Scanning with ClamAV and maldet
LMD's maldet daemon constantly monitors the directories that you specify in the /usr/local/maldetect/monitor_paths
file. When it finds a file that it suspects might be malware, it automatically takes whatever action that you specified in the conf.maldet
file. To see how this works, I'll create a simulated malware file in my home directory. Fortunately, that's easier than it sounds, because we have a website that will help us out.
Note
EICAR, which used to be known by its full name of European Institute for Computer Antivirus Research, provides a virus signature that you can include in a plain text file. You can get it at: http://www.eicar.org/86-0-Intended-use.html. To create the simulated virus file, go to the page that I've listed in the preceding link.
Scroll down toward the bottom of the page until you see this line of text within a text box:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Copy that line of text and insert it into a text...