<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VirusScan for Unix and Socket files in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178580#M795058</link>
    <description>Kevin,&lt;BR /&gt;&lt;BR /&gt;Sorry for the late response but your question peaked my interest.  A UDS socket(7) is a zero length file, so the AV software won't find a pattern in the file; it would have to rely upon the filename itself to remove it. &lt;BR /&gt; &lt;BR /&gt;I did a short search on Google "uvscan socket" and found &lt;A href="http://www.corpit.ru/pipermail/avcheck/2002q1/000463.html" target="_blank"&gt;http://www.corpit.ru/pipermail/avcheck/2002q1/000463.html&lt;/A&gt;&lt;BR /&gt;-- is an article that explores the possibility of using UDS socket maliciously.&lt;BR /&gt;&lt;BR /&gt;However, most of the articles spoke of using uvscan on files accessed by PC users over Samba shares.  &lt;BR /&gt;&lt;BR /&gt;Also you might want to look at &lt;A href="http://sourceforge.net/projects/amavis-n-parser/" target="_blank"&gt;http://sourceforge.net/projects/amavis-n-parser/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope that helps a little,&lt;BR /&gt;-&amp;gt; Brian Hackley</description>
    <pubDate>Tue, 03 Feb 2004 10:21:12 GMT</pubDate>
    <dc:creator>Brian Hackley</dc:creator>
    <dc:date>2004-02-03T10:21:12Z</dc:date>
    <item>
      <title>VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178574#M795052</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;I'm using HP-UX 11.00 and I've installed McAfee VirusScan for Unix version 4.32.0&lt;BR /&gt;&lt;BR /&gt;I'm running it with the following options:&lt;BR /&gt;&lt;BR /&gt;uvscan -cr --summary --file scan_directories&lt;BR /&gt;&lt;BR /&gt;c - cleans any infected files&lt;BR /&gt;r - scans subdirectories&lt;BR /&gt;summary - gives me a summary at the end&lt;BR /&gt;the file scan_directories is a list of the directories to be scanned&lt;BR /&gt;&lt;BR /&gt;I redirect standard output and standard error to a text file which is mailed to me each morning.  The problem is, this text file is huge because I get lots of errors telling me that VirusScan could not open socket files.&lt;BR /&gt;&lt;BR /&gt;For example:&lt;BR /&gt;&lt;BR /&gt;/var/spool/sockets/pwgr/client1121&lt;BR /&gt;        file could not be opened. &lt;BR /&gt;&lt;BR /&gt;I have a few questions relating to this:&lt;BR /&gt;&lt;BR /&gt;1. Should I bother scanning socket files for viruses?&lt;BR /&gt;&lt;BR /&gt;2. If not, how would I turn off scanning of socket files?  --exclude option only works on file names, I think.&lt;BR /&gt;&lt;BR /&gt;3. If I do want to scan socket files, how do I allow VirusScan to scan them?&lt;BR /&gt;&lt;BR /&gt;4. If I don't want to scan them but can't exclude them, how do I turn off the error reporting for this type of file?&lt;BR /&gt;&lt;BR /&gt;I know that these are all questions relating to a third party product, but I guess I'm not the only person using HP-UX and VirusScan for Unix.&lt;BR /&gt;&lt;BR /&gt;Thanks for your help,&lt;BR /&gt;&lt;BR /&gt;Kevin</description>
      <pubDate>Fri, 30 Jan 2004 05:55:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178574#M795052</guid>
      <dc:creator>Kevin Cherubini_1</dc:creator>
      <dc:date>2004-01-30T05:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178575#M795053</link>
      <description>&lt;BR /&gt;Anyone?&lt;BR /&gt;&lt;BR /&gt;If this is not the right forum for this question, can anyone tell me where I sould ask it?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Kevin</description>
      <pubDate>Mon, 02 Feb 2004 04:42:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178575#M795053</guid>
      <dc:creator>Kevin Cherubini_1</dc:creator>
      <dc:date>2004-02-02T04:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178576#M795054</link>
      <description>Kevin,&lt;BR /&gt;&lt;BR /&gt;I'm not sure why you would want to scan for viruses on a UNIX system.  I think it would be better for you to harden your system to outside attacks using the existing configuration files available on any UNIX system.&lt;BR /&gt;&lt;BR /&gt;&amp;lt;2 cents worth done&amp;gt;&lt;BR /&gt;&lt;BR /&gt;I'm assuming your are running uvscan from a script, via cron.  I don't know anything about McAfee's uvscan, but you could remove the error messages by doing:&lt;BR /&gt;grep -v "error string" &lt;TEXT_FILE&gt; &amp;gt;&amp;gt; &lt;NEW_TEXT_FILE&gt;&lt;BR /&gt;after your scan is complete.  This would remove all the error messages in the output.    Then mail &lt;NEW_TEXT_FILE&gt; to yourself.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Mark&lt;/NEW_TEXT_FILE&gt;&lt;/NEW_TEXT_FILE&gt;&lt;/TEXT_FILE&gt;</description>
      <pubDate>Mon, 02 Feb 2004 10:30:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178576#M795054</guid>
      <dc:creator>Mark Ellzey</dc:creator>
      <dc:date>2004-02-02T10:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178577#M795055</link>
      <description>Thanks Mark.&lt;BR /&gt;&lt;BR /&gt;I have hardened my system, but corporate policy says that I have to run uvscan every day anyway. And who am I to argue with corporate policy?&lt;BR /&gt;&lt;BR /&gt;You're right - I run a script in cron to download and unzip the latest DAT files, scan the system directories and a few program directories and send the output text file to myself using sendmail.  &lt;BR /&gt;&lt;BR /&gt;Good idea to use grep for clearing out the error messages that I don't want.  I'm kicking myself for not thinking of it.  Worthy of five points, certainly.&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;&lt;BR /&gt;Kevin&lt;BR /&gt;&lt;BR /&gt;By the way, am I the ONLY person running uvscan?!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 02 Feb 2004 10:38:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178577#M795055</guid>
      <dc:creator>Kevin Cherubini_1</dc:creator>
      <dc:date>2004-02-02T10:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178578#M795056</link>
      <description>Yes... you're the only one.&lt;BR /&gt;OK ok ok... probably not ;-) But I'd guess you were in the minority.&lt;BR /&gt;Who knows? The product exists... I may be in the minority, instead.&lt;BR /&gt;&lt;BR /&gt;Incidentally... have your scans ever turned up anything?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 02 Feb 2004 11:16:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178578#M795056</guid>
      <dc:creator>Chris Watkins_1</dc:creator>
      <dc:date>2004-02-02T11:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178579#M795057</link>
      <description>&lt;BR /&gt;Not a thing, apart from the EICAR test file.&lt;BR /&gt;&lt;BR /&gt;It did find lots of broken symbolic links, though!  Was I naive to expect swremove to clean these up?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 02 Feb 2004 11:45:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178579#M795057</guid>
      <dc:creator>Kevin Cherubini_1</dc:creator>
      <dc:date>2004-02-02T11:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178580#M795058</link>
      <description>Kevin,&lt;BR /&gt;&lt;BR /&gt;Sorry for the late response but your question peaked my interest.  A UDS socket(7) is a zero length file, so the AV software won't find a pattern in the file; it would have to rely upon the filename itself to remove it. &lt;BR /&gt; &lt;BR /&gt;I did a short search on Google "uvscan socket" and found &lt;A href="http://www.corpit.ru/pipermail/avcheck/2002q1/000463.html" target="_blank"&gt;http://www.corpit.ru/pipermail/avcheck/2002q1/000463.html&lt;/A&gt;&lt;BR /&gt;-- is an article that explores the possibility of using UDS socket maliciously.&lt;BR /&gt;&lt;BR /&gt;However, most of the articles spoke of using uvscan on files accessed by PC users over Samba shares.  &lt;BR /&gt;&lt;BR /&gt;Also you might want to look at &lt;A href="http://sourceforge.net/projects/amavis-n-parser/" target="_blank"&gt;http://sourceforge.net/projects/amavis-n-parser/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope that helps a little,&lt;BR /&gt;-&amp;gt; Brian Hackley</description>
      <pubDate>Tue, 03 Feb 2004 10:21:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178580#M795058</guid>
      <dc:creator>Brian Hackley</dc:creator>
      <dc:date>2004-02-03T10:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178581#M795059</link>
      <description>It sounds like a joke</description>
      <pubDate>Tue, 03 Feb 2004 11:21:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178581#M795059</guid>
      <dc:creator>Jdamian</dc:creator>
      <dc:date>2004-02-03T11:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178582#M795060</link>
      <description>Kevin,&lt;BR /&gt;&lt;BR /&gt;You will be pleased to know that we also using the NAI/Mcafee command line scanner virusscan.&lt;BR /&gt;&lt;BR /&gt;You can remove the links from the scan by :-&lt;BR /&gt;&lt;BR /&gt;using the --ignore links&lt;BR /&gt;&lt;BR /&gt;and can remove the sockets by entering the list of them in an exclusion file and then :-&lt;BR /&gt;&lt;BR /&gt;using the --exclude &lt;FILE&gt; where the &lt;FILE is="" the="" file="" containing="" the="" list="" of="" the="" sockets.=""&gt;&lt;/FILE&gt;&lt;BR /&gt;Keith&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/FILE&gt;</description>
      <pubDate>Tue, 03 Feb 2004 11:28:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178582#M795060</guid>
      <dc:creator>Keith Bevan_1</dc:creator>
      <dc:date>2004-02-03T11:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178583#M795061</link>
      <description>This thread of mine contains several open source suggestions:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=77096" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=77096&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It may be something you can use. I've been meaning to post this for days. Sorry.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 03 Feb 2004 11:36:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178583#M795061</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-02-03T11:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178584#M795062</link>
      <description>&lt;BR /&gt;Thanks Keith.&lt;BR /&gt;&lt;BR /&gt;Good to know I'm not their only customer!&lt;BR /&gt;&lt;BR /&gt;I already tried the --exclude option (see point 2 in original post).&lt;BR /&gt;&lt;BR /&gt;The problem is, I don't have a full list of all socket files on my system and as far as I know, --exclude only works on file names, not on file types.&lt;BR /&gt;&lt;BR /&gt;Assuming the answer to my first question is "No", is there any way I can get a listing of socket files into a text file so that I can --exclude it?  Something like:&lt;BR /&gt;&lt;BR /&gt;ls -R  &amp;gt;&amp;gt; exclude_list&lt;BR /&gt;&lt;BR /&gt;What about using the -l option with some grep-ing for s on the mode listing?  &lt;BR /&gt;&lt;BR /&gt;Who is good at piping commands together?&lt;BR /&gt;&lt;BR /&gt;Kev&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Feb 2004 11:41:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178584#M795062</guid>
      <dc:creator>Kevin Cherubini_1</dc:creator>
      <dc:date>2004-02-03T11:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178585#M795063</link>
      <description>Try this:&lt;BR /&gt;&lt;BR /&gt;# find / -type s &amp;gt;&amp;gt;exclude_list</description>
      <pubDate>Tue, 03 Feb 2004 11:46:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178585#M795063</guid>
      <dc:creator>Chris Watkins_1</dc:creator>
      <dc:date>2004-02-03T11:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178586#M795064</link>
      <description>Kev,&lt;BR /&gt;&lt;BR /&gt;Chris you took the words right out of my mouth.&lt;BR /&gt;&lt;BR /&gt;The key is to build the exclusion file first and this can be achieved using the find command and the tag 's' as Chris has detailed.&lt;BR /&gt;&lt;BR /&gt;Your only future issue is going to be if new sockets are added or existing ones are deleted, thus making you file stale. You would then need to refresh the exclusion file.  You could get round this by setting up a cron job to populate &lt;BR /&gt;the exclusion file before running uvscan.&lt;BR /&gt;&lt;BR /&gt;Keith&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Feb 2004 11:50:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178586#M795064</guid>
      <dc:creator>Keith Bevan_1</dc:creator>
      <dc:date>2004-02-03T11:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178587#M795065</link>
      <description>&lt;BR /&gt;Thanks for all the help so far, guys.&lt;BR /&gt;&lt;BR /&gt;I've added a nice find command to the prescan tasks and am trying the --exclude option in tonight's scan.&lt;BR /&gt;&lt;BR /&gt;Somebody somewhere told me to always be nice with find commands, as they are so processor hungry.&lt;BR /&gt;&lt;BR /&gt;Will let you know tomorrow!&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Feb 2004 12:08:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178587#M795065</guid>
      <dc:creator>Kevin Cherubini_1</dc:creator>
      <dc:date>2004-02-03T12:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: VirusScan for Unix and Socket files</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178588#M795066</link>
      <description>&lt;BR /&gt;Right, I've just checked my email and it seems that the --exclude option worked fine with that exclude_list that I created with the find command.&lt;BR /&gt;&lt;BR /&gt;For anyone who is reading this looking for an answer to their own uvscan problems, I've pasted a listing of the script that I run in cron below.  I'm sure that there are better ways to do this, this is just what works for me.&lt;BR /&gt;&lt;BR /&gt;All the echoes and remarks can be ignored - I just like to comment things so that it makes sense to me in two years time!&lt;BR /&gt;&lt;BR /&gt;I've gathered from the answers above that socket files are not an issue for viruses because they are zero-length but that they can be security risks, so make sure you harden your systems against outside attacks.  &lt;BR /&gt;&lt;BR /&gt;Thanks again for all the help.&lt;BR /&gt;&lt;BR /&gt;Mine's a Guinness.&lt;BR /&gt;&lt;BR /&gt;Kev&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;# Tasks are split into three sections  - Pre Scan, Scan and Post Scan&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;# Pre Scan&lt;BR /&gt;&lt;BR /&gt;PATH=$PATH:/usr/local/uvscan&lt;BR /&gt;cd /usr/local/uvscan&lt;BR /&gt;&lt;BR /&gt;rm scanlog&lt;BR /&gt;&lt;BR /&gt;echo Scanning Log &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo Script started $(date) &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo Downloading updates $(date) &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;rm dat-*.tar&lt;BR /&gt;ftp ftp.nai.com &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt; &lt;BR /&gt;echo DAT version &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;ls dat-*.tar &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;echo Unzipping files $(date) &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;tar -xfv /usr/local/uvscan/dat-*.tar &amp;gt;&amp;gt; scanlog 2&amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;echo Creating file exclusion list at $(date) &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;rm exclude_list&lt;BR /&gt;&lt;BR /&gt;nice find / -type s &amp;gt;&amp;gt; exclude_list&lt;BR /&gt;&lt;BR /&gt;# Scan&lt;BR /&gt;&lt;BR /&gt;echo Scanning started at $(date) &amp;gt;&amp;gt; scanlog&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;/usr/local/uvscan/uvscan -cr --summary --file scan_directories --exclude exclude&lt;BR /&gt;_list &amp;gt;&amp;gt; scanlog 2&amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;echo &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;# Post Scan&lt;BR /&gt;&lt;BR /&gt;echo Script ended at $(date) &amp;gt;&amp;gt; scanlog&lt;BR /&gt;&lt;BR /&gt;pg scanlog | sendmail me@my_email.ie&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 04 Feb 2004 04:59:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/virusscan-for-unix-and-socket-files/m-p/3178588#M795066</guid>
      <dc:creator>Kevin Cherubini_1</dc:creator>
      <dc:date>2004-02-04T04:59:17Z</dc:date>
    </item>
  </channel>
</rss>

