<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to feature-requests</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/</link><description>Recent changes to feature-requests</description><atom:link href="https://sourceforge.net/p/clamsentinel/feature-requests/feed.rss" rel="self"/><language>en</language><lastBuildDate>Sun, 13 Oct 2019 05:56:05 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/clamsentinel/feature-requests/feed.rss" rel="self" type="application/rss+xml"/><item><title>#12 Monitor only certain folders</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/12/?limit=25#780c/ecfa/d773/786a/592a</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I'm willing to settle for the basic function of scanning new files I download manually...&lt;/p&gt;
&lt;p&gt;How many signatures do other leading antiruses roughly release every day?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">lwc</dc:creator><pubDate>Sun, 13 Oct 2019 05:56:05 -0000</pubDate><guid>https://sourceforge.net0895e6bef4ae31410ec18559cf76416c5aebbe06</guid></item><item><title>#12 Monitor only certain folders</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/12/?limit=25#780c/ecfa/d773</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;What do you mean "Clam Sentinel is unable to detect most of the malware since&lt;br/&gt;
2014"? Clam Sentinel is not an an antivirus, ClamWin is. Sentinel is just a way to launch ClamWin to scan new files.&lt;/p&gt;
&lt;p&gt;All we ask is to only launch Sentinel for specific folders.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">lwc</dc:creator><pubDate>Sat, 12 Oct 2019 19:08:25 -0000</pubDate><guid>https://sourceforge.net613560de69bed929131eeaadee98521aa4a3260f</guid></item><item><title>#12 Monitor only certain folders</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/12/?limit=25#780c</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I would also like this feature to be implemented, being able to choose directories that only have to be monitored for scanning.&lt;br/&gt;
Because it's not conceivable to exclude all folders adjacent to Firefox folder one by one in user files directory, for example.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">dma</dc:creator><pubDate>Sat, 12 Oct 2019 09:02:57 -0000</pubDate><guid>https://sourceforge.net93adc3c4073111c2385e6e0b29ba247d08acdd4e</guid></item><item><title>Use clamd daemon for scanning</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/16/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I've been using ClamWin for a while. On old system with Windows XP Clam Sentinel is very slow in detecting threads, also takes a lot of CPU usage. Lately I found out how to configure clamd daemon to work as a Windows Service. The basic features work with Clam Sentinel, but most of the parameters are different. Though with the clamd daemon loaded to memory the detection is really fast, it instantly reacts and causes less cpu activity. Can you make Clam Sentinel work with clamd or make the used scan engine settings more configurable? i used this: &lt;a href="http://oss.netfarm.it/clamav/" rel="nofollow"&gt;http://oss.netfarm.it/clamav/&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><pubDate>Wed, 01 Jun 2016 08:12:52 -0000</pubDate><guid>https://sourceforge.net2b7a727b42e20e802f38c01141272e2ddf9f4abd</guid></item><item><title>Include a changelist for each new version</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/15/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;There's currently no way to know what's the difference between old and new versions.&lt;br /&gt;
It would be handy to know if and which features were added to new versions.&lt;/p&gt;
&lt;p&gt;Thanks!&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">lwc</dc:creator><pubDate>Sun, 14 Dec 2014 00:02:00 -0000</pubDate><guid>https://sourceforge.neta28058a9d537d41ce80eb750a3a4c8c396200868</guid></item><item><title>Make the reporting balloons clickable</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/14/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Please add the ability to click reporting balloons.&lt;/p&gt;
&lt;p&gt;At the very least, I think clicking the balloons should open the relevant folder and select the reported file. You can accomplish that with this command:&lt;/p&gt;
&lt;h1 id="explorerexe-selectwzxhzdk0"&gt;explorer.exe /select,&lt;/h1&gt;
&lt;p&gt;For example, if the infected file is &lt;strong&gt;c:\foobar\infected.txt&lt;/strong&gt;, then run the following command when the balloon is clicked:&lt;/p&gt;
&lt;h1 id="explorerexe-selectcfoobarinfectedtxt"&gt;explorer.exe /select,c:\foobar\infected.txt&lt;/h1&gt;
&lt;p&gt;In case you've just quarantined the infected file, the clickable balloon could use this command (assuming quarantined files are located in c:\quarantined):&lt;/p&gt;
&lt;h1 id="explorerexe-selectcquarantinedinfectedtxt"&gt;explorer.exe /select,c:\quarantined\infected.txt&lt;/h1&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">lwc</dc:creator><pubDate>Sat, 21 Jun 2014 11:02:00 -0000</pubDate><guid>https://sourceforge.net629819f6e146dd59d6e932c69cccf0eef35c8465</guid></item><item><title>#13 Disable suspicious origin</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/13/?limit=25#67f5</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Anything? Updates? Something?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timberwolf Programmers</dc:creator><pubDate>Sat, 10 May 2014 17:35:29 -0000</pubDate><guid>https://sourceforge.net89a0664ae930a2766118a56a1ab02311fcb71d3f</guid></item><item><title>#13 Disable suspicious origin</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/13/?limit=25#8c6c</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;My problem is that &lt;em&gt;all&lt;/em&gt; MSI installers have their files quarintined, that is if I have quarintine set, for suspicious origin, even Microsoft's. And &lt;em&gt;any&lt;/em&gt; download gets it, the download could be anything from an image to a simple text file let alone an exe. I am a programmer and when I build something, it give it the same status. I think it would be better if it scans anything with supicious origin, rather than auto-assume it's infected.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Sincerely,&lt;br /&gt;
Patrick Thomas (Timberwolf)&lt;br /&gt;
Timberwolf Programmers Owner &amp;amp; Founder&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timberwolf Programmers</dc:creator><pubDate>Thu, 27 Mar 2014 09:56:50 -0000</pubDate><guid>https://sourceforge.net00de392ea1238017e8c4f8dc1f77237a92fe421f</guid></item><item><title>Disable suspicious origin</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/13/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Disable suspicious origin&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timberwolf Programmers</dc:creator><pubDate>Thu, 20 Mar 2014 01:59:24 -0000</pubDate><guid>https://sourceforge.netbbb36eb8f9192d4f9a19a7f6cde1ce572d2c229e</guid></item><item><title>#7 Ask the user what to do when virus is found</title><link>https://sourceforge.net/p/clamsentinel/feature-requests/7/?limit=25#1336</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I beg to differ: the EICAR test string is of course executable and that's exactly its peculiarity. It has been designed to be easy to copy and paste because it's a sequence if ascii chars, but it's a "regular" com file using int21 to write to stdout. It doesn't run anymore on x64 architecture just because NTVDM is missing there, but still runs on 32 bits and displays a text string in console.&lt;/p&gt;
&lt;p&gt;It is not harmful, right, but all av software detect it as a regular threat because it's a test, otherwise it wouldn't be useful at all, and so does clamav, of course:&lt;/p&gt;
&lt;p&gt;dario@sandy:~$ clamscan /tmp/vtest.com&lt;br /&gt;
/tmp/vtest.com: Eicar-Test-Signature FOUND&lt;/p&gt;
&lt;p&gt;----------- SCAN SUMMARY -----------&lt;br /&gt;
Known viruses: 3233585&lt;br /&gt;
Engine version: 0.97.8&lt;br /&gt;
Scanned directories: 0&lt;br /&gt;
Scanned files: 1&lt;br /&gt;
Infected files: 1&lt;br /&gt;
Data scanned: 0.00 MB&lt;br /&gt;
Data read: 0.00 MB (ratio 0.00:1)&lt;br /&gt;
Time: 4.688 sec (0 m 4 s)&lt;/p&gt;
&lt;p&gt;So I don't know if clamsentinel has some specific logic on the EICAR test, but I don't see why it should. I thought this program was there to fill the gap between clamav and a windows native antivirus, since clamav lacks a realtime scanner. So as a consequence I imagined it would lock access to files waiting for clamav clearance, but since it doesn't with EICAR (I was able to save the file on my pc with clamsentinel active and then run it), I guess I misunderstood and it's not the way it's meant to be, my bad.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">ctrl</dc:creator><pubDate>Mon, 10 Mar 2014 20:08:55 -0000</pubDate><guid>https://sourceforge.net5fca86325124afcdbb0bd3b32349f41dcc1e49f6</guid></item></channel></rss>