without your  
knowledge and runs against your will. Most viruses can also replicate themselves.  
All computer viruses are manmade. A simple virus that can copy itself over and  
over again is relatively easy to produce. Even such a simple virus is dangerous  
because it will quickly use all available memory and bring the system to a halt.  
An even more dangerous type of virus is one capable of transmitting itself across  
networks and bypassing security systems.  
Virus definition  
The binary pattern of a virus, used by the antivirus program to detect and eliminate  
the virus.  
Worm  
A program that propagates itself over a network, reproducing itself as it goes. It  
cannot attach itself to other programs.  
102  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Technics Speaker SB AFC150A User Manual
Tiger Games 07 010 User Manual
Toshiba Security Camera IK DP20A User Manual
Trane Air Conditioner 2TTB3 User Manual
Transition Networks Power Supply 33423A User Manual
Tripp Lite Network Card B014 000 User Manual
Vector Automobile Parts VEC010INV User Manual
Verilux Microscope Magnifier VM02 User Manual
Vizio Speaker SB4020EB0 User Manual
Vornado Ventilation Hood AVH4 User Manual