This SDK generates bare-bones eCAP antivirus adapter sources to bootstrap your adapter development. In addition to providing a working adapter skeleton, the generated sources support the following AV adapter functionality: * Integration with eCAP host applications (e.g. Squid). * Accumulation of message bodies using disk files (for future analysis). The staging directory is configurable. * Optional asynchronous scanning of messages using pthreads, even if the host application is not threaded. * Configurable reaction to scan errors. * Configurable maximum message size. After the initial generation, in order to get a functional adapter, further development is required to implement the actual virus scanning logic (usually via calls to an existing AV library or daemon). Here are the usual steps for making an adapter using this SDK: 1. Download an AV SDK tarball from http://www.e-cap.org/ 2. Unpack the tarball. 3. Start the ./make-adapter.sh script included in the tarball and answer a few questions. You can come back to this step if things go wrong, of course. 4. Watch the script create a new adapter directory and populate it with files. The name of the directory will be printed upon successful script completion. 5. Go to the new directory created by the script. Follow the generated todo.txt file to complete your adapter development. More information about eCAP is available at http://www.e-cap.org/ Help, including commercial support and development, is available from The Measurement Factory (http://www.measurement-factory.com/).