Statements (118)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:can_detect |
gptkb:virus
viruses trojans adware |
gptkbp:community_support |
yes
|
gptkbp:developed_by |
gptkb:Cisco_Systems
|
gptkbp:first_released |
gptkb:2001
|
gptkbp:has_documentation |
available online
|
gptkbp:has_feature |
community support
email scanning real-time scanning automatic updates malware detection integration with other software scheduled scanning customizable configuration detection of potentially unwanted programs heuristic analysis customizable scanning options web scanning detection of adware detection of adware and spyware detection of backdoors detection of exploits detection of keyloggers detection of malicious behavior detection of malicious downloads detection of malicious email attachments detection of malicious network traffic detection of malicious scripts detection of malicious websites detection of phishing attempts detection of potentially harmful applications detection of ransomware detection of rootkits detection of spyware detection of suspicious activities detection of suspicious application actions detection of suspicious application activity detection of suspicious application behavior detection of suspicious application behaviors detection of suspicious application interactions detection of suspicious file actions detection of suspicious file activity detection of suspicious file behavior detection of suspicious file behaviors detection of suspicious file interactions detection of suspicious files detection of suspicious network actions detection of suspicious network activity detection of suspicious network behavior detection of suspicious network behaviors detection of suspicious network connections detection of suspicious network interactions detection of suspicious processes detection of suspicious system actions detection of suspicious system activity detection of suspicious system behavior detection of suspicious system behaviors detection of suspicious system changes detection of suspicious system interactions detection of suspicious user actions detection of suspicious user activity detection of suspicious user behavior detection of suspicious user behaviors detection of suspicious user interactions detection of trojans detection of unwanted software detection of worms multi-threaded scanning support for various archive formats detection of malicious URLs detection of potentially unwanted programs (PUPs) |
gptkbp:has_integration_with |
with email servers
with file servers with web servers |
gptkbp:has_user_interface |
gptkb:Command_Line_Interface
|
gptkbp:has_version |
0.103.0
0.103.1 0.103.2 0.103.3 0.103.4 0.103.5 0.103.6 |
https://www.w3.org/2000/01/rdf-schema#label |
Clam AV
|
gptkbp:includes |
daemon for on-access scanning
|
gptkbp:is_available_on |
gptkb:Git_Hub
|
gptkbp:is_compatible_with |
gptkb:Linux
gptkb:mac_OS gptkb:Windows |
gptkbp:is_distributed_by |
open-source model
|
gptkbp:is_part_of |
security software category
Clam AV project |
gptkbp:is_supported_by |
gptkb:developers
security researchers community contributors |
gptkbp:is_used_by |
mail servers
|
gptkbp:is_used_for |
email scanning
malware scanning file scanning web scanning |
gptkbp:latest_version |
0.103.7
|
gptkbp:license |
gptkb:GNU_General_Public_License
|
gptkbp:operating_system |
Cross-platform
|
gptkbp:programming_language |
gptkb:C
gptkb:C++ |
gptkbp:provides |
command-line scanner
daemon for on-access scanning |
gptkbp:supports |
multiple file formats
|
gptkbp:uses |
signature-based detection
|
gptkbp:written_in |
gptkb:C
gptkb:C++ gptkb:Python gptkb:Shell |
gptkbp:bfsParent |
gptkb:Postfix
gptkb:Feren_OS |
gptkbp:bfsLayer |
5
|